Virtualization WPS Office
Virtualization WPS Office
LEVEL: 100
GROUP: 5 (FIVE)
WHAT IS VIRTUALIZATION
Virtualization is a technology that allows you to run multiple virtual machines or
operating systems on a single physical computer. It creates a virtual environment
where each virtual machine operates independently, as if it were running on its
own dedicated hardware. This enables you to maximize the utilization of your
computer's resources and improve efficiency. Virtualization is commonly used in
server environments, where it helps consolidate multiple servers onto a single
physical machine. It also has various applications in desktop computing, software
development, and testing. Overall, virtualization offers flexibility, scalability, and
cost savings by optimizing the use of hardware resources.
IMPORTANCE OF VIRTUALIZATION
EXAMPLES OF VIRTUALIZATION
2. The network hypervisor creates virtual networks, also known as virtual LANs
(VLANs), which operate independently and can be customized to meet specific
requirements.
3. Each virtual network can have its own network policies, security settings, and
addressing schemes, making it possible to isolate and secure different network
segments.
DESKTOP VIRTUALIZATION
3. Security: Since data and applications reside in the data center, desktop
virtualization can enhance security by reducing the risk of data loss or theft from
physical devices.
3. Microsoft remote desktop services (RDS): RDS allows you to deploy and
manage virtual desktops and applications from a centralized server. It
enables remote desktops and applications, providing a consistent user
experience.
4. Parallels remote application server: this solution offers virtual desktop and
application delivery to users on various devices. It supports both windows
and linux environment and provides features like load balancing and
resource optimization.
1. Hypervisor: The server hosting the virtual desktops runs a hypervisor, which is a
software layer that manages and allocates the physical resources of the server to
the virtual machines.
3. User Access: Users can access their virtual desktops using a client device, such
as a thin client, laptop, or mobile device. The client device connects to the server
hosting the virtual desktops.
5. Data Center Infrastructure: The server hosting the virtual desktops is part of a
larger data center infrastructure. This infrastructure includes storage systems,
networking components, and management tools to ensure the virtual desktops
perform optimally and are securely accessed.
With application virtualization, the application package includes all the necessary
files, settings, and registry entries required for the application to function
properly. This package is self-contained and can be deployed and executed on
various devices without conflicts or dependencies on the underlying operating
system.
When a user launches a virtualized application, it runs within its own virtual
environment, which provides a layer of isolation from the host operating system.
This isolation ensures that the application does not interfere with other
applications or the system itself.
1. Citrix XenApp: XenApp allows you to virtualize and deliver applications to users
on-demand, enabling them to access applications from any device with an
internet connection.
4. Flexibility: Users can run virtualized applications on-demand, without the need
for installation or administrative privileges. This flexibility allows users to access
applications from any device, making it ideal for remote work or bring-your-own-
device (BYOD) scenarios.
STORAGE VIRTUALIZATION
When a request for storage comes in, the storage virtualization layer intercepts it
and decides where to allocate the data. It can dynamically assign storage from
different physical devices based on factors like performance requirements,
availability, or capacity. This means that the systems or applications accessing the
storage are unaware of the underlying physical infrastructure.
The storage virtualization layer also provides additional functionalities like data
protection, replication, and migration. It can create snapshots or backups of the
virtualized storage, making it easier to recover from failures or disasters. It can
also replicate data to remote locations for improved data availability and disaster
recovery.
SAN stands for Storage Area Network, while NAS stands for Network Attached
Storage.
SAN and NAS are both storage technologies, but they have some key differences.
SAN is a network dedicated solely to storage. It uses Fibre Channel or iSCSI
protocols to connect servers and storage devices. SAN provides block-level access
to data, which means it treats storage as individual blocks rather than files. This
makes it ideal for applications that require high-speed, low-latency access to
storage, such as databases or virtualization environments. SANs are often used in
enterprise-level environments where performance and scalability are crucial.
SANs have a wide range of use cases! Some common ones include:
1. Database storage: SANs are often used to store and manage large databases,
providing high-speed access and scalability.
4. Disaster recovery: SANs enable data replication and remote backup, making it
easier to recover from disasters and ensure business continuity.
5. Video editing and media storage: SANs provide the speed and capacity required
for storing and editing large video files.
6. Financial services: SANs are used in financial institutions for critical data
storage, ensuring fast access and data integrity.
When it comes to advantages of using SAN over NAS, there are a few key points
to consider:
2. Scalability: SANs are highly scalable and can easily accommodate the growing
storage needs of an organization. They allow for the addition of more storage
devices without disrupting the existing infrastructure.
3. Block-level access: SANs provide block-level access to data, which means they
treat storage as individual blocks rather than files. This allows for more precise
control over data and enables features like snapshots and replication.
4. Security: SANs often offer advanced security features, such as zoning and LUN
masking, which help control access to data. This is particularly important in
environments where data security is a top priority.
However, it's important to note that the choice between SAN and NAS depends
on the specific needs of your organization. NAS has its own advantages, such as
ease of use and file-level access, which may be more suitable for certain use
cases.