0% found this document useful (0 votes)
17 views

Virtualization WPS Office

The document provides details about a student named Odole Eniola Destiny including their matric number, level, group, and department. It then discusses the concepts of virtualization including definitions of virtualization and examples like server, network, desktop, and application virtualization. It describes how network virtualization works and advantages over traditional networking. Examples of network virtualization platforms are provided. Desktop virtualization is explained along with benefits and examples of desktop virtualization solutions.

Uploaded by

adeloyeheritage1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Virtualization WPS Office

The document provides details about a student named Odole Eniola Destiny including their matric number, level, group, and department. It then discusses the concepts of virtualization including definitions of virtualization and examples like server, network, desktop, and application virtualization. It describes how network virtualization works and advantages over traditional networking. Examples of network virtualization platforms are provided. Desktop virtualization is explained along with benefits and examples of desktop virtualization solutions.

Uploaded by

adeloyeheritage1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

NAME: Odole Eniola Destiny

MATRIC NO: 230404014

LEVEL: 100

GROUP: 5 (FIVE)

DEPARTMENT: COMPUTER SCIENCE

WHAT IS VIRTUALIZATION
Virtualization is a technology that allows you to run multiple virtual machines or
operating systems on a single physical computer. It creates a virtual environment
where each virtual machine operates independently, as if it were running on its
own dedicated hardware. This enables you to maximize the utilization of your
computer's resources and improve efficiency. Virtualization is commonly used in
server environments, where it helps consolidate multiple servers onto a single
physical machine. It also has various applications in desktop computing, software
development, and testing. Overall, virtualization offers flexibility, scalability, and
cost savings by optimizing the use of hardware resources.

IMPORTANCE OF VIRTUALIZATION

1. Resource optimization: virtualization allows for efficient utilization of


hardware resources by running multiple virtual machines (VMs) on a single
physical server. This helps reduce hardware costs, power consumption, and
physical space requirements.

2. Flexibility and scalability: virtualization provides the ability to quickly


create, deploy, and manage virtual machines, allowing for easy scalability
and adaptability to change demands. It enables organizations to allocate
resources as needed and easily adjust the capacity of their virtual
infrastructure.

3. Improved disaster recovery: virtualization simplifies disaster recovery by


allowing for the creation of virtual machine snapshots or replicas. These
can be quickly restored in the events of system failure or disaster,
minimizing downtime and data loss.

4. Enhanced security: virtualization provides isolation between virtual


machines, making it harder for malware or attacks to spread across the
virtual environment. It also enables the use of security features like virtual
firewalls and network segments to further protect sensitive data.

5. Simplified testing and development: virtualization allows for the creation of


virtualized test environments, enabling developers to quickly setup and test
software in isolated environment without affecting the production system.

6. Legacy application support: virtualization enables organizations run legacy


applications on modern hardware and operating systems, ensuring
continued support and functionality for critical business applications.

EXAMPLES OF VIRTUALIZATION

1. Server Virtualization: In a data center, virtualization allows you to consolidate


multiple physical servers into virtual machines, reducing hardware costs,
simplifying management, and improving resource utilization.

2. Network Virtualization: With network virtualization, you can create virtual


networks that operate independently, even on the same physical infrastructure.
This enables efficient network management, isolation, and flexibility.

3. Desktop Virtualization: Instead of having individual desktop computers,


virtualization allows you to centralize desktop environments on servers. Users can
access their virtual desktops from any device, increasing mobility and security.

4. Application Virtualization: Instead of installing applications directly on users'


devices, you can virtualize them and deliver them as virtual applications. This
simplifies application management, reduces conflicts, and enhances security.

5. Storage Virtualization: Virtualizing storage allows you to pool and manage


storage resources from multiple devices, providing centralized control, scalability,
and improved data protection.
HOW DOES NETWORK VIRTUALIZATION WORK

Network virtualization is a technology that allows you to create multiple virtual


networks on a single physical network. It is like having virtual networks within a
physical network. This how it works

1. With network virtualization, a software layer called a network hypervisor


abstracts the underlying physical network resources, such as switches and
routers.

2. The network hypervisor creates virtual networks, also known as virtual LANs
(VLANs), which operate independently and can be customized to meet specific
requirements.

3. Each virtual network can have its own network policies, security settings, and
addressing schemes, making it possible to isolate and secure different network
segments.

4. Virtual networks can be provisioned, managed, and configured independently,


allowing for greater flexibility and agility in network management.

5. Network virtualization enables the efficient utilization of network resources, as


multiple virtual networks can operate on the same physical infrastructure.

6. It also provides better scalability, as virtual networks can be easily created or


modified without the need for physical network changes.

ADVANTAGES OF NETWORK VIRTUALIZATION OVER TRADITIONAL


NETWORKING

Network virtualization offers several advantages over traditional networking.


Here are a few:
1. Flexibility: With network virtualization, you can easily create, modify, and
manage virtual networks without the need for physical infrastructure changes.
This flexibility allows for quick adaptation to changing network requirements.

2. Resource Optimization: Virtual networks enable the efficient utilization of


network resources by sharing the underlying physical infrastructure. This can lead
to cost savings and improved network performance.

3. Scalability: Virtual networks can be easily scaled up or down based on demand.


Adding or removing virtual networks can be done without impacting the physical
network infrastructure, providing greater scalability and agility.

4. Enhanced Security: Network virtualization allows for the isolation and


segmentation of virtual networks, providing enhanced security. Each virtual
network can have its own security policies, access controls, and traffic separation,
reducing the risk of unauthorized access and data breaches.

5. Simplified Management: Virtual networks can be provisioned, configured, and


managed independently, simplifying network management tasks. This separation
of control and data planes makes it easier to troubleshoot and maintain the
network.

Overall, network virtualization offers greater flexibility, resource optimization,


scalability, enhanced security, and simplified management compared to
traditional networking approaches. It's a powerful technology that can help
organizations adapt to evolving network requirements.

EXAMPLES OF NETWORK VIRTUALIZATION

1. VMware NSX: NSX is a network virtualization platform that enables the


creation and management or virtual networks. It abstracts network services,
such as switching, routing, and firewalling, from the undelying hardware,
providing flexibility and agility.
2. Juniper contrail: contrail is a network virtualization and SDN (software
defined networking) solution offered by juniper networks. It provides
network overlays, automation, and orchestration capabilities, allowing for the
creation of virtual networks and services.

3. Cisco ACI: application centric infrastructure (ACI) is a network virtualization


solution that integrates physical and virtual environments. It provides
network overlays, automation, and orchestration capabilities, allowing for the
creation of virtual networks and services.

4. Microsoft azure virtual network: azure virtual network Is a cloud based


network virtualization solution provided by Microsoft, it allows you to create
isolated virtual networks I the azure cloud, connecting resources securely and
privately.

DESKTOP VIRTUALIZATION

Desktop virtualization is a technology that allows you to run multiple virtual


desktops on a single physical machine. Instead of having a physical desktop
computer, you can access your desktop environment remotely from any device
with an internet connection. It separates the operating system, applications, and
data from the physical hardware, providing flexibility and mobility.

With desktop virtualization, you can have a centralized infrastructure where


virtual desktops are hosted on servers in a data center. Users can access their
virtual desktops from thin clients, laptops, or even mobile devices. This approach
offers several benefits, including:

1. Flexibility: Users can access their desktop environment from anywhere,


using any device, making it easier to work remotely or on the go.
2. Cost Savings: Desktop virtualization can reduce hardware costs as multiple
virtual desktops can run on a single physical machine. It also simplifies
maintenance and updates since changes can be made centrally.

3. Security: Since data and applications reside in the data center, desktop
virtualization can enhance security by reducing the risk of data loss or theft from
physical devices.

4. Simplified Management: IT administrators can centrally manage and update


virtual desktops, making it easier to deploy applications, control access, and
troubleshoot issues.

Overall, desktop virtualization offers a more flexible, cost-effective, and secure


way to access your desktop environment. It's especially beneficial for
organizations that require mobility, remote work capabilities, and simplified IT
management.

EXAMPLES OF DESKTOP VIRTUALIZATION

1. VMware Horizon: horizon provides virtual desktop infrastructure (VDI)


solutions, allowing users to access their desktops and applications remotely
from a device. It offers features like centralized management and high
performance graphics.

2. Citrix virtual apps and desktops: formerly known as xendesktop, this


solution enables the delivery of virtual desktops and applications to users
on demand. It supports various deployment models, including VDI,
application virtualization, and session based desktops.

3. Microsoft remote desktop services (RDS): RDS allows you to deploy and
manage virtual desktops and applications from a centralized server. It
enables remote desktops and applications, providing a consistent user
experience.

4. Parallels remote application server: this solution offers virtual desktop and
application delivery to users on various devices. It supports both windows
and linux environment and provides features like load balancing and
resource optimization.

HOW DESKTOP VIRTUALIZATION WORK

Here's a simplified breakdown of how it works:

1. Hypervisor: The server hosting the virtual desktops runs a hypervisor, which is a
software layer that manages and allocates the physical resources of the server to
the virtual machines.

2. Virtual Machines: Each user's desktop environment is encapsulated within a


virtual machine. This VM acts as an independent entity, running its own operating
system, applications, and data.

3. User Access: Users can access their virtual desktops using a client device, such
as a thin client, laptop, or mobile device. The client device connects to the server
hosting the virtual desktops.

4. Display Protocol: To transmit the desktop experience to the client device, a


display protocol is used. This protocol sends the graphical information from the
virtual desktop to the client device, allowing users to interact with their virtual
desktop environment.

5. Data Center Infrastructure: The server hosting the virtual desktops is part of a
larger data center infrastructure. This infrastructure includes storage systems,
networking components, and management tools to ensure the virtual desktops
perform optimally and are securely accessed.

By centralizing the desktop environment in a data center, desktop virtualization


offers benefits such as increased flexibility, simplified management, and improved
security. It allows users to access their desktops from anywhere, while IT
administrators can efficiently manage and update the virtual desktop
environment.
APPLICATION VIRTUALIZATION

Application virtualization is a technique that allows applications to run in an


isolated environment separate from the underlying operating system. It involves
encapsulating an application and its dependencies into a virtual package, which
can be delivered and executed on a user's device without the need for traditional
installation.

With application virtualization, the application package includes all the necessary
files, settings, and registry entries required for the application to function
properly. This package is self-contained and can be deployed and executed on
various devices without conflicts or dependencies on the underlying operating
system.

When a user launches a virtualized application, it runs within its own virtual
environment, which provides a layer of isolation from the host operating system.
This isolation ensures that the application does not interfere with other
applications or the system itself.

Application virtualization is a technique that allows applications to run in a


virtualized environment, separate from the underlying operating system. This
provides several benefits, such as easier application deployment, improved
compatibility, and simplified management. Here are a few examples of
application virtualization:

1. Citrix XenApp: XenApp allows you to virtualize and deliver applications to users
on-demand, enabling them to access applications from any device with an
internet connection.

2. VMware ThinApp: ThinApp enables you to package applications into self-


contained virtualized containers, which can be deployed and run on various
operating systems without conflicts or dependencies.

3. Microsoft App-V: App-V allows you to package applications into virtualized


containers, making them portable and isolated from the underlying operating
system. Users can run the applications without installation or conflicts.
4. Docker: Although primarily used for containerization, Docker can also be used
for application virtualization. It allows you to package applications and their
dependencies into lightweight, portable containers that can run on any system
with Docker installed.

Benefits to using application virtualization

1. Simplified Deployment: Virtualized applications can be easily deployed and


managed across multiple devices without the need for complex installation
processes. This reduces the time and effort required for application deployment.

2. Compatibility: Application virtualization allows applications to run on different


operating systems or versions without compatibility issues. This is particularly
useful when dealing with legacy applications that may not be compatible with
newer operating systems.

3. Isolation: Virtualized applications are isolated from the underlying operating


system, providing a layer of security and stability. This isolation helps prevent
conflicts between applications and reduces the risk of system crashes.

4. Flexibility: Users can run virtualized applications on-demand, without the need
for installation or administrative privileges. This flexibility allows users to access
applications from any device, making it ideal for remote work or bring-your-own-
device (BYOD) scenarios.

STORAGE VIRTUALIZATION

Storage virtualization is the process of abstracting physical storage resources


and presenting them as logical units to be managed and allocated as needed.
An example of storage virtualization is a Storage Area Network (SAN). In a SAN,
multiple physical storage devices, such as hard drives or solid-state drives, are
pooled together to create a single, virtualized storage resource. This virtualized
storage can then be allocated to different servers or applications as required,
without the need to directly manage individual physical storage devices.

By abstracting the underlying physical storage resources, storage virtualization


provides benefits such as improved storage utilization, simplified management,
and increased flexibility in allocating storage resources. It allows for easier
scalability, data migration, and centralized management of storage resources.

HOW STORAGE VIRTUALIZATION WORKS

Storage virtualization works by abstracting the physical storage resources and


presenting them as logical units that can be managed and allocated as needed.

Here's a simplified explanation of how it works: Imagine you have multiple


physical storage devices, like hard drives or solid-state drives, connected to a
storage virtualization layer. This layer acts as a mediator between the physical
storage devices and the systems or applications that need storage.

When a request for storage comes in, the storage virtualization layer intercepts it
and decides where to allocate the data. It can dynamically assign storage from
different physical devices based on factors like performance requirements,
availability, or capacity. This means that the systems or applications accessing the
storage are unaware of the underlying physical infrastructure.

The storage virtualization layer also provides additional functionalities like data
protection, replication, and migration. It can create snapshots or backups of the
virtualized storage, making it easier to recover from failures or disasters. It can
also replicate data to remote locations for improved data availability and disaster
recovery.

Overall, storage virtualization simplifies storage management, improves resource


utilization, and provides flexibility in allocating storage resources. It's a powerful
technology that helps optimize storage infrastructure in data centers and makes it
easier to scale and manage storage in complex environments.

DIFFERENCE BETWEEN SAN AND NAS

SAN stands for Storage Area Network, while NAS stands for Network Attached
Storage.

SAN and NAS are both storage technologies, but they have some key differences.
SAN is a network dedicated solely to storage. It uses Fibre Channel or iSCSI
protocols to connect servers and storage devices. SAN provides block-level access
to data, which means it treats storage as individual blocks rather than files. This
makes it ideal for applications that require high-speed, low-latency access to
storage, such as databases or virtualization environments. SANs are often used in
enterprise-level environments where performance and scalability are crucial.

On the other hand, NAS is a file-level storage solution. It uses Ethernet-based


protocols like NFS or SMB/CIFS to connect servers and storage devices. NAS
presents storage as shared folders or directories that can be accessed by multiple
users or systems. It's great for file sharing, centralized storage, and collaboration.
NAS devices are often used in small to medium-sized businesses or home
environments.

In summary, SAN focuses on block-level storage and is designed for high-


performance applications, while NAS focuses on file-level storage and is great for
file sharing and collaboration. The choice between SAN and NAS depends on the
specific needs of your environment and the type of applications you'll be running.

COMMON USE CASES FOR SAN

SANs have a wide range of use cases! Some common ones include:

1. Database storage: SANs are often used to store and manage large databases,
providing high-speed access and scalability.

2. Virtualization: SANs are popular for virtualized environments, where multiple


virtual machines need to access shared storage resources.
3. High-performance computing: SANs can handle the intense storage demands of
scientific research, simulations, or other compute-intensive tasks.

4. Disaster recovery: SANs enable data replication and remote backup, making it
easier to recover from disasters and ensure business continuity.

5. Video editing and media storage: SANs provide the speed and capacity required
for storing and editing large video files.

6. Financial services: SANs are used in financial institutions for critical data
storage, ensuring fast access and data integrity.

ADVANTAGES OF USING SAN OVER NAS

When it comes to advantages of using SAN over NAS, there are a few key points
to consider:

1. Performance: SANs generally offer higher performance and lower latency


compared to NAS. This makes them ideal for applications that require fast and
direct access to storage, such as databases or virtualization environments.

2. Scalability: SANs are highly scalable and can easily accommodate the growing
storage needs of an organization. They allow for the addition of more storage
devices without disrupting the existing infrastructure.

3. Block-level access: SANs provide block-level access to data, which means they
treat storage as individual blocks rather than files. This allows for more precise
control over data and enables features like snapshots and replication.

4. Security: SANs often offer advanced security features, such as zoning and LUN
masking, which help control access to data. This is particularly important in
environments where data security is a top priority.

5. Flexibility: SANs can be used with a variety of operating systems and


applications, making them a versatile choice for different environments.

However, it's important to note that the choice between SAN and NAS depends
on the specific needs of your organization. NAS has its own advantages, such as
ease of use and file-level access, which may be more suitable for certain use
cases.

You might also like