Course File-Unit 4
Course File-Unit 4
Unit-4 Virtualization
Virtualization technology refers to the process of creating a virtual (rather than actual)
version of something, such as an operating system, server, storage device, or network
resources. In computing, virtualization enables multiple virtual instances or environments
to run on a single physical hardware platform.
1. Server Virtualization: This involves partitioning a physical server into multiple virtual
servers, each capable of running its own operating system and applications independently.
It helps optimize server resources and improves scalability and flexibility.
3. Storage Virtualization: This abstracts physical storage resources into a single virtual
storage pool, which can be allocated dynamically to different applications or users. It
simplifies storage management and improves resource utilization.
Virtualization technology offers several benefits, including cost savings, improved resource
utilization, enhanced flexibility and scalability, simplified management, and increased
efficiency. It has become a fundamental component of modern IT infrastructure, driving
cloud computing, data center consolidation, and software-defined networking, among
other trends.
Benefits of Virtualization
Virtualization offers a wide range of benefits across various aspects of IT infrastructure and
operations:
1. Cost Savings: By consolidating multiple virtual instances onto fewer physical servers,
organizations can save on hardware costs, power consumption, cooling, and physical space
Page | 1
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
requirements. Additionally, virtualization reduces the need for additional hardware investments by
maximizing resource utilization.
2. Improved Resource Utilization: Virtualization enables more efficient use of computing resources
by allowing multiple virtual environments to share physical hardware. This leads to higher server,
storage, and network utilization rates, maximizing the return on investment for IT infrastructure.
3. Flexibility and Scalability: Virtualization provides organizations with the ability to quickly
provision and scale resources as needed. Virtual machines (VMs) and virtualized storage can be
easily created, replicated, and moved between physical servers, enabling rapid deployment of new
applications and services to meet changing business demands.
4. Enhanced Disaster Recovery and Business Continuity: Virtualization simplifies the process of
creating and managing backup copies of virtual machines, making disaster recovery planning more
straightforward. Virtualized environments can be replicated and migrated to secondary data centers
or cloud platforms, ensuring continuity of operations in the event of hardware failures or disasters.
6. Better Testing and Development Environments: Virtualization provides developers and testers
with on-demand access to isolated virtual environments that closely resemble production
environments. This facilitates faster software development cycles, reduces time-to-market, and
improves the quality of software releases.
7. Improved Security: Virtualization helps enhance security by isolating applications and workloads
in separate virtual environments. Vulnerabilities in one virtual instance are less likely to impact
other instances or the underlying physical infrastructure. Additionally, virtualization enables the
implementation of advanced security features, such as virtual firewalls, intrusion detection systems,
and encryption.
8. Green IT Initiatives: By reducing the number of physical servers and optimizing resource
utilization, virtualization contributes to energy efficiency and environmental sustainability goals.
Organizations can lower their carbon footprint and operating costs while supporting green IT
initiatives.
Overall, virtualization technology offers a compelling value proposition for businesses seeking to
optimize IT infrastructure, reduce costs, and increase agility and resilience in today's dynamic
digital landscape.
Page | 2
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
virtualization primarily depends on the specific requirements of the organization and the
type of resources being virtualized. Here are some common implementation levels of
virtualization:
3. Storage Virtualization:
Storage virtualization abstracts physical storage resources from the underlying hardware
and presents them as logical storage pools.
It enables centralized management of storage resources, data migration, replication, and
tiering without requiring changes to the existing storage infrastructure.
Storage virtualization solutions include software-defined storage (SDS) platforms, storage
area network (SAN) virtualization, and network-attached storage (NAS) virtualization.
4. Network Virtualization:
Network virtualization abstracts network resources, such as switches, routers, and firewalls,
into logical entities that can be provisioned and managed independently from the
underlying physical network infrastructure.
It enables the creation of virtual networks (overlay networks) that operate on top of the
physical network, providing segmentation, isolation, and flexibility.
Page | 3
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
Technologies like VXLAN (Virtual Extensible LAN), NVGRE (Network Virtualization using
Generic Routing Encapsulation), and SDN (Software-Defined Networking) facilitate network
virtualization.
5. Application Virtualization:
Application virtualization separates applications from the underlying operating system and
hardware, allowing them to run in isolated environments.
Virtualized applications are encapsulated with their dependencies and configurations,
enabling portability, compatibility, and security.
Examples of application virtualization solutions include Citrix XenApp, Microsoft App-V
(Application Virtualization), and VMware ThinApp.
Virtualization Structure
1. Physical Infrastructure:
This layer consists of the underlying hardware resources, including servers, storage devices,
networking equipment, and data center facilities.
Physical infrastructure provides the foundation on which virtualization is built and
encompasses the resources that will be abstracted and virtualized.
2. Hypervisor:
The hypervisor, also known as a Virtual Machine Monitor (VMM), is a software layer that
enables hardware virtualization by abstracting and managing the underlying physical
hardware resources.
It allows multiple virtual machines (VMs) to run concurrently on a single physical server,
each with its own isolated operating system and applications.
There are two types of hypervisors: Type 1 (bare-metal) hypervisors, which run directly on
the hardware, and Type 2 (hosted) hypervisors, which run on top of a host operating
system.
Page | 4
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
4. Management Layer:
The management layer includes tools and software platforms used to provision, monitor,
configure, and manage virtualized resources across the IT infrastructure.
Management solutions provide centralized control and visibility into virtualized
environments, allowing administrators to automate tasks, enforce policies, and optimize
resource utilization.
Examples of management tools include VMware vCenter Server, Microsoft System Center
Virtual Machine Manager (SCVMM), and OpenStack.
5. Networking Virtualization:
6. Storage Virtualization:
Storage virtualization abstracts physical storage resources and presents them as logical
storage pools, which can be dynamically allocated and managed.
Virtualized storage enables features such as thin provisioning, snapshots, replication, and
automated tiering, improving storage efficiency and flexibility.
Storage virtualization solutions may be implemented using software-defined storage (SDS)
platforms, storage virtualization appliances, or storage area network (SAN) virtualization
technologies.
Hypervisor
Page | 5
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
A hypervisor, also known as a Virtual Machine Monitor (VMM), is a software layer that
enables hardware virtualization by abstracting and managing the underlying physical
hardware resources. Its primary function is to create and manage virtual machines (VMs),
allowing multiple operating systems and applications to run independently on a single
physical server.
2. Isolation: Hypervisors provide strong isolation between virtual machines, ensuring that
each VM operates independently of others. This isolation prevents one VM from affecting
the performance or stability of other VMs on the same physical server.
4. Management and Control: Hypervisors offer management interfaces and tools for
configuring, monitoring, and controlling virtualized environments. Administrators can use
these tools to create, start, stop, migrate, and delete virtual machines, as well as adjust
resource allocations and settings.
5. Types of Hypervisors:
Page | 6
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
VMware
VMware is a leading provider of virtualization and cloud computing software and services.
Founded in 1998, VMware has been instrumental in revolutionizing the IT industry by
popularizing virtualization technologies that enable organizations to run multiple virtual
machines (VMs) on a single physical server.
2. ESXi Hypervisor: ESXi is VMware's bare-metal hypervisor that runs directly on physical
server hardware. It provides the foundation for virtualization by abstracting and managing
hardware resources, allowing multiple VMs to run concurrently on a single server.
5. Cloud Services: VMware has expanded its portfolio to include cloud computing services
through its VMware Cloud offerings. VMware Cloud enables organizations to seamlessly
extend their on-premises VMware environments to the public cloud, including VMware
Cloud on AWS, VMware Cloud on Dell EMC, and VMware Cloud on IBM Cloud.
Page | 7
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
7. Acquisitions: Over the years, VMware has made several strategic acquisitions to expand its
product portfolio and strengthen its position in the market. Notable acquisitions include
Nicira (NSX network virtualization), AirWatch (enterprise mobility management), and
Pivotal Software (application development platform).
KVM
2. Integration with Linux Kernel: KVM is part of the mainline Linux kernel, which means it is
included in many Linux distributions by default. This integration allows KVM to take
advantage of kernel features and optimizations, resulting in efficient virtualization.
4. QEMU Integration: KVM works in conjunction with the Quick Emulator (QEMU), a user-
space virtualization tool, to provide device emulation and management capabilities for
virtual machines. QEMU handles tasks such as disk and network I/O emulation, while KVM
accelerates CPU virtualization.
Page | 8
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
6. Security Features: KVM includes built-in security features to isolate and protect virtual
machines from each other and from the host system. This includes features like SELinux
integration, CPU and memory isolation, and virtualization-based security (VBS)
enhancements.
7. Performance and Scalability: KVM is known for its excellent performance and scalability,
making it suitable for a wide range of use cases, from small-scale virtualization
deployments to large data center environments. It supports features such as live migration,
memory ballooning, and CPU hotplug.
8. Open Source and Community-driven: KVM is open-source software released under the
GNU General Public License (GPL). It benefits from a large and active community of
developers and contributors who continuously improve and enhance the technology.
Overall, KVM provides a powerful and flexible platform for running virtualized workloads
on Linux-based systems, offering performance, scalability, and security advantages for
organizations deploying virtualization solutions.
Xen:
Xen is an open-source hypervisor that enables virtualization on x86, x86-64, IA-64, ARM,
and other CPU architectures. Originally developed by researchers at the University of
Cambridge, Xen has evolved into a powerful virtualization platform widely used in both
enterprise and cloud computing environments.
Page | 9
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
HVM allows unmodified guest OSes to run using hardware virtualization extensions (e.g.,
Intel VT-x, AMD-V).
3. Dom0 and DomU: In Xen, the hypervisor runs as the privileged "Dom0" (Domain 0)
domain, which has direct access to physical hardware and manages other "DomU"
(Domain U) guest domains. DomU domains run unmodified operating systems and
applications, which can be either paravirtualized or fully virtualized.
4. Xen Project: Xen is part of the Xen Project, an open-source community-driven initiative
focused on developing and maintaining the Xen hypervisor and related technologies. The
Xen Project community includes developers, contributors, and users collaborating to
improve the Xen ecosystem.
5. Features and Capabilities: Xen offers a wide range of features and capabilities, including:
Live migration: Allows VMs to be migrated between physical hosts with minimal downtime.
Memory ballooning: Dynamic adjustment of memory allocation to VMs based on demand.
CPU pinning: Assigning specific CPU cores to VMs for improved performance isolation.
NUMA (Non-Uniform Memory Access) awareness: Optimizing memory access for VMs
running on NUMA architectures.
Security features: Xen includes security enhancements such as memory protection, access
control, and isolation to ensure strong security boundaries between VMs.
6. Integration with Cloud Platforms: Xen is widely used as a virtualization platform in cloud
computing environments. It is integrated with popular cloud platforms and orchestration
frameworks such as OpenStack, AWS (Amazon Web Services), and Oracle Cloud
Infrastructure.
Overall, Xen is a mature and versatile hypervisor that provides robust virtualization
capabilities for diverse workloads, from traditional server virtualization to cloud computing
and infrastructure as a service (IaaS) deployments. Its open-source nature and active
community contribute to its ongoing development and innovation in the virtualization
space.
Virtualization of CPU:
Page | 10
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
3. Virtual CPU Allocation: The hypervisor dynamically allocates virtual CPUs (vCPUs) to each
VM based on its resource requirements and workload characteristics. Each vCPU is
presented to the guest operating system as a logical processor core, enabling the VM to
execute instructions and schedule tasks as if it had dedicated CPU hardware.
4. CPU Scheduling: The hypervisor schedules the execution of vCPUs from different VMs on
the physical CPU cores, using techniques such as time slicing and priority-based
scheduling. This ensures fair and efficient utilization of CPU resources among VMs while
preventing resource contention and performance degradation.
5. CPU Context Switching: When switching between VMs, the hypervisor performs CPU
context switches to save and restore the state of each vCPU. This includes saving register
values, processor flags, and other CPU context information associated with the current VM
and loading the corresponding state for the next VM to be scheduled.
Page | 11
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
Virtualization of memory:
4. Memory Protection and Isolation: Memory virtualization provides strong protection and
isolation between VMs to prevent unauthorized access and interference. Each VM's
memory space is isolated from other VMs and the host system, ensuring that VMs cannot
access or modify memory belonging to other VMs or the hypervisor.
Page | 12
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
memory balloon drivers within VMs to reclaim unused memory and reallocate it to other
VMs as needed, improving memory utilization and efficiency.
6. Page Table Management: The hypervisor manages the page tables used by VMs to
translate virtual memory addresses to physical memory addresses. This includes
maintaining separate page tables for each VM, handling memory mapping and allocation
requests, and ensuring consistency and integrity of memory mappings.
Overall, memory virtualization plays a critical role in enabling efficient resource utilization,
scalability, and isolation in virtualized environments. Advances in memory management
techniques and hypervisor technologies continue to drive improvements in memory
virtualization performance and efficiency, supporting the growing demands of modern
virtualized workloads.
1. Device Abstraction: The hypervisor, or virtual machine monitor (VMM), intercepts I/O
requests from VMs and abstracts them into a standardized interface that can be forwarded
to the physical I/O devices. This abstraction layer allows VMs to access I/O devices without
requiring knowledge of the underlying hardware specifics.
2. Device Emulation vs. Passthrough: There are two main approaches to virtualizing I/O
devices:
Device Emulation: In this approach, the hypervisor emulates virtual devices that mimic the
behavior of physical devices. VMs interact with these virtual devices, and the hypervisor
translates their requests into commands that are executed by the physical hardware.
Page | 13
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
Emulated devices offer compatibility with a wide range of guest operating systems but
may incur performance overhead.
Device Passthrough (Direct Assignment): With device passthrough, also known as direct
assignment or device assignment, the hypervisor assigns physical I/O devices directly to
VMs, bypassing the virtualization layer. This provides near-native performance and reduces
overhead but requires hardware support (such as Intel VT-d or AMD-Vi) and may limit VM
mobility and flexibility.
Network Virtualization: Technologies such as VirtIO and SR-IOV (Single Root I/O
Virtualization) are used to virtualize network adapters and provide efficient network
connectivity to VMs.
Storage Virtualization: Storage virtualization technologies, such as VirtIO SCSI and
NVMe-oF (NVMe over Fabrics), enable VMs to access virtualized storage resources with
high performance and low latency.
Graphics Virtualization: Graphics virtualization solutions, such as vGPU (Virtual GPU) and
GPU passthrough, allow VMs to leverage hardware-accelerated graphics capabilities for
applications such as gaming, CAD/CAM, and multimedia.
4. I/O Device Management: The hypervisor is responsible for managing the allocation,
configuration, and security of virtualized I/O devices. This includes tasks such as device
discovery, device assignment to VMs, I/O device emulation, and performance optimization.
Overall, virtualization of I/O devices enables efficient resource sharing, improved scalability,
and flexible deployment of virtualized workloads in data centers, cloud environments, and
virtual desktop infrastructure (VDI) deployments. Advances in I/O virtualization
technologies and hypervisor capabilities continue to drive innovation in virtualized I/O
solutions, supporting the evolving needs of modern virtualized environments.
Virtual cluster and resource management refer to the processes and technologies used to
efficiently allocate, monitor, and optimize resources within a cluster of virtualized servers
Page | 14
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
or machines. These clusters may consist of virtual machines (VMs), containers, or other
virtualized resources, and the management solutions aim to ensure that resources are
utilized effectively to meet performance, availability, and scalability requirements.
2. Workload Placement and Scheduling: Virtual cluster managers determine where to place
workloads within the cluster based on factors such as resource availability, affinity or anti-
affinity rules, and workload characteristics. Workload scheduling algorithms optimize
resource utilization and performance by balancing workload distribution across cluster
nodes.
4. High Availability and Fault Tolerance: Virtual cluster managers ensure high availability
and fault tolerance by automatically detecting and mitigating hardware failures, VM
crashes, and other system disruptions. They may utilize features such as live migration,
fault tolerance mechanisms, and automated failover to minimize downtime and maintain
service continuity.
Page | 15
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
7. Multi-tenancy and Isolation: Virtual cluster managers ensure multi-tenancy and workload
isolation by enforcing resource quotas, access controls, and network segmentation
policies. They prevent resource contention and interference between different tenants or
workloads sharing the same cluster infrastructure.
8. Scalability and Elasticity: Virtual cluster management solutions enable clusters to scale
dynamically in response to changing workload demands. They support elastic scaling by
automatically adding or removing resources, adjusting resource allocations, and
rebalancing workloads across cluster nodes as needed.
Overall, virtual cluster and resource management play a crucial role in optimizing the
efficiency, performance, and resilience of virtualized infrastructure environments. By
effectively managing resources within virtual clusters, organizations can achieve better
resource utilization, lower costs, and improved agility in delivering IT services.
Virtualization of Server:
Server virtualization is the process of abstracting physical servers into virtualized instances,
allowing multiple virtual machines (VMs) to run on a single physical server. This technology
decouples the operating system and applications from the underlying hardware, enabling more
efficient utilization of server resources and greater flexibility in managing workloads.
2. Creation of Virtual Machines: Once the hypervisor is installed, virtual machines (VMs) can be
created on the server. Each VM represents a self-contained virtualized environment with its own
operating system, applications, and configuration settings. Multiple VMs can coexist on the same
physical server, sharing its resources while remaining isolated from each other.
3. Resource Allocation: The hypervisor dynamically allocates physical hardware resources, such as
CPU cores, memory, and storage, to each virtual machine based on its resource requirements.
Resource allocation can be adjusted dynamically to accommodate changing workload demands,
ensuring optimal performance and efficiency.
Page | 16
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
5. Management and Administration: Server virtualization platforms provide management tools and
interfaces for provisioning, monitoring, and managing virtualized environments. Administrators can
use these tools to create, configure, start, stop, and migrate virtual machines, as well as monitor
resource usage and performance metrics.
6. Live Migration and High Availability: Server virtualization platforms often support features such
as live migration and high availability to enhance workload mobility and resilience. Live migration
allows VMs to be moved between physical servers with minimal downtime, while high availability
features automatically restart VMs on alternate hosts in the event of hardware failures or
disruptions.
7. Backup and Disaster Recovery: Server virtualization simplifies backup and disaster recovery
processes by encapsulating VMs into files that can be easily backed up, replicated, and restored.
Virtualization platforms offer built-in tools and integration with third-party backup solutions to
ensure data protection and business continuity.
Overall, server virtualization has become a foundational technology in modern data centers,
enabling organizations to improve agility, scalability, and efficiency while reducing costs and
complexity in managing IT infrastructure.
Virtualization of Desktop:
Page | 17
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
2. Virtual Desktop Creation: Virtual desktops are created as VMs on the VDI platform. Each
virtual desktop instance includes an operating system (such as Windows or Linux),
applications, user settings, and data, similar to a traditional physical desktop.
3. User Access: Users access their virtual desktops using remote desktop protocols (such as
RDP, PCoIP, or HDX) from endpoint devices such as thin clients, laptops, tablets, or
smartphones. These devices connect to the VDI platform over a network connection,
allowing users to interact with their virtual desktops as if they were running locally.
Persistent Desktops: Each user is assigned a dedicated virtual desktop instance with
personalized settings and data. Persistent desktops provide a consistent user experience
across sessions and allow users to customize their desktop environments.
Non-Persistent Desktops: Virtual desktop instances are pooled and shared among
multiple users. Each user gets a fresh desktop session whenever they log in, and changes
made during the session are discarded when the user logs out. Non-persistent desktops
are often used in environments with high user turnover or where standardized desktop
configurations are required.
5. Resource Allocation: The VDI platform dynamically allocates compute, memory, and
storage resources to virtual desktop instances based on user demand and workload
requirements. Resource allocation is optimized to ensure that each user's virtual desktop
performs adequately without over-provisioning resources.
8. Mobility and Flexibility: Desktop virtualization enables users to access their desktop
environments from anywhere, using any device with an internet connection. This enhances
Page | 18
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
mobility, productivity, and flexibility by allowing users to work remotely or access their
desktops while on the go.
Virtualization of Network:
2. Virtual Desktop Creation: Virtual desktops are created as VMs on the VDI platform. Each
virtual desktop instance includes an operating system (such as Windows or Linux),
applications, user settings, and data, similar to a traditional physical desktop.
3. User Access: Users access their virtual desktops using remote desktop protocols (such as
RDP, PCoIP, or HDX) from endpoint devices such as thin clients, laptops, tablets, or
smartphones. These devices connect to the VDI platform over a network connection,
allowing users to interact with their virtual desktops as if they were running locally.
Persistent Desktops: Each user is assigned a dedicated virtual desktop instance with
personalized settings and data. Persistent desktops provide a consistent user experience
across sessions and allow users to customize their desktop environments.
Non-Persistent Desktops: Virtual desktop instances are pooled and shared among
multiple users. Each user gets a fresh desktop session whenever they log in, and changes
Page | 19
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
made during the session are discarded when the user logs out. Non-persistent desktops
are often used in environments with high user turnover or where standardized desktop
configurations are required.
5. Resource Allocation: The VDI platform dynamically allocates compute, memory, and
storage resources to virtual desktop instances based on user demand and workload
requirements. Resource allocation is optimized to ensure that each user's virtual desktop
performs adequately without over-provisioning resources.
8. Mobility and Flexibility: Desktop virtualization enables users to access their desktop
environments from anywhere, using any device with an internet connection. This enhances
mobility, productivity, and flexibility by allowing users to work remotely or access their
desktops while on the go.
Virtualization of data centers involves abstracting and pooling computing, storage, and
networking resources to create a flexible and efficient infrastructure that can support
diverse workloads and applications. Virtualization enables organizations to consolidate
physical hardware, optimize resource utilization, and improve scalability, agility, and cost-
effectiveness within their data centers.
Page | 20
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
5. Resource Pooling and Allocation: Data center virtualization enables resource pooling and
allocation, allowing organizations to dynamically allocate computing, storage, and
networking resources to different workloads and applications based on demand. This
improves resource utilization, reduces over-provisioning, and enhances scalability and
flexibility within the data center.
7. Scalability and Elasticity: Data center virtualization enables organizations to scale their
infrastructure dynamically to accommodate changing workload demands. Virtualized
resources can be added or removed on-demand, allowing organizations to scale up or
down quickly in response to fluctuating business requirements, seasonal peaks, or growth.
Page | 21
Swami Keshvanand Institute of Technology, Management & Gramothan,
Ramnagaria, Jagatpura, Jaipur-302017, INDIA
Approved by AICTE, Ministry of HRD, Government of India
Recognized by UGC under Section 2(f) of the UGC Act, 1956
Tel. : +91-0141- 5160400Fax: +91-0141-2759555
E-mail: info@skit.ac.in Web: www.skit.ac.in
Overall, data center virtualization transforms traditional data centers into agile, scalable,
and cost-effective IT environments that can support the evolving needs of modern
businesses. It lays the foundation for cloud computing, hybrid cloud deployments, and
digital transformation initiatives, enabling organizations to innovate and compete more
effectively in today's digital economy.
Page | 22