This document summarizes different types of virtualization technologies including hardware virtualization, presentation virtualization, application virtualization, and others. It discusses how each type abstracts and decouples different computing resources to provide benefits like increased flexibility, simplified administration, improved performance and fault tolerance. Specific Microsoft virtualization technologies are also highlighted for each category. Use cases for virtualization like server consolidation, development/testing environments, and improving quality of service are outlined.
This document provides an overview of virtualization technologies including hardware, presentation, and application virtualization. It discusses Microsoft's virtualization products that implement these technologies like Virtual Server 2005, Virtual PC 2007, Windows Server 2008 Terminal Services, and SoftGrid Application Virtualization. It emphasizes that while virtualization provides benefits, a virtualized environment must be properly managed. Microsoft's System Center products like Operations Manager, Configuration Manager, and Virtual Machine Manager provide tools for monitoring, software deployment, and VM management in a virtualized Windows environment.
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
This document discusses virtualization and attacks on virtual machine monitors (VMMs). It begins with an introduction to cloud computing and virtualization. Virtualization allows multiple operating systems to run concurrently on a single computer by abstracting physical resources. A VMM or hypervisor manages access to underlying physical resources for virtual machines. There are different types of virtualization including application, desktop, hardware, network, and storage virtualization. The document also discusses the two types of hypervisors - type 1 hypervisors install directly on hardware while type 2 hypervisors run on a host operating system. It concludes by noting that while virtualization improves efficiency, it can also introduce vulnerabilities that attackers may exploit.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
This document discusses enhancing an automation framework called vdNet Framework for testing virtual networking in VMware ESX. It first provides background on virtual networking concepts and components in VMware, including virtual switches, virtual network adapters, and network isolation. It then describes the vdNet Framework, how it is used to automate testing of virtual networking features using a master controller machine and test virtual machines. It also discusses how the framework utilizes the STAF automation framework to remotely execute tests on the system under test.
Virtualization allows a single computer to run multiple virtual machines simultaneously. This allows developers to easily create and restore test environments. It also enables demonstrators to maintain separate demo environments. Virtual machine snapshots can be easily saved and shared between computers, benefiting developers, demonstrators, and home users. However, virtualization performance declines as more virtual machines are run simultaneously on a single computer.
This document discusses virtual computing and virtual machines. It begins by defining virtual machines as isolated partitions within a computer that allow different operating systems to run simultaneously. Virtual machines prevent applications from interfering with each other and isolate crashes. The document then covers the history of virtual machines, how they function, advantages like consolidation and migration, risks, and characteristics of on-demand access and resource pooling. It provides examples of virtual machine monitors, paravirtualization, and deployment models like public and private clouds.
This document summarizes a research paper on desktop virtualization using Software as a Service (SaaS) architecture. It proposes a system called Yet Another Desktop Virtualization (YADV) that provides desktop virtualization more efficiently by optimizing network bandwidth usage and reducing application overhead at the client side. YADV uses the OpenStack cloud computing platform to virtualize desktop operating system instances in the data center and allow users to access applications and desktops through thin client devices. It customizes operating system disk images and implements application streaming to only deliver specific applications rather than the entire desktop interface to clients. Evaluation shows YADV provides better quality of service and more efficient resource allocation than traditional desktop virtualization methods.
Virtual desktops separate a user's workspace from the underlying hardware and operating system. There are several approaches to implementing virtual desktops, including hypervisors, paravirtualizers, and workspace virtualization engines (WVEs). Hypervisors sit close to the hardware and intercept privileged instructions, emulating them to provide isolation. Paravirtualizers also intercept privileged instructions but may require guest operating system modifications. WVEs intercept OS API calls to provide isolation while allowing full desktop functionality with little performance loss. Each approach balances isolation, functionality, and performance differently for virtual desktop deployments.
This document provides an overview of virtualization technologies including hardware, presentation, and application virtualization. It discusses Microsoft's virtualization products that implement these technologies like Virtual Server 2005, Virtual PC 2007, Windows Server 2008 Terminal Services, and SoftGrid Application Virtualization. It emphasizes that while virtualization provides benefits, a virtualized environment must be properly managed. Microsoft's System Center products like Operations Manager, Configuration Manager, and Virtual Machine Manager provide tools for monitoring, software deployment, and VM management in a virtualized Windows environment.
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
This document discusses virtualization and attacks on virtual machine monitors (VMMs). It begins with an introduction to cloud computing and virtualization. Virtualization allows multiple operating systems to run concurrently on a single computer by abstracting physical resources. A VMM or hypervisor manages access to underlying physical resources for virtual machines. There are different types of virtualization including application, desktop, hardware, network, and storage virtualization. The document also discusses the two types of hypervisors - type 1 hypervisors install directly on hardware while type 2 hypervisors run on a host operating system. It concludes by noting that while virtualization improves efficiency, it can also introduce vulnerabilities that attackers may exploit.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
This document discusses enhancing an automation framework called vdNet Framework for testing virtual networking in VMware ESX. It first provides background on virtual networking concepts and components in VMware, including virtual switches, virtual network adapters, and network isolation. It then describes the vdNet Framework, how it is used to automate testing of virtual networking features using a master controller machine and test virtual machines. It also discusses how the framework utilizes the STAF automation framework to remotely execute tests on the system under test.
Virtualization allows a single computer to run multiple virtual machines simultaneously. This allows developers to easily create and restore test environments. It also enables demonstrators to maintain separate demo environments. Virtual machine snapshots can be easily saved and shared between computers, benefiting developers, demonstrators, and home users. However, virtualization performance declines as more virtual machines are run simultaneously on a single computer.
This document discusses virtual computing and virtual machines. It begins by defining virtual machines as isolated partitions within a computer that allow different operating systems to run simultaneously. Virtual machines prevent applications from interfering with each other and isolate crashes. The document then covers the history of virtual machines, how they function, advantages like consolidation and migration, risks, and characteristics of on-demand access and resource pooling. It provides examples of virtual machine monitors, paravirtualization, and deployment models like public and private clouds.
This document summarizes a research paper on desktop virtualization using Software as a Service (SaaS) architecture. It proposes a system called Yet Another Desktop Virtualization (YADV) that provides desktop virtualization more efficiently by optimizing network bandwidth usage and reducing application overhead at the client side. YADV uses the OpenStack cloud computing platform to virtualize desktop operating system instances in the data center and allow users to access applications and desktops through thin client devices. It customizes operating system disk images and implements application streaming to only deliver specific applications rather than the entire desktop interface to clients. Evaluation shows YADV provides better quality of service and more efficient resource allocation than traditional desktop virtualization methods.
Virtual desktops separate a user's workspace from the underlying hardware and operating system. There are several approaches to implementing virtual desktops, including hypervisors, paravirtualizers, and workspace virtualization engines (WVEs). Hypervisors sit close to the hardware and intercept privileged instructions, emulating them to provide isolation. Paravirtualizers also intercept privileged instructions but may require guest operating system modifications. WVEs intercept OS API calls to provide isolation while allowing full desktop functionality with little performance loss. Each approach balances isolation, functionality, and performance differently for virtual desktop deployments.
System Center 2012 allows organizations to manage their private and public cloud resources from a single interface by integrating existing IT assets into a private cloud and complementing it with public cloud services. It enables businesses to deliver flexible infrastructure using their existing resources, gain insights into application performance to address issues proactively, and provide self-service access to infrastructure and applications across hybrid clouds.
1) Service providers are using Remote Desktop Gateway VDI solutions to provide a single access point for connecting to customer networks with different protocols. This allows for ease of administration and lower costs compared to managing multiple access methods.
2) The solution involves a VDI gateway that brokers connections to virtual desktops stored on virtualization hosts. These desktops have the ObserveIT agent installed to record all user sessions for auditing purposes.
3) Remote Desktop Gateway VDI provides more customization than traditional terminal services, including custom applications and isolated environments tailored to each customer's needs, but requires more complex setup and hardware resources.
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...247 Invest
This 8-page document discusses desktop virtualization using Smart Style Office as a virtual desktop infrastructure (VDI). It defines key concepts like desktop virtualization, VDI, and thin clients. It outlines advantages like lower costs, improved manageability and security. Use cases include remote administration, hosted desktops, desktop migration, and supporting a changing workforce. It then describes the Smart Style Office architecture and components and provides recommendations for configuration.
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetMicrosoft Private Cloud
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building
solutions—let Windows® Azure™ manage the infrastructure.
You may shudder at the thought, but modern enterprise
architecture is slowly but surely returning to the mainframe
fold, at least conceptually, and never more so than with the
idea of virtual desktops – hosted in ‘the cloud’. iStart reviews
the leading alternatives...
by Hayden McCall
http://www.istart.com.au
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft Private Cloud
Several forms of desktop virtualization can help organizations satisfy users’ needs for mobility and flexibility, while relieving pressure on information technology (IT) departments to manage cost, security, and compliance. Additionally, desktop virtualization can enable more dynamic centralized management by separating the elements of the traditional desktop computing stack. This white paper describes how to create a virtualization strategy that achieves these goals and introduces comprehensive desktop-irtualization solutions from Microsoft. Finally, it provides high-level guidance to help companies develop a desktop-virtualization strategy.
Citrix Synergy Barcelona 2012 Day Two Super SessionCitrix
This document discusses delivering flexible, high performance computing resources through scalable networks and compute. It describes how virtualization and centralized management can provide a consistent computing experience across different devices. Images containing operating systems, applications and user data can be streamed to end points from centralized repositories. This allows for multiple computing experiences in one device through virtual machines. The document also discusses how virtualization-aware services like antivirus and backup can provide added security and management capabilities in such an environment.
Symantec provides virtualization solutions for VMware including infrastructure software for data protection, high availability, storage management, security and compliance. Their solutions help customers standardize processes, automate IT operations, and improve service levels across physical and virtual environments. Symantec Backup Exec provides data protection for VMware environments with fast recovery of files and folders. NetBackup delivers backup and restore functionality in physical and virtual environments with granular recovery from a single backup. Symantec also offers solutions for endpoint protection, email security, software management, and storage management in virtualized environments.
Virtual Insight focuses on maximizing the value of IT infrastructure through virtualization technology. It works with business leaders to turn existing IT assets into greater business values by empowering adoption of server, storage, and desktop virtualization through consulting and professional services. Virtual Insight's experts have extensive industry experience and can provide solutions to optimize productivity and return on IT investments.
This paper discusses the barriers of desktop virtualization adoption in the enterprise, the need for convergence in desktop virtualization approaches and the unique requirements across different types of enterprise users. Finally, this paper reviews the RingCube vDesk solution, including how it works and how it’s Workspace Virtualization Engine (WVE) overcomes the barriers posed by legacy virtualization technologies.
Learn about the Smart Virtual Appliances Made Easy with IBM Image Construction and Composition Tool. The IBM Image Construction and Composition Tool can be used to construct custom virtual appliances that can be provisioned with several cloud deployment platforms. This IBM Redbooks Solution Guide introduces the IBM Image Construction and Composition Tool and provides an overview if its features, benefits, and architecture. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
VirtualStorm is a cloud-enabled virtual desktop infrastructure solution that utilizes several key DinamiQs technologies to optimize the virtualized Windows environment. These technologies include memory and disk enhancement drivers, centralized management tools, automated desktop deployment, and license management. VirtualStorm provides scalable, high performance virtual desktops that reduce total cost of ownership through extreme application virtualization and centralized management.
This document provides an overview and planning guidelines for using Citrix Personal vDisk technology with XenDesktop. Personal vDisks allow for greater personalization of virtual desktops while maintaining a centrally managed base image. Key points include:
- Personal vDisks separate user configurations and applications from the base image, providing personalization without requiring dedicated virtual desktops.
- Factors like desired personalization, application needs, and storage considerations should determine whether to use Personal vDisks.
- Personal vDisks are deployed at the machine level and then assigned to users, providing exclusive access to personalization data.
- Most applications are compatible but some device drivers or antivirus may not work if installed in
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
This document summarizes a research paper about security challenges for adopting virtual machine monitors (VMMs)/hypervisors to support effective e-governance. The paper aims to present different hypervisor threats that could lead a virtualized environment to collapse from a single point of failure (SPOF). It conducts a descriptive analysis of VMM attacks and vulnerabilities, categorizing five issues: intrusion, distributed denial of service attacks, non-control data attacks, hypervisor-based fault tolerance failures, and malware/rootkit attacks. The paper examines potential solutions to prevent SPOF issues and discusses challenges in implementing them for e-governance. The research contributes to studying solutions to effectively prevent SPOF in hypervisor-running
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes security vulnerabilities in the Xen hypervisor virtualization platform. It describes two attacks:
1) A denial of service attack where a malicious domain can pad a large file to its kernel image, consuming significant system resources during booting and preventing other domains from accessing resources.
2) An attack where an insider with dom0 privileges can use the "dump-core" command to take a memory snapshot of a target domain, allowing extraction of plaintext passwords and sensitive data from the domain's memory.
The document analyzes these issues and argues that Xen's architecture, with the dom0 control domain having elevated privileges, is the root cause of vulnerabilities. It suggests the privileges of dom0 should be reduced to
The document discusses modules 9 and 10 of a Microsoft Jump Start course on virtualization for VMware professionals. The modules cover virtual desktop infrastructure (VDI) architecture in two parts. They explain how VDI moves the operating system, applications, and data from the physical desktop to the data center, allowing users to access their desktops remotely through protocols like Remote Desktop.
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building solutions—let Windows® Azure™ manage the infrastructure.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document presents a new mesh analytical method for symbolic simulation of linear RLC circuits in the frequency domain. The method formulates the circuit equations as a set of mesh equations that account for both the steady-state impedances of the circuit elements as well as the initialization effects of non-zero initial conditions in the capacitors and inductors. It derives the mesh equations for a simple three-node, three-mesh example circuit and shows that the circuit equations can be expressed in matrix form with impedance matrices representing the steady-state and initialization impedances. The method aims to provide a simple yet robust way to simulate transient responses of linear circuits symbolically in the frequency domain.
This document summarizes an academic paper that proposes optimizing elliptic curve cryptography (ECC) through application-specific instruction set processor (ASIP) design. It applies pipelining techniques to the data path and uses complex instructions to reduce latency and the number of instructions needed for point multiplication. The paper describes applying different levels of pipelining to explore performance and find an optimal pipeline depth. It also develops a new combined algorithm to perform point doubling and addition using the specialized instructions. An FPGA implementation over GF(2163) is presented and shown to outperform previous work.
System Center 2012 allows organizations to manage their private and public cloud resources from a single interface by integrating existing IT assets into a private cloud and complementing it with public cloud services. It enables businesses to deliver flexible infrastructure using their existing resources, gain insights into application performance to address issues proactively, and provide self-service access to infrastructure and applications across hybrid clouds.
1) Service providers are using Remote Desktop Gateway VDI solutions to provide a single access point for connecting to customer networks with different protocols. This allows for ease of administration and lower costs compared to managing multiple access methods.
2) The solution involves a VDI gateway that brokers connections to virtual desktops stored on virtualization hosts. These desktops have the ObserveIT agent installed to record all user sessions for auditing purposes.
3) Remote Desktop Gateway VDI provides more customization than traditional terminal services, including custom applications and isolated environments tailored to each customer's needs, but requires more complex setup and hardware resources.
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...247 Invest
This 8-page document discusses desktop virtualization using Smart Style Office as a virtual desktop infrastructure (VDI). It defines key concepts like desktop virtualization, VDI, and thin clients. It outlines advantages like lower costs, improved manageability and security. Use cases include remote administration, hosted desktops, desktop migration, and supporting a changing workforce. It then describes the Smart Style Office architecture and components and provides recommendations for configuration.
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetMicrosoft Private Cloud
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building
solutions—let Windows® Azure™ manage the infrastructure.
You may shudder at the thought, but modern enterprise
architecture is slowly but surely returning to the mainframe
fold, at least conceptually, and never more so than with the
idea of virtual desktops – hosted in ‘the cloud’. iStart reviews
the leading alternatives...
by Hayden McCall
http://www.istart.com.au
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft Private Cloud
Several forms of desktop virtualization can help organizations satisfy users’ needs for mobility and flexibility, while relieving pressure on information technology (IT) departments to manage cost, security, and compliance. Additionally, desktop virtualization can enable more dynamic centralized management by separating the elements of the traditional desktop computing stack. This white paper describes how to create a virtualization strategy that achieves these goals and introduces comprehensive desktop-irtualization solutions from Microsoft. Finally, it provides high-level guidance to help companies develop a desktop-virtualization strategy.
Citrix Synergy Barcelona 2012 Day Two Super SessionCitrix
This document discusses delivering flexible, high performance computing resources through scalable networks and compute. It describes how virtualization and centralized management can provide a consistent computing experience across different devices. Images containing operating systems, applications and user data can be streamed to end points from centralized repositories. This allows for multiple computing experiences in one device through virtual machines. The document also discusses how virtualization-aware services like antivirus and backup can provide added security and management capabilities in such an environment.
Symantec provides virtualization solutions for VMware including infrastructure software for data protection, high availability, storage management, security and compliance. Their solutions help customers standardize processes, automate IT operations, and improve service levels across physical and virtual environments. Symantec Backup Exec provides data protection for VMware environments with fast recovery of files and folders. NetBackup delivers backup and restore functionality in physical and virtual environments with granular recovery from a single backup. Symantec also offers solutions for endpoint protection, email security, software management, and storage management in virtualized environments.
Virtual Insight focuses on maximizing the value of IT infrastructure through virtualization technology. It works with business leaders to turn existing IT assets into greater business values by empowering adoption of server, storage, and desktop virtualization through consulting and professional services. Virtual Insight's experts have extensive industry experience and can provide solutions to optimize productivity and return on IT investments.
This paper discusses the barriers of desktop virtualization adoption in the enterprise, the need for convergence in desktop virtualization approaches and the unique requirements across different types of enterprise users. Finally, this paper reviews the RingCube vDesk solution, including how it works and how it’s Workspace Virtualization Engine (WVE) overcomes the barriers posed by legacy virtualization technologies.
Learn about the Smart Virtual Appliances Made Easy with IBM Image Construction and Composition Tool. The IBM Image Construction and Composition Tool can be used to construct custom virtual appliances that can be provisioned with several cloud deployment platforms. This IBM Redbooks Solution Guide introduces the IBM Image Construction and Composition Tool and provides an overview if its features, benefits, and architecture. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
VirtualStorm is a cloud-enabled virtual desktop infrastructure solution that utilizes several key DinamiQs technologies to optimize the virtualized Windows environment. These technologies include memory and disk enhancement drivers, centralized management tools, automated desktop deployment, and license management. VirtualStorm provides scalable, high performance virtual desktops that reduce total cost of ownership through extreme application virtualization and centralized management.
This document provides an overview and planning guidelines for using Citrix Personal vDisk technology with XenDesktop. Personal vDisks allow for greater personalization of virtual desktops while maintaining a centrally managed base image. Key points include:
- Personal vDisks separate user configurations and applications from the base image, providing personalization without requiring dedicated virtual desktops.
- Factors like desired personalization, application needs, and storage considerations should determine whether to use Personal vDisks.
- Personal vDisks are deployed at the machine level and then assigned to users, providing exclusive access to personalization data.
- Most applications are compatible but some device drivers or antivirus may not work if installed in
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
This document summarizes a research paper about security challenges for adopting virtual machine monitors (VMMs)/hypervisors to support effective e-governance. The paper aims to present different hypervisor threats that could lead a virtualized environment to collapse from a single point of failure (SPOF). It conducts a descriptive analysis of VMM attacks and vulnerabilities, categorizing five issues: intrusion, distributed denial of service attacks, non-control data attacks, hypervisor-based fault tolerance failures, and malware/rootkit attacks. The paper examines potential solutions to prevent SPOF issues and discusses challenges in implementing them for e-governance. The research contributes to studying solutions to effectively prevent SPOF in hypervisor-running
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes security vulnerabilities in the Xen hypervisor virtualization platform. It describes two attacks:
1) A denial of service attack where a malicious domain can pad a large file to its kernel image, consuming significant system resources during booting and preventing other domains from accessing resources.
2) An attack where an insider with dom0 privileges can use the "dump-core" command to take a memory snapshot of a target domain, allowing extraction of plaintext passwords and sensitive data from the domain's memory.
The document analyzes these issues and argues that Xen's architecture, with the dom0 control domain having elevated privileges, is the root cause of vulnerabilities. It suggests the privileges of dom0 should be reduced to
The document discusses modules 9 and 10 of a Microsoft Jump Start course on virtualization for VMware professionals. The modules cover virtual desktop infrastructure (VDI) architecture in two parts. They explain how VDI moves the operating system, applications, and data from the physical desktop to the data center, allowing users to access their desktops remotely through protocols like Remote Desktop.
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building solutions—let Windows® Azure™ manage the infrastructure.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document presents a new mesh analytical method for symbolic simulation of linear RLC circuits in the frequency domain. The method formulates the circuit equations as a set of mesh equations that account for both the steady-state impedances of the circuit elements as well as the initialization effects of non-zero initial conditions in the capacitors and inductors. It derives the mesh equations for a simple three-node, three-mesh example circuit and shows that the circuit equations can be expressed in matrix form with impedance matrices representing the steady-state and initialization impedances. The method aims to provide a simple yet robust way to simulate transient responses of linear circuits symbolically in the frequency domain.
This document summarizes an academic paper that proposes optimizing elliptic curve cryptography (ECC) through application-specific instruction set processor (ASIP) design. It applies pipelining techniques to the data path and uses complex instructions to reduce latency and the number of instructions needed for point multiplication. The paper describes applying different levels of pipelining to explore performance and find an optimal pipeline depth. It also develops a new combined algorithm to perform point doubling and addition using the specialized instructions. An FPGA implementation over GF(2163) is presented and shown to outperform previous work.
This document summarizes a research paper that proposes a Modified Ultra Smart Counter Based Broadcast (MUSCBA) algorithm for mobile ad hoc networks (MANETs). The algorithm dynamically adjusts the counter-based broadcast threshold based on locally available neighborhood information, without requiring location devices. It improves on previous fixed counter-based approaches. Simulation results show the minimum and maximum number of neighbors observed for nodes in different network configurations and densities. The algorithm aims to reduce redundant broadcasts while maintaining high propagation, using only neighborhood data from periodic "Hello" packet exchanges.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes the performance measurements taken on a 40-channel 10G DWDM system operated by Bharath Sanchar Nigam Limited in India. The key findings were:
1. Optical power levels were measured for each channel at different points in the system. Some channels showed power levels indicating a fault in the respective fiber cable.
2. Parameters like noise figure, gain, polarization mode dispersion and dispersion were analyzed to identify limitations and suggest improvements to optimize the system.
3. Nonlinear impairments like four-wave mixing, self-phase modulation and stimulated Raman/Brillouin scattering were also evaluated to determine their impact based on number of channels, channel power, and fiber properties
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
This document summarizes a research paper that presents an area efficient 128-point Fast Fourier Transform (FFT) processor using a mixed radix 4-2 computation for OFDM applications. The processor uses a cached-memory architecture with two single-port SRAMs to increase FFT execution time. It was designed using a 0.35um CMOS process and integrates 552,000 transistors within an area of 2.8x2.8mm2. The processor can perform a 128-point, 36-bit FFT in 23.2us for 1D and 23.8ms for 2D FFT at 133MHz clock speed.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document presents a method for classifying gender from human gait using silhouette images. The silhouette is divided into two regions, and features like moments and ellipse parameters are extracted from each region. These features are used to form a feature vector for each frame. Mean and standard deviation features are then calculated across frames. Different classifiers like K-Nearest Neighbor and Support Vector Machine are tested on the CASIA gait dataset, with SVM found to perform better, achieving a 93.33% recognition rate using linear kernels.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This study examines the use of ethanol-kerosene fuel blends in kerosene wick stoves as a more sustainable alternative fuel. Various blends of 5%, 10%, 15%, and 20% ethanol in kerosene by volume were tested in an unmodified stove and compared to pure kerosene. The thermal efficiency and fuel consumption rate were evaluated using a standard water boiling test. The maximum thermal efficiency was obtained with a 5% ethanol blend, while the minimum was with pure kerosene. The 10% ethanol blend had the highest fuel consumption rate. Overall, the performance of the blended fuels was found to be comparable to kerosene, indicating their potential as a renewable and less polluting alternative for cooking
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes key aspects of recommender systems and ranking techniques. It discusses how recommender systems typically focus on accuracy but overlook diversity. The paper explores various recommendation techniques, including content-based, collaborative filtering, knowledge-based, and hybrid approaches. It also examines different ranking methods that can increase aggregate diversity, such as popularity-based, reverse predicted rating, and parameterized ranking. The goal is to improve recommendation diversity while maintaining adequate accuracy.
O documento apresenta os resultados operacionais e financeiros da TPI no 1T12. Destaca-se o crescimento de 21,7% na receita líquida e de 22,2% no EBITDA ajustado. O lucro líquido atingiu R$15 milhões e o lucro base de dividendos foi de R$31,9 milhões. Detalha também investimentos realizados e endividamento da companhia.
El documento proporciona instrucciones para buscar una dirección específica en Google Maps y copiar el código HTML para insertar un mapa de esa ubicación en una página web. Se explica cómo buscar la dirección en Google Maps usando el mouse o teclado, identificar la ubicación correcta teniendo en cuenta que la información de Google Maps puede no ser exacta, y copiar el segundo conjunto de códigos marcado como "HTML para insertar en el sitio web".
O documento discute a importância da água para a vida, descrevendo suas propriedades químicas e físicas que a tornam essencial para os seres vivos, como sua capacidade de dissolução, coesão, adesão e calor específico. Também menciona a presença de sais minerais e vitaminas nos organismos e suas funções.
El documento habla sobre el lanzamiento del nuevo Chevrolet Camaro en 2009. Se presentó primero en Estados Unidos en 2009 y luego en Europa un año después, y venía en modelos LS, LT y SS. Tenía un diseño retro con 10 colores disponibles y ventanas sin marco, con motor delantero y tracción trasera. El motor incluía un V6 de 3.6 litros para los modelos LS y LT con 300 caballos de fuerza, y un V8 de 6.2 litros para el modelo SS con 422 caballos de fuerza.
Virtualization is a new method regarding using computing resources efficiently, by maximizing energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of work done by the software can merge some real physical systems into a single virtual form commonly known as virtualization without prejudice advantages over the single system. Of course, this system can reduce the amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware, thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application Virtualization, Storage Virtualization, Virtualization and Thin Client Platform.
Virtualization: Force driving cloud computingMayank Aggarwal
Virtualization allows a single physical machine to run multiple virtual machines, making hardware resources available to multiple virtual operating systems. This is done through a hypervisor or virtual machine monitor that allocates physical resources to virtual machines. Virtualization provides benefits like reduced costs, increased hardware utilization, and isolation of environments while sharing resources. The main types of virtualization are execution level (using a hypervisor), operating system level (through time-sharing), programming level (through virtual machines like Java), application level, storage, and network.
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
This document discusses using virtualization to optimize resource utilization and reduce costs. It introduces virtualization and describes how virtual machines allow multiple environments to run isolated on the same physical machine. Virtualization can reduce hardware costs by converting physical servers into logical resources that are allocated as needed. The document then presents an experimental study comparing the hardware costs of configuring different servers physically versus virtualizing them on a single system using Oracle VM VirtualBox. The results show virtualization significantly reduced costs by consolidating multiple servers onto one physical machine.
Virtualization allows organizations to reduce hardware costs and improve efficiency by running multiple virtual machines on a single physical server. This allows applications to be isolated from one another while sharing common resources. Virtualization provides benefits like faster deployment times, reduced maintenance costs, increased availability, and better performance. While virtualization introduces dependencies on vendors, it provides clear returns on investment for testing environments through lower costs and faster setup times.
The document discusses different types of virtualization including hardware, presentation, and application virtualization. It then summarizes Microsoft's products that provide these virtualization capabilities, including Hyper-V for hardware virtualization, Windows Terminal Services for presentation virtualization, and App-V for application virtualization. It also discusses Microsoft management products that can manage both physical and virtual machines like System Center Operations Manager, Configuration Manager, and Virtual Machine Manager.
International Conference on Advances in Computing, Communicati.docxvrickens
This document discusses virtualization in cloud computing. It begins with an abstract that introduces cloud computing and virtualization and how organizations are implementing these technologies to reduce costs. The document then discusses how virtualization is the basis for delivering infrastructure as a service in cloud computing by separating hardware constraints. It provides examples of major cloud computing service providers like Google, Amazon, and Microsoft and compares their various services. Finally, it discusses techniques for virtual machine placement in data centers and some examples of virtual labs.
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on the potential advantages associated with virtualization and the use of virtual machines for scenarios, which cannot be easily implemented and/or studied in a traditional academic network environment, but need to be explored and experimented by students to meet the raising needs and knowledge-base demanded by the IT industry. In this context, we discuss various aspects of virtualization – starting from the working principle of virtual machines, installation procedure for a virtual guest operating system on a physical host operating system, virtualization options and a performance study measuring the throughput obtained on a network of virtual machines and physical host machines. In addition, the paper extensively evaluates the
use of virtual machines and virtual networks in an academic environment and also specifically discusses sample projects on network security, which may not be feasible enough to be conducted in a physical network of personal computers; but could be conducted only using virtual machines.
Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost. The essential component in a virtual design is called hypervisor, having extra-privileges, which makes it able to play major role of dealing the input of data and funds. This hypervisor has many advantages regarding the cost, the simplicity of performance, the availability. But in the other hand, the major character played by this group makes it the faultless target for mean users targeting to attack the near system. Arun Prasath. M | Mrs. T. Sathiyabama "Virtualization in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18665.pdf
Virtualization is a technique that allows for the creation of virtual versions of computing resources like operating systems, servers, storage devices, and networks. It plays a vital role in cloud computing by allowing for these resources to be shared on a single physical machine. Cloud computing refers to storing and accessing data over the internet and is cost effective as it eliminates the need for organizations to maintain their own on-site server infrastructure. Popular cloud computing services include SaaS, PaaS, and IaaS provided by companies like Amazon, Google, and Microsoft. Virtualization enables advantages like running legacy applications securely in isolated environments, simulating hardware and networks, and making systems backups and recovery easier.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Virtual appliance creation and optimization in cloudeSAT Journals
Abstract The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of the underlying IaaS systems. IaaS is the virtual delivery of computing resources in the form of hardware, networking, and storage services This concept will reduce the variance in deployment time by introducing the concept of online active repositories and appliance optimization. To provide efficient delivery time in IaaS and to increase the efficiency of IaaS (Infra structure as a service) system To calculate the delivery time when deployed it in the virtualized platform Combining the both online and manual repositories for calculating the delivery time To construct the appliance in online using various online repositories The constructed appliance is deployed in the virtualized platform (using virtual box). And the appliance is optimized for increasing the efficiency and decreasing the delivery time. The delivery time of the online appliance is compared with the appliance which has been created manually. Keywords- Cloud Computing, Virtualization, Virtual Appliance.
The Pros and Cons of Desktop VirtualizationHTS Hosting
The process of virtualization enables the creation of virtual forms of servers, applications, networks and storage. The four main types of virtualization are network virtualization, storage virtualization, application virtualization and desktop virtualization.
Virtualization 101 presents a history of virtualization and defines key concepts. It describes how virtual machines isolate operating systems and applications from each other and the physical hardware. Benefits include ease of deployment, mobility, backup/recovery, and hardware independence. Server virtualization partitions physical servers, while desktop virtualization hosts desktops centrally. Application virtualization protects operating systems from application changes. Major virtualization vendors include Citrix, Microsoft, and VMWare.
Virtualization uses software to divide the hardware resources of a single computer into multiple virtual machines, each capable of running its own operating system. This allows more efficient use of physical resources and greater flexibility. Key benefits include improved resource utilization, easier management of operating systems and applications, reduced downtime, faster provisioning of resources, and lower costs. Virtualization is a core technology enabling cloud computing.
Virtualization is a technology that allows multiple operating systems and applications to run on a single physical machine simultaneously. It provides a layer of abstraction between the physical hardware and the applications running on top of it. The document discusses concepts of virtualization like partitioning, full virtualization, paravirtualization, and VMware's product portfolio for data center, desktop, and mobile virtualization.
Virtualization plays a vital role in cloud computing by allowing for the efficient sharing of hardware resources. It involves the creation of virtual instances of operating systems, servers, storage, and networks. A hypervisor manages these virtual machines and allows multiple instances to run simultaneously on a single physical machine. Virtualization provides benefits like cost effectiveness, flexibility, and isolation of applications and operating systems. It is a key technology enabling cloud computing services like Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
The document provides an overview of cloud computing and virtualization. It discusses how virtual machines (VMs) allow multiple operating systems to run simultaneously on a single physical machine. VMs provide flexibility and efficiency for distributing compute resources. Cloud providers offer VMs that can run software applications, back up data, isolate browser activity, and host services in a scalable and cost-effective manner. Virtualization technologies like VMware, Citrix, and Microsoft enable various types of virtualization including server, desktop, application, memory, storage, and network virtualization.
Virtualization using VMWare Workstation and Cloud ComputingHitesh Gupta
This document provides an overview of virtualization software VMware. It begins with a certificate of originality and acknowledgements. It then discusses getting started with virtualization, including an introduction and the different types of virtualization like server, desktop, storage, operating system, network, and hardware virtualization. It discusses virtualization applications and terminology. The document then focuses on VMware, including its free products like VMware Player, Server, and Workstation. It provides details on implementing VMware Server, including pros and cons. It also discusses VMware Workstation, including benefits, system requirements, files created, networking modes, and how to install, create VMs, install VMware tools, and use virtual machines. It concludes
Virtualization using VMWare Workstation and Cloud Computing
Dz25764770
1. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
Survey Paper On Different Virtualization TechnologyWith Its
Merits And Demerits On Organization
Mr. Milind Ramesh Kolte
M.Sc. Computer Application (Semester –III)
Shree Ramkrishna Instituteof Computer Education
& Applied Sciences, Surat-395009.Gujarat, India.
Abstract
A Virtualized System includes a new layer The application is installed and runs directly on the
of software, the virtual machine monitor. The OS, which in turn runs directly on the computer’s
VMM's principal role is to arbitrate accesses to hardware. The application’s user interface is
the underlying physical host platform's resources presented via a display that’s directly attached to this
so that multiple operating systems (which are machine. This simple scenario is familiar to anybody
guests of the Virtual Machine Monitor) can share who’s ever used Windows.
them. The VMM presents to each guest OS a set of
virtual platform interfaces that constitute a virtual
machine (VM). Once confined to specialized,
proprietary, high-end server and mainframe
systems, virtualization is now becoming more
broadly available and is supported in off-the-shelf
systems based on Intel architecture (IA)
hardware. Virtualization technology provides
hardware support for processor virtualization, Operating
enabling simplifications of virtual machine
monitor software. Resulting VMMs can support a
System
Hardware
wider range of legacy and future operating
systems while maintaining high performance.
Keywords – Virtualization, VMM, Intel Physical Machine Application
Architecture, legacy OS
Figure – 1: A System without virtualization
I. INTRODUCTION
Virtualization is one of the hottest trends in But it’s not the only choice. In fact, it’s often
information technology today. This is no accident. not the best choice. Rather than locking these various
While a variety of technologies fall under the parts together—the operating system to the hardware,
virtualization umbrella, all of them are changing the the application to the operating system, and the user
IT world in significant ways. interface to the local machine—it’s possible to loosen
Virtualization is software technology which the direct reliance these parts have on each other.
uses a physical resource such as a server and divides it Doing this means virtualizing aspects of this
up into virtual resources called virtual machines environment, something that can be done in various
(VM's). Virtualization allows users to consolidate ways. The operating system can be decoupled from
physical resources, simplify deployment and the physical hardware it runs on using hardware
administration, and reduce power and cooling virtualization, for example, while application
requirements. While virtualization technology is most virtualization allows an analogous decoupling
popular in the server world, virtualization technology between the operating system and the applications
is also being used in data storage such as Storage Area that use it. Similarly, presentation virtualization
Networks, and inside of operating systems such as allows separating an application’s user interface from
Hyper-V (Hypervisor). the physical machine the application runs on. All of
these approaches to virtualization help make the links
II. UNDERSTANDING VERTUALIZATION between components less rigid. This lets hardware
To understand modern virtualization and software be used in more diverse ways, and it
technologies, think first about a system without them. also makes both easier to change. Given that most IT
Imagine, for example, an application such as professionals spend most of their time working with
Microsoft Word running on a standalone desktop what’s already installed rather than rolling out new
computer. deployments, making their world more malleable is a
good thing.
764 | P a g e
2. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
Each type of virtualization also brings other benefits Hardware virtualization can be accomplished in
specific to the problem it addresses. Understanding various ways, and so Microsoft offers several different
what these are requires knowing more about the technologies that address this area.
technologies themselves. Accordingly, the next They include the following:
sections take a closer look at each one. 1.) Hyper-V (Windows Server 2008)
2.) Virtual Desktop Infrastructure (VDI)
III. VIRTUALIZATION TECHNOLOGIES 3.) Virtual PC 2007
A. Hardware Virtualization 4.) MS Enterprise Desktop Virtualization
For most IT people today, the word (MED-V)
―virtualization‖ conjures up thoughts of running
multiple operating systems on a single physical B. Presentation Virtualization
machine. This is hardware virtualization, and while Much of the software people use most is
it’s not the only important kind of virtualization, it is designed to both run and present its user interface on
unquestionably the most visible today. the same machine. The applications in Microsoft
The core idea of hardware virtualization is Office are one common example, but there are plenty
simple: Use software to create a virtual machine (VM) of others. While accepting this default is fine much of
that emulates a physical computer. By providing the time, it’s not without some downside. For
multiple VMs at once, this approach allows running example, organizations that manage many desktop
several operating systems simultaneously on a single machines must make sure that any sensitive data on
physical machine. those desktops is kept secure. They’re also obliged to
spend significant amounts of time and money
managing the applications resident on those
machines. Letting an application execute on a remote
server, yet display its user interface locally
Operating Operating Presentation virtualization can help.
System 1 System 2 ..
Hardware Virtualization
.
Hardware
Presentation
Applicatio Virtualization
Physical Machine
n
Virtual Machine
Operating System
Figure – 2: Hardware virtualization
Hardware
When used on client machines, this approach
is often called desktop virtualization, while using it on Figure – 3: Presentationvirtualization
server systems is known as server virtualization. This approach allows creating virtual
Desktop virtualization can be useful in a variety of sessions, each interacting with a remote desktop
situations. One of the most common is to deal with system. The applications executing in those sessions
incompatibility between applications and desktop rely on presentation virtualization to project their user
operating systems. For example, suppose a user interfaces remotely. Each session might run only a
running Windows Vista needs to use an application single application, or it might present its user with a
that runs only on Windows XP with Service Pack 2. complete desktop offering multiple applications. In
By creating a VM that runs this older operating either case, several virtual sessions can use the same
system, then installing the application in that VM, this installed copy of an application.
problem can be solved. Running applications on a shared server like
Server virtualization also makes restoring this offers several benefits, including the following:
failed systems easier. VMs are stored as files, and so 1.) Data can be centralized.
restoring a failed system can be as simple as copying 2.) The cost of managing applications can
its file onto a new machine. Since VMs can have be significantly reduced.
different hardware configurations from the physical 3.) Organizations need no longer worry
machine on which they’re running, this approach also about incompatibilities between an
allows restoring a failed system onto any available application and a desktop operating
machine. There’s no requirement to use a physically system.
identical system. 4.) Presentation virtualization can improve
performance.
765 | P a g e
3. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
Microsoft’s presentation virtualization technology is
Windows Terminal Services. First released for Application Logic
Windows NT 4, it’s now a standard part of Windows
Application Virtualization
Server 2008. Terminal Services lets an ordinary
Windows desktop application run on a shared server
machine yet present its user interface on a remote
system, such as a desktop computer or thin client.
While remote interfaces haven’t always been viewed
through the lens of virtualization, this perspective can Operating System
provide a useful way to think about this widely used
technology. Hardware
C. Application Virtualization
Virtualization provides an abstracted view of Figure – 4: Applicationvirtualization
some computing resource. Rather than run directly on Application virtualization makes deployment
a physical computer, for example, hardware significantly easier. Since applications no longer
virtualization lets an operating system run on a compete for DLL versions or other shared aspects of
software abstraction of a machine. Similarly, their environment, there’s no need to test new
presentation virtualization lets an application’s user applications for conflicts with existing applications
interface be abstracted to a remote device. In both before they’re rolled out. And as Figure 4 suggests,
cases, virtualization loosens an otherwise tight bond these virtual applications can run alongside ordinary
between components. applications—not everything needs to be virtualized.
Another bond that can benefit from more
abstraction is the connection between an application D. Other VirtualizationTechnology
and the operating system it runs on. Every application This overview looks at three kinds of
depends on its operating system for a range of virtualization: hardware, presentation, and application.
services, including memory allocation, device drivers, Similar kinds of abstraction are also used in other
and much more. Incompatibilities between an contexts, however. Among the most important are,
application and its operating system can be addressed 1.) Memory Virtualization
by either hardware virtualization or presentation The term memory virtualization decouples
virtualization, as described earlier. But what about volatile random access memory (RAM) resources
incompatibilities between two applications installed from individual systems in the data center, and
on the same instance of an operating system? then aggregates those resources into a virtualized
Applications commonly share various things with memory pool available to any computer in the
other applications on their system, yet this sharing can cluster. The memory pool is accessed by the
be problematic. For example, one application might operating system or applications running on top
require a specific version of a dynamic link library of the operating system. The distributed memory
(DLL) to function, while another application on that pool can then be utilized as a high-speed cache, a
system might require a different version of the same messaging layer, or a large, shared memory
DLL. Installing both applications leads to what’s resource for a CPU or a GPU application.
commonly known as DLL hell, where one of them Memory virtualization allows networked, and
overwrites the version required by the other. To avoid therefore distributed, servers to share a pool of
this, organizations often perform extensive testing memory to overcome physical memory
before installing a new application, an approach that’s limitations, a common bottleneck in software
workable but time-consuming and expensive. performance.
Application virtualization solves this 2.) Network Virtualization
problem by creating application-specific copies of all The term network virtualization is used to
shared resources, as Figure 4 illustrates. The describe a number of different things. Perhaps
problematic things an application might share with the most common is the idea of a virtual private
other applications on its system—registry entries, network (VPN). VPNs abstract the notion of a
specific DLLs, and more—are instead packaged with network connection, allowing a remote user to
it, creating a virtual application. When a virtual access an organization’s internal network just as
application is deployed, it uses its own copy of these if she were physically attached to that network.
shared resources. VPNs are a widely implemented idea, and they
can use various technologies. In the Microsoft
world, the primary VPN technologies today are
Internet Security and Acceleration (ISA) Server
2006 and Internet Application Gateway 2007.
766 | P a g e
4. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
3.) Storage Virtualization
The term storage virtualization is also used quite Development and Testing Environments :-
broadly. In a general sense, it means providing a By usingvirtualization, a developer or tester
logical, abstracted view of physical storage can replicate a distributed environment containing
devices, and so anything other than a locally several systems on a single piece of hardware. This
attached disk drive might be viewed in this light. negates having a bunch of servers sitting around for
A simple example is folder redirection in the occasional use of developers or testers.
Windows, which lets the information in a folder Virtualization is also useful in test and development
be stored on any network-accessible drive. Much environments in another way. One of the side effects
more powerful (and more complex) approaches of exercising software is that early versions often
also fit into this category, including storage area crash and damage not only the application, but also
networks (SANs) and others. However it’s done, the underlying operating system as well as other
the benefits of storage virtualization are applications in the software stack. To recover, it’s
analogous to those of every other kind of necessary to reinstall all the software. Again, this is
virtualization: more abstraction and less direct areal drag on productivity.
coupling between components.
Quality of Service :-
4.) Database Virtualization IT organizations must focus on the quality
Database virtualization is the decoupling of the of service they deliver — how well they keep
database layer, which lies between the storage software infrastructures available and performing
and application layers within the application well.
stack. Virtualization at the database layer allows Fortunately, virtualization, when properly
hardware resources to be extended to allow for managed, can help improve quality of service because
better sharing resources between applications and it removes hardware dependence. By virtualizing
users, masking of the physical location and systems, it is possible to quickly respond to failures
configuration of a database from querying of all types: hardware, network, even virtualization
programs, as well as enable more scalable software itself. It can also be used to pre-emptively
computing. avoid failure by moving workloads off a system that
A. Virtual Data Partitioning is showing signs of problems (memory, disk, and so
B. Horizontal Data Partitioning on).
Given the demands on IT organizations to
Advantages :- continuously improve their operations in order to
C. Added flexibility and agility for existing achieve business goals, it’s incumbent upon them to
computing infrastructure. explore how virtualization can help improve quality
D. Enhanced database performance. of service.
E. Pooling and sharing computing resources. Companies run many applications that they
F. Simplification of administration and consider mission critical, which is a fancy term
management. meaning that the company relies on these applications
G. Increased fault tolerance. for a fundamental part of their business.
IV. UNDERSTANDING VIRTUALIZATION USE CASES Simple Failover :-
Virtualization is useful in a number of The hypervisor (Hyper – V) is constantly
scenarios. They range from simple and monitoring each virtual machine’s status, so it’s
straightforward to complex and transformational. relatively straightforward to configure it to start a
Understanding how you want to use virtualization is new instance of a virtual machine should it notice a
critical; because that will dictate which virtualization previously running virtual machine is no longer
solution is most appropriate for you. This chapter present. Because all the hypervisor has to do is start a
goes over some of the main uses of virtualization. new virtual machine based on the VM’s image, the
outage duration of a virtual machine may be mere
Server Consolidation :- seconds. Obviously, this is a huge improvement over
The first application of virtualization is the minutes to days durations typical of non-
usually server consolidation. In fact, server virtualized system restores.
consolidation is what most people think of when they
consider virtualization. Server consolidation refers to High Availability :-
taking separate server instances and migrating them High availability (HA) extends the concept
into virtual machines running on a single server. To of simple failover to incorporate an additional
be technically correct, consolidation is also the act of hardware server. Instead of crashed virtual machine
taking a number of separate servers and migrating being started on the same piece of hardware, it is
them onto fewer servers, with multiple virtual started on a different server, thereby avoiding the
machines running on each server.
767 | P a g e
5. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
problem of a hardware-precluding virtualization Again, efficiency in operation is vital for
failover. replication — just because the data is being moved to
HA provides an extra layer of failover storage location doesn’t mean that keeping the data
protection at the cost of additional virtualization flowing efficiently isn’t important.
software complexity Smart replication software keeps up-to-the-
minute changes flowing to the central location,
Clustering :- thereby ensuring that an IT organization can quickly
Clustering is designed to ensure that no data locate data assets and use them to rebuild a failed
is lost in the event of a software or hardware failure. system.
Clustering has typically been offered by application
vendors as an add-on to their base product, with some V. RETHINKINGVIRTUALIZATION IN BUSINESS
attendant drawbacks like extra expense, redundant TERMS
solutions, and infrastructure complexity. [ INTEL VERTUALIZATION TECHNOLOGY BRIEF ]
Part of the extra expense reflects the fact Realizing the general value of the virtualized
that you need extra hardware standing by, with the operating model, Intel addressed virtualization at
mirrored system on standby, ready to take over the foundation - the chip level - where they could
should the primary system fail. You don’t need to be simultaneously eliminate the need for
a genius to recognize that buying a second set of modifications to the hosted operating systems
hardware makes clustering significantly more and provide better performance. The resulting
expensive. However, if you’ve got millions of U.S. Intel® Virtualization Technology (Intel® VT)
dollars’ worth of transactions occurring on your not only provides a consistent approach, but also
system, keeping a redundant server ready may be a opens the door for wider use of virtualization
worthwhile investment. And techniques exist that can concepts such as Real-Time System.
allow you to run other work on the stand-by server In simple terms, Intel VT adds new instructions,
until it is needed. registers and interrupts management that can be
used by VMM software to manage virtual
Data Mirroring :- environments. These new capabilities can be
All of the qualities of service mechanisms used to create a VMM that requires no changes
we’ve discussed thus far address how to keep virtual to the hosted operating systems. Consequently,
machines up and running. But what about data? After legacy systems are well supported and the VMM
all, applications inside virtual machines are useless is not dependent on operating system version,
without data — so clearly it’s important to ensure update or patches.
data availability as part of an overall quality of End users begin to realize the benefits from Intel
service strategy. VT after the suppliers of virtualization software
One way of keeping data available is to modify their products to use the new capabilities.
mirror it. As the name implies, mirroring data means Intel has involved the virtualization community
that data in one place is reflected to another, ensuring in the specification and development
that they are exact copies of oneanother. Process and work is underway to utilize Intel VT
Mirroring enables real-time consistency in commercial products. For example, Microsoft
between two data stores. This makes it possible to has committed to ongoing support of Intel VT in
immediately shift between one system and another by Windows Servers, and the open source VMM,
attaching the second system to the mirrored data. Xen 3.0, supports Intel VT.
Mirroring achieves this real-time Intel VT becomes especially attractive when
consistency by feeding a constant stream of data considered in concert with Intel's Dual-Core
changes — whether additions, updates, or deletions technology to provide enhanced performance and
— from one location to another. concurrency of multiple environments to enhance
real-time capabilities. Further advances such as
Data Replication :- Quad-Core will provide additional capabilities.
Data replication is a second service oriented
toward improving data quality of service. Unlike The Hardware Virtualization Advantage:-
mirroring, which focuses on keeping copies of data Intel Virtualization Technology provides silicon
consistent in real-time, replication addresses the need based functionality that works together with
to keep complete copies of data available so that they compatible VMM software to improve upon
can be used for system rebuild purposes. software-only solutions. Because this
Replicationis typically accomplished by virtualization hardware provides a new
sending copies of data to a centralized storage architecture upon which the operating system
location, enabling an organization to be certain that it runs directly, it removes the binary translation.
has copies of critical data security stored in case of a Thus it eliminates associated performance
need to recover some specific data assets. overhead and vastly simplifies the design of the
768 | P a g e
6. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
VMM, in turn allowing VMMs to be written to
100%
common standards and to be more robust.
R a ti o
The advantage of increase supportability of the 80%
overall virtual machine solution.VMMs running 60%
under the Intel Virtualization Technology can be
40% Performance
fully validated on the hardware, including
certification that they execute directly using the 20% Security
architecture’s full instruction set.
Intel Virtualization Technology will provide the 0% Benefit
basis for a rich ecosystem of virtualization
solutions that encompass both server and desktop
environments.
VI. BUSINESS SURVEY
Microsoft, Cisco, Oracle, EMC2 are market- Figure – 5: Result
leading innovative companies has adopted the
virtualization technology by enabling the VII. PITFALLS TO AVOID
application as virtual applications hosted in In some cases it doesn’t wait any type of
virtual machines are secured across the network protection.
with heightened security, availability, and Don’t skimp on training.
performance. Don’t expose for legal issues.
There are no anymore security issues after Don’t imagine that virtualization is ―Static‖.
adopting the pull of virtualization. Don’t skip the ―Boring stuff‖. It’s an overhead
I highlighted some related survey in below table for cloud infrastructure.
based upon the company and its product and the Don’t Overlook the Organization.
nature of effect. Don’t Overlook the Hardware.
Don’t Overlook the Service Management.
Most Valuable Leading Company Be Prepared for Even More Virtualization in
Compan Product Performanc Securit Increase Future.
y e y d
Status Issues Benefit VIII. CONCLUSION
[In %] The pull of Virtualization is strong – the
SharePoint +++ Yes 70% economics are too attractive to resist. And for most
Microsof SQL Server +++ None 50% organizations, there’s no reason to fight against this
t Azure ++ None up to pull. Well-managed virtualization technologies can
90% make their world better.
UCS Virtualization technologies provide several
Cisco [Unified +++ None up to important features that make it a powerful tool to use
Computing 73% in a wide range of applications. These include but are
System] not limited to server consolidation, application
Oracle sandboxing, access to varieties of hardware and
Oracle [Database / operating systems, testing, simple system
Web logic +++ Yes 40% administration and quality of service. All these
applications features have made this technology extremely popular
] in academia and industry. A closer look reveals that
Storage although most of them have an operating
EMC2 Application +++ None 60% environment similar to the end-user, they vary greatly
Software in their architecture design, implementation and the
1) In above table I used the +++ strategy for its high better level of abstraction at which they operate.
performance after adopting virtualization. And similarly
(++) for better but not so much as compared to (+++) REFERENCE
strategy. 1] White Paper: Virtualization Overview from
2) There are basically no security issues in adopting VMware. http://www.vmware.com
virtualization technolgy but in some of the criteria I found 2] White Paper: Intel Core Processors –
security issues in some application even if after adopting Understanding Desktop Virtualization.
virtualzation. 3] White Paper By ALAN MURPHY –
3) One main important factor I found is that company’s Virtualization Defined in Eight Different
annual income has been increased. Ways.
4] http://www.virtualizationtechnology.com
769 | P a g e
7. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
(IJERA)ISSN: 2248-9622www.ijera.com
Vol. 2, Issue5, September- October 2012, pp.764-770
5] Virtualization and Disaster Recovery by J.
Peter Bruzzese.
6] White Paper: Business Value of
Virtualization By HP – AI Gillen, Randy
Perry, Tim Grieser, July – 2008.
7] White Paper: Desktop Virtualization By
NComputing
8] Understanding Microsoft Virtualization
Solutions by Microsoft [2nd Edition].
9] Intel Solution White Paper: Server
Virtualization on Intel Architecture.
10] Technology Brief: Intel Virtualization
Technology by Matt Gillespie.
11] http://www.wikipedia.com/vmware
12] http://www.intel.com/platforms/applied/indp
c/pdf/ARC-Intel-Virtualization-v1.pdf
770 | P a g e