0% found this document useful (0 votes)
96 views15 pages

1.1 Benefits of Desktop Virtualization

Virtualization refers to managing computing resources virtually rather than physically. Desktop virtualization delivers desktop operating systems and applications to users' devices from a centralized data center. It provides benefits like reduced costs, increased security and flexibility. However, it also faces drawbacks such as high implementation costs and availability issues. Popular desktop virtualization products include Vagrant and Paperspace, which automate environment setup and simplify management. Network virtualization combines network resources into a single virtual network. It offers benefits such as reduced hardware needs but also drawbacks such as potential slowdowns and limited device support for some VPNs. Common network virtualization products are Hotspot Shield VPN.

Uploaded by

Mishal Fathima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views15 pages

1.1 Benefits of Desktop Virtualization

Virtualization refers to managing computing resources virtually rather than physically. Desktop virtualization delivers desktop operating systems and applications to users' devices from a centralized data center. It provides benefits like reduced costs, increased security and flexibility. However, it also faces drawbacks such as high implementation costs and availability issues. Popular desktop virtualization products include Vagrant and Paperspace, which automate environment setup and simplify management. Network virtualization combines network resources into a single virtual network. It offers benefits such as reduced hardware needs but also drawbacks such as potential slowdowns and limited device support for some VPNs. Common network virtualization products are Hotspot Shield VPN.

Uploaded by

Mishal Fathima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

INTRODUCTION

Virtualization is relatively generalized term, which refers to the operation and management
of computing elements on the virtual platform and as a resource solution in order to simplify
the management and optimize resources. Desktop virtualization has varied definitions with
the context in which it is implemented. Terminal Services been handy as it is many to one
solution in which many users share same remote environment. However terminal services
have had its share of problems, which have included issues with printing and application
compatibility. Also individual user doesn’t have full admin rights on their session. The virtual
desktop interface concept sidesteps some of these problems. Desktop virtualization also
referred as virtual desktop interface. Desktop virtualization can be defined as virtualization
of computer desktop in order to achieve security and flexibility. This paper presents in depth
introduction to the desktop virtualization and various method involving while
implementation of desktop virtualization and the suitable desktop virtualization methods
for given execution environme
TYPES OF VIRTUALIZATION:
1.DESKTOP VIRTUALIZATION
Desktop virtualization is new desktop delivery method in which desktop operating system
instance customized, build and runs in data centers and users can access application or the
whole desktop by using their stateless ‘thin clients’ devices. This method promises
significant benefits in terms of data security, total cost of ownership and manageability
of large amount of operating systems instances running in corporate intranetworks.
The desktop virtualization products like Virtualbox, VMware Workstation which are
commonly used by users does not completely realize desktop virtualization . In other
words, this software runs the virtual machine instance on the local or remote computer
which is possible by providing and emulates the set of hardware so that it can be
transferred to other machine by means of removable media or network.

1.1 Benefits of desktop virtualization


 Reduced capital and operating costs.
 Minimized or eliminated downtime.
 Increased IT productivity, efficiency, agility and responsiveness.
 Faster provisioning of applications and resources.
 Greater business continuity and disaster recovery.
 Simplified data center management.

1.2 Drawbacks of desktop virtualization


 It can have a high cost of implementation.
 It still has limitations.
 It creates a security risk.
 It creates an availability issue.
 It creates a scalability issue.
 It requires several links in a chain that must work together cohesively.
 It takes time.

1.3 Product of desktop virtualization


1. VAGRANT
Vagrant is a simple and powerful virtual desktop infrastructure software designed to help
developers, DevOps engineers, and UI and UX designers to build and maintain portable virtual
development environments.
The open-source and cross-platform solution enables users to create and configure the
lightweight environment for Docker containers, VirtualBox, VMware, Amazon Web Services
(AWS), and HyperV to streamline configuration management and increase development
productivity.
Vagrant features automation and easy-to-use workflow to reduce the development
environment setup time and give users the peace of mind thanks to its simple command-line
client. The application leverages industry-standard technology and is controlled by a precise
workflow that magnifies the flexibility of you and your employees.

Why Vagrant is a good pick for your business:


Unified workflow. Vagrant automates virtual environment configuration with industry-
standard provisioning tools such as Puppet or Chef. Whether you are a developer, designer,
or operator you will marvel at the simple, unified workflow that remains consistent regardless
of your role.
Cross-platform. Vagrant is a cross-platform software that works on your favorite device. The
solution works on Linux, Windows, Mac, and other platforms allowing you to use your
preferred programs and editors without a struggle. By working on your local system, Vagrant
enables you to use tools you are already familiar with, modify images using your favorite
program, code with ease in a text editor you are accustomed to, and debug using your
preferred tools – all from your local computer.
Enhanced consistency. Vagrant offers the same packages, users, operating systems, and
configurations, to mirror the production environment. It enforces consistency by giving users
the flexibility to utilize their favorite browser, IDE, and editor.
2. PAPERSPACE
Paperspace is an easy-to-use, next generation Virtual Desktop Infrastructure (VDI) software
that enables organizations of all sizes to supercharge business with innovative computing
infrastructure. The powerful solution simplifies management for enterprises with its robust
management console, advanced security features, and shared drives. The platform comes
with built-in remote access to shared drives and machines making it easy for users to work
from anywhere without having to set up costly and complex VPNs.
Paperspace permits users to create a new Virtual Desktop Environment or transfer an existing
one to the cloud. Our work on its pros and cons reveal that the solution comes with powerful
tools that allow you to integrate it within any existing network. Its simple management
console makes it easy to complete setups for Active Directory and VPN integration with just
a few clicks. It eliminates the inherent intricacy of VDI thereby simplifying even the most
complex network configurations.
Why Paperspace is a good pick for your business:
Easy to use. Paperspace is designed to deliver the power of Virtual Desktop Infrastructure
while eliminating the complexity. The solution handles networking equipment, servers,
firewalls, redundancy, disaster recovery, and virtualization efficiently.
Powerful management. Paperspace provides an impressive management interface that
enhances IT capabilities. The package provides robust tools that enable you to create, sort,
filter, and connect machines, users, and networks with ease.
Enhanced networking. Paperspace comes with powerful tools that allow you to integrate the
solution with your existing network. Its simple management console makes it easy to
complete setups for Active Directory and VPN integration with just a few clicks. It eliminates
the inherent intricacy of VDI thereby simplifying even the most complex network
configurations.
2. NETWORK VIRTUALIZATION
Network virtualization is a technology which enables combining computer network resources
into a single platform appearing as a single network. In this form of virtualization all hardware
and software in the virtual network appear as a single collection of resource. There is another
form of network virtualization in which logically isolated network partitions are created over
the shared physical network infrastructure. Such logical partitioning, as shown in Figure 2.1,
resulting in multiple heterogeneous virtual networks can
coexist simultaneously over the shared infrastructure.

Figure1.2: Logical Network partitions on a


shared network infrastructure
Network virtualization is a useful
technology to achieve better utilization of infrastructures in terms of reusing a single physical
or logical resource for multiple other network instances, or to aggregate multiples of these
resources to obtain more functionality. These resources can be network components, such as
routers, switches, hosts, virtual machines, etc. Hence, Network virtualization can reduce the
total cost by sharing network resources.
2.1 Benefits of Network Virtualization
 Reduces the number of physical devices needed.
 Easily segment networks.
 Permits rapid change / scalability and agile deployment.
 Security from destruction of physical devices.

2.2 Drawbacks of network virtualization


 VPN is sometimes costly: Due to high-quality service, some VPN’s are costly i.e. $12/month. But normal
VPN’s cost less than $5/month.
 Data transfer over the internet becomes slow: If you use VPN over slow internet package then
browsing websites becomes slow. This is because of routing web traffic from ISP to VPN and VPN to ISP.
Due to the large distance, your internet connection becomes slow.
 Not all devices support VPN: Some operating system and devices don’t have VPN software made. So
they have to configure manually VPN connection. For example Linux, Boxee Box and Chromebook don’t
have VPN software support. Also, some smartphones and gaming console have not to support for VPN
software.
 Free VPN’s have security problem: If you use free VPN then your data can be given to third party
companies. Also, free VPN is not good at making encryption and hackers may attack your
device/computer easily. Moreover, you will get many ads on using free VPN’s. Some low cost or free
VPN’s give you limited countries VPN’s and may frequent discounts you from the server

2.3 Product of network virtualization


1.HOTSPOT SHIELD
Hotspot Shield is a hugely popular, fast performing VPN, with a strict ‘no logging’ policy, and
affordable monthly plans for those that buy for the longer term. Concerns remain due to its
poor performance on Netflix, as well as limited support for the less mainstream platforms
such as the Chromebook.
If VPN services were running a popularity contest, Hotspot Shield would come out on top with
a staggering 650 million users, that easily beats other services in terms of user count. Fueling
that high number of users is their robust free offering that has a daily data cap, unlike
competitors that cap the data by the month. Hotspot Shield is based in the US, and is notable
for having servers in locations that few other services do, including China and Russia.
Features
Performance was a major highlight in our tests, with Hotspot Shield's proprietary Catapult
Hydra protocol helping to deliver some of the best download speeds we've seen, even from
the most distant locations. The ‘Secret sauce,’ of this Catapult Hydra protocol, is that rather
than a single connection to a single server that most VPN’s employ, here the user is connected
to multiple servers simultaneously, which they claim makes their connection “Stronger and
faster over long distances.”
Hotspot Shield incorporates features to keeping a user’s data safe and secure. It starts with
high level encryption to prevent hackers from having access to your data stream. In addition,
it has a internet Kill Switch built into the software that stops your data from being transmitted
or received if the VPN tunnel goes down for any reason. It also has a strict ‘No logging’ policy
that results in “no record of the websites you have visited and which apps you use.”
But there's a problem, too. As Hotspot Shield only uses its own Catapult Hydra protocol, and
no longer supports standards like OpenVPN, you can't manually set it up on your router,
games console, Chromebook, or anywhere else you might want to use the service. That means
the service can only work on devices where you can run its Windows, Mac, Android or iOS
apps, which leaves out Linux users. There are also a few other issues as well, like a shortage
of configuration options in the apps, and an inability to unblock US Netflix, at least during our
tests.
These won't matter to everyone, though, and if you're just looking for raw speed at a very low
price then Hotspot Shield is well worth a look. Finally, the 45-day trial makes it easy to test
the service for yourself.

Performance
Hotspot Shield’s performance is a bit of a mixed bag. Connection times for this VPN are
favorable, and the service overall is reliable, including good download speeds. However, there
are some reconnects from some locations, latency times are high, and upload speeds are
unimpressive.

Verdict and conclusion


Hotspot Shield is a VPN that is worth taking a look at, depending on your use case scenario.
Those looking for a VPN with a ‘no logging’ policy, affordable longer plans, and high
throughput will be well served. The converse is there are concerns with it being US-based, our
difficulty encountered with Netflix streaming, and the option of less countries to choose from
with their servers. Keeping that in mind, Hotspot Shield remains a more than viable choice for
those that can live with the drawbacks, and their epically large user base reinforces that.
FOR
 Free tier with frequent additional data
 No logging policy
 Discounts on longer term policies
 Live support
AGAINST
 Limited platform support
 Did not unlock Netflix streaming in tests
 Cryptocurrency not accepted as payment

3.SERVER VIRTUALIZATION:
High performance and efficient servers are the backbone of any solid IT infrastructure. With
the gradual improvement of the system, it is necessary to introduce application servers
constantly in order to meet the growing needs, which will lead to the rapid expansion of the
servers and we must face complicated software and hardware management and maintenance
work.
In server virtualization, server consolidation refers to the practice of taking OS and application
stacks running on several physical servers, with each OS and its apps contained within a virtual
server,and then multiple virtual servers running on a single physical server as shown in figure
1.4.This practice allows better utilization of hardware resources and thereby allow more
isolated applications to run in a given server farm infrastructure. The downside is that if a
consolidates server crashes for any reason then all machines running on it will be affected.
Load balancing refers to the ability of an IT manager to take a virtual machine running on a
physical server, andmoveit another server without stopping it.
Figure 1.4: Consolidation enables multiple VMs to run on the same server hardware
This becomes possible because a virtual machine is nothing but a large binary file in the
memory, with no direct references to the underlying hardware. It can be paused and copied
to the memory of another identical physical server, especially if the first servers need to be
brought down for regular maintenance or is slowing down due to too many tasks. VMware
has a tool Vmotion to aid in such a load balancing tasks. Failover reliability refers to the ability
of preserving the state of a virtual machine and replicating it on another physical server, using
memory mirroring or other suitable techniques, in case the first machine suffers failure.
However, it should be noted that the VMM in above applications occupy the ring0 of the CPU,
traditionally reserved for OS with privileged calls, and thus it pushes the OS to run in ring1,also
known as ring compression. Thus OS is no longer able to make privileged kernel calls, and the
VMM traps these to replace them with an equivalent code. This technique for Software
virtualization is generally known as Binary Translation.
3.1 Benefits of server virtualization
 Reduce hardware costs from server virtualization.
 Faster server provisioning and deployment.
 Server virtualization greatly improves disaster recovery.
 Virtualization saves significant energy costs.
 Increase staff productivity.
3.2 drawbacks of server virtualization
 Difficulty in direct access to hardware, for example, specific cards or USB devices.
 Performance – currently there are no consolidated methods to measure the
performance of virtualized environments.
 Great RAM consumption since each virtual machine will occupy a separate area of the
same.
 Great use of disk space, since it takes all the files for each operating system installed
on each virtual machine.
3.3 Product of server virtualization
1.VSPHERE
Unleash a powerful, flexible, and secure foundation for business agility that accelerates your
digital transformation to hybrid cloud. vSphere is the industry-leading server virtualization
software and the heart of a modern SDDC, helping you run, manage, connect, and secure your
applications in a common operating environment across clouds.
advanced security capabilities, fully integrated into the hypervisor and powered by machine
learning, provide better visibility, protection, and response times for security incidences. With
vSphere, you can support new workloads and use cases while keeping pace with the growing
needs and complexity of your infrastructure.

Features
Data Center Consolidation and Business Continuity
Simplify data center operations and management at scale, increase business efficiency, and
decrease CapEx and OpEx through virtualization.
Enhanced App Performance and Hybrid Cloud
Take advantage of the latest innovations in hardware to turbocharge the performance of
existing applications. Support new workloads and use cases, such as machine learning and
artificial intelligence. Balance workloads and prioritize resources to ensure top performance
for your critical applications. Extend on-premises environments to vSphere-based public
clouds, such as VMware Cloud on AWS, and enjoy a streamlined hybrid cloud experience.
Virtualized Big Data
Simplify your big data infrastructure management while making it more cost effective.
VMware is the best platform for big data just as it is for traditional applications. Minimize
downtime with uniform, cost-effective failover protection; easily organize, prioritize, and
share data center resources; and provision virtual networking across multiple hosts and
clusters from a centralized interface.
Legacy Unix to Virtual Linux Migration
Get high performance, enhanced availability, larger VM capacity, and disaster recovery
capabilities when you migrate legacy Unix infrastructure to virtualized Linux. Move an entire
running virtual machine from one physical server to another, without downtime, and gain rich
troubleshooting capabilities, including rollback and recovery for patching and updating.
Application and Infrastructure Security
Secure applications, infrastructure, data, and access with a comprehensive, built-in
architecture and a simple, policy-driven model. Protect apps running on vSphere using
machine learning and behavioral analytics to monitor threats and automate responses. Get
faster visibility and protection with a scalable solution, no agents to manage, and minimal
overhead.

4. STORAGE VIRTUALIZATION
Storage virtualization creates a layer of abstraction between the operating system and the
physical disks used for data storage. The virtualized storage is then location-independent,
which can enable more efficient storage use and better storage management.For example,
the storage virtualization software or device creates a logical space, and then manages
metadata that establishes a map between the logical space and the physical disk space. The
creation of logical spaceallows a virtualization platform to present storage volumes that can
be created and changed with little regard for the underlying disks.The most immediate
benefit of storage virtualization is increased storage utilization, which can reduce wasted
storage within the enterprise. For example, a logical unit number (LUN) provisioned on a
storage area network (SAN) may allocate space that may not be used, or disks may be left
unallocated -- lost and forgotten on storage arrays scattered across the data center. With
virtualization, otherwise-unused storage can be cobbled together into viable LUNs and
allocated to applications.Data storage virtualization also supports migration and replication
of LUNs between storage systems. This is particularly useful when one storage system must
be taken offline for maintenance or replacement. By simply changing the mapping scheme,
virtualization can move the location of data without disrupting disk I/O, allowing for efficient
and non-disruptive data movement within an enterprise.

4.1 Benefits of storage virtualization


 It allows for migrations to be performed
quickly.
 It creates better workflows.
 It allows more than one type of storage
array.
 It is a cheaper option for storage.
 It allows for the costs to become more predictable
4.2 Drawbacks of storage virtualization
 It requires you to deal with multiple vendors.
 It can make upgrades challenging to process.
 It does not always scale to some areas
 It does not eliminate data security risks.
Product of storage virtualization
A)Virtualizing storage with FalconStor Network Storage Server (NSS)
Virtualized storage systems can offer flexibility and be virtualization-specific. One example is
the FalconStor Network Storage Server (NSS). While the storage systems are presented
virtually to hosts, there are additional features, such as thin provisioning of LUNs and
application awareness. In addition, FalconStor has a less complex offering that provides
storage virtualization to smaller environments via a virtual appliance, specifically a VMware
VM, which acts as the iSCSI target on an iSCSI network. This functionality for small virtual
environments does have limitations, though: namely, NSS cannot migrate a virtual appliance
because the iSCSI target would no longer exist in its required location.NSS can also exist as a
physical system. Unlike other storage systems, NSS can be built on customer-purchased
server hardware. Known as NSS Enterprise, this option allows administrators to save money
compared with storage systems on purpose-built hardware.

Fig 1.5-Architecture of falconstor network storage server (nss)

Perhaps the best feature of NSS is that it has application awareness, which addresses some
limitations that come with the added layer of abstraction that virtualized storage brings.
Specifically, FalconStor NSS offers an application-aware agent known as Application Snapshot
Director for use with VMs and host systems to protect volume data. Application Snapshot
Director keeps data transactions intact by interacting directly with VMware ESX. The key
benefit is that this approach of managing storage with transactions allows for rapid recovery
and no-impact backup. Further, Application Snapshot Director can integrate with VMware's
Site Recovery Manager to fit a disaster recovery model.how Application Snapshot Director
interacts with a VMware implementation.Thanks to its transactional architecture, NSS offers
mirroring, time-based viewing of volume snapshots and replication functionalities. As
mentioned previously, the thin-provisioning feature for LUNs with NSS is a plus for storage.
On a storage system, thin provisioning functions like it would with VM disk files in Microsoft
Hyper-V or VMware Server. The LUN is presented at its full size, but the storage system is
aware of what the storage client uses on the volume. When this occurs, what is consumed on
a "virtual" LUN is consumed on the disk.
5. APPLICATION VIRTUALIZATION
Application virtualization is a way of running an application in isolation from other
applications. The application runs within a bubble rather than having to be physically installed
on a PC. The end results are that the underlying file system and registry settings are never
changed, applications no longer fracas and the base operating system remains intact. The
ability to dynamically stream applications to a user provides flexibility, faster deployment, and
significantly reduced IT labor required to deploy and update applications.
Application virtualization is an umbrella term that describes software technologies that
improve portability, manageability and compatibility of applications by capsulizing them from
the underlying operating system on which they are executed. A fully virtualized application
is not installed in the traditional sense, although it is still executed as if it were. The
application is fooled at runtime into believing that it is directly interfacing with the original
operating system and all the resources managed by it, however in reality it is not.
5.1 Benefits of application virtualization
 No installation required
 Application retirement simplified
 No more application conflicts
 No registry and system bloat
 Multiple runtime environments
 Multiple versions of the same application
 Deploy apps on unmanaged computers
 Application updates

5.2 drawbacks of application virtualization


 A new complexity layer
 Vendor might deny support
 Problematic apps: Some apps, especially those installing their own system drivers,
don't work as virtualized applications.
 shell integration has to be established by other means. All virtualization products offer
solutions for this problem,
 Application virtualization can simplify many admin tasks. it will mean extra work for
you.
Product of application vitualization
Application virtualization n allows you to run applications on client computers as if they were
installed locally. There are two different types of application service providers – those who
offer the use of an application and the associated infrastructure as a single subscription service,
and those who provide the infrastructure as well as the management, and may or may not supply
the application licenses. This second type of ASP is frequently also referred to as a managed
services provider or an application hosting provider. When an ASP offers you both the
application and the infrastructure together, it usually means that the application software
licensing is being provided as part of the service. In most cases, the application itself is the
service. This fits into the “Software as a Service” category (SaaS), where the cost of the
software is part of the use fee for the service. This model is typically available for web-based
applications: applications which have been developed specifically to run in a web server
environment and are usually accessed using the browser. An example of such a service is: -
instead of selling you a copy of Microsoft Word for $300, a cloud computing model would
"rent" word processing software to you through the Internet for perhaps 5 dollars a month. You
would not install any special software, nor would you be confined to your home machine to
use this rented online product. You simply use your modern web browser to login from any
web-enabled computer, and you can access your word processing documents in the same way
that you would access your Gmail.SaaS represents a revolutionary change in the way
applications are deployed. Rather than installing software directly on each PC, SaaS enables
the IT organization to deliver applications “virtually”, to users.
With SaaS, applications are not installed on a machine; therefore, many of the challenges
associated with application conflicts are avoided. Because software and user access are
managed centrally, applications can be deployed and updated more quickly and effectively,
with least IT effort required. Features of virtualized application are: -
1. Lockdown enabled
2. Available on any PC
3. Centrally Managed
4. Image reducing
5. Test minimizing
6. Never conflicting
7. Never Installed
8. Demand and supply basis
SaaS helps reduce complexity in the application portfolio which, in turn, reduces application-
related calls to the service desk, and helps support staff resolve calls more quickly. And because
applications are not installed on a specific machine, users can move more freely within their
environment, knowing that “their” applications will be available wherever they are.
a) Approaches to Virtualize Application in SaaS
i. Standalone Applications are encapsulated in a single executable.These executables can
run instantly from USB, CDROM or Local Disk. The applications can also be deployed using
a management tools.
ii. Streaming
Applications are encapsulated in a single file and are located on the network. When starting the
application only the blocks needed to run the application are copied to a local drive (cache).
When the more features of the application are used, more blocks are copied to the local cache.
Streaming can be available for standalone virtualized applications accessed from the network
or when the virtualized applications are presented with a locally installed agent.
iii. Centrally Controlled Access
Virtualized applications are "distributed" through a central deployment tool. A locally installed
agent is required. The applications can be deployed (executables are copied locally) or
shortcuts to the applications (located on a network-share) can be presented.
Example of SaaS
i. Google Apps
It‘s a office suite offered as a service (SaaS) that everybody can use through a web server. It
includes the applications like gmail, google calender, google docs, google groups, google talk,
google sites, google drive etc.
ii. Microsoft Office 365
It is a subscription-based online office and software plus services suite which offers access to
various services and software built around the Microsoft Office platform. It provides hosted
e-mail, social networking and collaboration, and cloud storage to teams and businesses.
iii. Petrosoft
It has a C-store office which is a Back-office software for gas stations, service stations and
convenience stores designed to manage inventory, facilitate automatic ordering and maintain
complete price book control. Also it has a Fuel-Central - Jobber software designed to schedule
hundreds of runs weeks in advance and in real time. It is a fuel distribution system for
petroleum marketers created to fully automate the fuel distribution process including driver
and truck scheduling, and communication across the distribution channel.

You might also like