[go: up one dir, main page]

0% found this document useful (0 votes)
408 views19 pages

Virtualization and Five Step Process

This document outlines a five-step process for performing a virtualization project at a utility firm. It involves performing a pre-project power consumption analysis, setting a baseline for potential reductions, implementing virtualization to reduce power usage, conducting a post-project assessment, and comparing final results to the original baseline. Key terms related to virtualization technologies and concepts are also defined.

Uploaded by

Kuldeep Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
408 views19 pages

Virtualization and Five Step Process

This document outlines a five-step process for performing a virtualization project at a utility firm. It involves performing a pre-project power consumption analysis, setting a baseline for potential reductions, implementing virtualization to reduce power usage, conducting a post-project assessment, and comparing final results to the original baseline. Key terms related to virtualization technologies and concepts are also defined.

Uploaded by

Kuldeep Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Important Points

Datacenter Issue
Carbon Footprint
What is virtualization?
Why would we need it?
How can it improve my business?
What types of virtualization technologies exist?
Which terms should I be familiar with?
What is the cost/benefit ratio of virtualization?
What new challenges will it bring to the datacenter?
How should I structure my virtualization solution?

The utility firm must perform a power consumption analysis before the
virtualization project begins. This will identify how power is being used in
the datacenter through traditional consumption methods.
The utility firm will perform an initial analysis on potential power
consumption reductions through virtualization and use this as the
baseline for the project go-ahead.
You perform your virtualization project and transform physical servers into
virtual machines, reducing the power consumption levels.
A post-project assessment is performed.
The post-project assessment is compared to the initial baseline, and new
power consumption levels are identified. Any discrepancies between the
original baseline and the final results will be adjusted, and final monies
will be provided to the project.

FIVE-STEP PROCESS
1.
2.
3.
4.
5.

Discovery
Virtualization
Hardware maximization
Architecture
Management

Discovery
Inventory
Scan for Potential Virtualization Candidates

Categorize Server Resources


Network infrastructure and physical servers
Identity management servers
File and print servers
Application servers
Terminal servers
Dedicated web servers
Collaboration servers

Applications or workloads
categorization
Commercial versus in-house or custom applications
Legacy versus updated
Infrastructure applications
Support to the business
Line of business (LOB)
Mission-critical applications

Key Terms
Host server The physical server running virtual machine workloads.
Guest operation system A virtualized operating system running as a
workload on a host server.
Resource Pool The collection of hardware resources, including host
servers that make up the datacenter infrastructure.
Virtual Service Offerings The virtual machines that are client-facing
and offer services to end users. They are also often referred to as
virtual workloads.
Virtual Appliances (VAPs) Pre-packaged VSOs that run a specific
application or workload.
Policy-based workloads VSOs that are powered up on an as-needed
basis through automated policies.
Operating system virtualization Often misconstrued as guest OS
virtualization, this is nothing more than OS partitioning because it can

VIRTUALIZATION
Server Virtualization (SerV)
Software Virtualization (SoftV)
Hardware Virtualization (HardV)

Storage Virtualization (StoreV)


Network Virtualization (NetV)
Management Virtualization (ManageV)
Resource Pools (RP)
Virtual Services Offerings (VSO)

Desktop Virtualization (DeskV)


Presentation Virtualization (PresentV)
Application Virtualization (AppV)

VMs components
Configuration file
Hard disk file(s)
In-memory file
Virtual machine state file
Other file(s)

Server Virtualization Models

Major Server Virtualization


Vendors
Citrix
Microsoft
VMware

Benefits of server virtualization


The first one is certainly at the deployment level. A
virtual machine can often be built and customized in
less than 20 minutes. You can deliver a virtual machine
that is ready to work right away in considerably less
time than with a physical machine.
Virtual machine mobility. You can move a VM from one
host to another at any time. In some cases, you can
move it while it is running. This is a great advantage
and will help reduce downtime in your network.
Virtual machines are just easy to use.

Virtual machines support standard configurations. Just create a


standard VM and copy the source files for this VM each time
you need a new machine.
Virtual machines also support the concept of volatile services.
VMs are also secure because they can be completely isolated
at any time; just cut off their communications through the
hosts virtualization technology.
VMs can be scaled out or scaled up.
VMs are also ideal for disaster recovery, since all you need to
do is copy their files to another location, either within your
datacenter or to another site entirely.

Desktop Virtualization
Reasons for moving to virtual
desktops

You can create enterprise-standard lock-down PCs on unmanaged


remote PCs.
By centralizing the desktop through server virtualization, you can lockdown the
corporate PC image while letting users run free on the unmanaged physical desktops.

You can create time-controlled PC images.


If your organization is in the habit of hiring temporary or seasonal employees, you can
generate time-controlled virtual PC images, which will disappear once the need for
them is over.

You can also secure information by keeping desktops in the


datacenter.
By controlling how remote connections are enabled for the virtual PC, you can ensure
that any data generated through the PC image is kept within the datacenter and
cannot leave the premises.

You can encapsulate complex or sensitive applications,


isolating them from any others.
DeskV can provide a new migration path to new
operating systems.
Many people do not move to newer operating systems such as 8,8.1
because they must upgrade all of their endpoints to do so, but when
you run the new OS in a virtual environment, no endpoints need
change.

DeskV is also a great model for testing and


development.

Application virtualization
Agent Based and Agentless application virtualization
Advantages
No changes made in the os.
Any application that has been virtualized can run on any
version of Windows.

You might also like