StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How the Present-Day Data Centers are Turning to Virtual Data Centers - Research Paper Example

Cite this document
Summary
This paper 'How the Present-Day Data Centers are Turning to Virtual Data Centers' discusses that the Hyper-V process allows the virtual machine user to craft and manager one’s virtual machines process by implementing the popular virtual technology. Hyper V operates effectively in the Windows Server 2012 setup. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
How the Present-Day Data Centers are Turning to Virtual Data Centers
Read Text Preview

Extract of sample "How the Present-Day Data Centers are Turning to Virtual Data Centers"

? How the Present Day Data Centers are Turning to Virtual Data Centers September 23, There is nothing undeviating in this planet but change, especially in the information technology environment. The research delves on the advantage of virtual machines over physical machines. The research delves on the benefits of Hyper and cloud computing environment. Virtualization centers on segregating the computer resources into several execution languages with the use of partition concepts. Virtual machine users’ technology, cloud computing implementation, and hyper V implementation significantly, outweigh the benefits of physical machine use (http://technet.microsoft.com). The Hyper-V process allows the virtual machine user to craft and manager one’s virtual machines process by implementing the popular virtual technology. Hyper V operates effectively in the Windows Server 2012 setup. Hyper-V allows the virtual machines user to run several operating systems together, starting and ending at the same time on a solo physical computer. The process includes implementing the different operating systems on a separate virtual machine. Consequently, memory usage can be increased more effectively and more efficiently. Virtual machines use lesser memory compared to physical machines, saving cost by increasing the virtual machines’ restarting functions. Hyper V administration implements strict security measures by implementing a local administrator’s setup (http://technet.microsoft.com). In addition, Harley Stagner (2009) insists that Microsoft’s Virtual Server 2005 Release 2, Hyper-V is a bare metal server virtualization product. The operating system does not sit between the hardware and the hypervisor (the code implements the server virtualization process). The hypervisor (Hyper-V) is generates processing on Windows Server 2008. The Windows server is the parent partition, respectfully a privileged guest virtual machine. Virtual machines have gained popularity in the computer environment. To join the bandwagon, Microsoft offers Hyper –V program. The program works in Windows Server 2008 R2 and Windows Server 20008 infrastructure environment. Hyper-V enhances software infrastructure and management tools needed to craft and administer the virtual server system. Hyper-V contains dynamic memory. The virtual environment augments and improves the use of the physical machine environment (http://technet.microsoft.com). How the move to virtualization affects our data networks today. Singh Amit theorized the move to virtualization enhances data network processing today (http://www.kernelthread.com). First, virtual machines can combine the data processing of many less maximized servers to a lesser number of machines, including only one server consolidating machine. Consequently, the users can reduce avoidable costs. Second, virtual machines increase the effectiveness and efficiency of legacy processes. Virtual machines help in the individuals’ or companies’ strive to achieve goals and plans. The same processes may not work on newly installed hardware or newly bought operating systems. Likewise, the use of the newly installed hardware or newly bought operating systems will not maximize server use, unlike the virtual machines (http://www.kernelthread.com). Further, virtual machines offer enhanced security that includes isolated sandboxes to access and process trust-lacking programs or websites (http://www.kernelthread.com). One can implement address obfuscation to implement on the fly environments that are downloaded from the internet sites, increasing the danger of accessing trust-lacking websites. Such websites may steal information from the downloading computer and wreak havoc on the computers’ processing time and processing output quality. Virtual machines popularity is based on the concept of creating secured computing environments (http://www.kernelthread.com). Furthermore, virtual machines offer hardware illusions and configure the users’ hardware, which is absent (http://www.kernelthread.com). This includes the SCSI hardware and multiple processors. Virtual machines can mimic or simulate the network that connects data from several independent computers (http://www.kernelthread.com). Virtual machines can operate several operating environments together (http://www.kernelthread.com). The same machines can work on different operating system versions. In addition, the machines work effectively and efficiently using hot standby modes. On the other hand, the same operating systems cannot function on new real hardware systems compared to the virtual machine scenario (http://www.kernelthread.com). In addition, virtual machines smoothly permits powerful debug procedures and monitoring of program performance. The users can also implement the debug and monitoring software on the virtual machines. Consequently, virtual machines allow debug and monitoring without a decline in current productivity outputs. Virtual machines work best in complicated debugging environments (http://www.kernelthread.com). This move to virtualization is more efficient and secure. Jessica Sanford (2010) proposed the move to virtual machines makes data processing more efficient and secure. A system administrator for the cloud provider who has control over the backend can initiate attacks to access the customers’ memory. The system administrator can install software to infiltrate the clients’ confidential information. The attacks include cold boot attacks and hardware tampering. In response, the service providers can institute strict security devices to prevent the successful attacks of the system administrator. Restricted access control policies as well as surveillance procedures, CCTV, Password, Security guards, can help hinder the administrator’s plans. By implementing a perimeter security plan, the service provider can prevent the hackers or confidential information thieves from entering and accessing the virtual machines. To avoid the system administrator’s overpowering the passwords and hacking the files, Trusted Computing Group proposes two components will deter the administrator’s illegal acts. The two components are the trusted VM monitor and Trusted coordinator. The components will have nodes that host the customers’ virtual machines. The virtual machine monitor protects its own integrity by incorporating access passes through the secure boot process. The trusted coordinator manages the set of nodes that run the clients’ virtual machines. Both components monitor any hacking that is conducted by unauthorized persons. In addition, Iain Craig announced that increasing security within the virtual machines environment includes “examining the code executed by a virtual machine….verifying that code does not access files (Craig, 2005; p. 215).” Another security enhancement procedure includes adding digital signatures to code. The virtual machines procedures include verifying the signatures before loading the given code. A third security procedure is to prevent connection to sites that are classified as malicious or insecure. Security procedures always incorporate preventing entry of malicious code being introduced by trust-lacking locations (Craig, 2005). Further, cloud computing and virtual machines reduce the cost of carrying bulky physical machines. The individuals may forget their laptops at home. Likewise, the managers may forget their IPods in their office. The seminar speakers may accidentally misplace their report day. In all these situations, virtual machines can alleviate the situation. The virtual machines can hide a backup copy of the files. The cloud or virtual machine users can log on to nay available computer terminal. The virtual machine users can download their cloud computing saved files and as well virtual machine saved files. In addition, virtual machines will surely reduce the cost of retrieving lost files. The manager will pay more to return to the office and retrieve the files compared to downloading the files from cloud computing and virtual machine sites. The seminar speakers will save more money retrieving files from virtual machines and cloud computing sites compared to riding a plane back to Washington D.C. to retrieve files needed for the California seminar discussion. Lastly, the individuals will pay less retrieving files from virtual machines compared to travelling 5,000 miles to locate the lost laptop tucked in the hotels. Further, Mark Ciampa (2011) insists there are other security advantages of virtual machine engagements. The latest patches can be downloaded to improve the virtual machine’s security. Penetration testing is implemented test attacks. The penetration tests are used to improve virtual machine’s the current security defenses. Further, virtual machine can be used as training for increasing security defenses of the physical machines. Scott Lowe (Lowe, 2009) emphasizes some hackers can easily access information from physical machines, compared to the virtual machines. The hiding of confidential data in cloud computing and virtual machines does not tempt the information thieves, reducing the possibility of information hacking. The author insists that ESX configuration guide, available at http:www.virtual machineware.com/pdf/vshpere4/r40/vsp_esx_vc_installation_guide.pdf increase the security defenses of the virtual machines. For example, removing the copy and paste function prevents copying and transferring of confidential information using the isolatin.tools.copy.disable = “true” and isolation.tools.paste.disable = “true” file commands. In addition, preventing the virtual machine user from connecting or disconnecting network adaptor and other devices prevents computer security threats. The cost is not that big of a change for company to move to this direction. Dan Sullivan (Sullivan, 2009) proposed the cost is that big when changing to the virtual machine environment. Virtual machines create high level duplicate information. The duplication reduces information processing costs. The virtual machine can back up itself to ensure confidential data is not lost in the clouds or virtual machines. Cloud computing and virtual machines lessen needs for purchasing additional physical hard drives and other storage devices. Further, Tim Cerling (2009) theorized the company’s virtual machine process reduces the company’s need to purchase additional physical machines. Physical machines deteriorate. Virtual machines do not deteriorate. Virtual machines thrive on lesser physical servers compare to the physical machines. Virtual machines allow the combination of several servers to reduce maintenance costs. In layman’s terms, Colin Drury (2006) opines entities will save lots of money from the implementation of virtual machines. The companies instruct their employees to upload their files in the virtual machines. Consequently, an employee from another country can easily retrieve the files using the virtual machines. On the other hand, an employee will receive huge repercussions for accidentally deleted files. Deleted files crop up when computers are infected with virus and other computer attacks. In terms of cost savings, physical machines costs significantly higher than virtual machines. Physical machines deteriorate (Drury, 2006). On the other hand, virtual machines do not deteriorate. Deterioration principles state that the value of a physical object decreases due to time or use. The computers will physically breakdown. When this happens, the physical machine owners must replace the deteriorated physical machines. Some computers cost significantly high (Drury, 2006). A server room needs lots of budget money. The maintenance of a secure computer environment entails hiring computer technicians, computer programmers, and computer users. In addition, the physical machine owners must pay the cost of keeping the physical machine cool by purchasing air conditioners (Drury, 2006). In addition, the companies must hire security guards to ensure unauthorized individuals from accessing the confidential and restricted computer environments (Drury, 2006). To save on cost, using virtual machines allow simplifying information technology as the virtual machine users craft more dynamic as well as flexible data transfer, using VMware servers as well as its data virtual machine programs (http://www.vmware.com/virtualization/). VMware is the virtual machine environment’s most popular virtual machines environment, reducing computing expenses and increasing information storage and transfer security by decreasing downtime events (http://www.vmware.com/virtualization/). In addition, Mitch Tulloch (2010) reiterated virtual machines technology reduces the number of physical computers, significantly decreases operating costs while acting as host to the virtual machine users’ information transfer activities, especially where large data transfer entities implement the virtual machines processes. Tulloch (2010) insists virtual machines technology includes Microsoft Virtual Desktop Infrastructure (VDI), composed of Hyper-V, Remote Desktop services, Microsoft Desktop Optimization Pack (MDOP) and Microsoft System Center products that permits desktop operating system processes such as Windows 7 Enterprise to smoothly run on hypervisor servers. ANALYSIS: Analyzing the discussion, individuals can trust the virtual machines and cloud computing companies. Some cloud computing and virtual machine companies are stalwarts in the cloud computing industry. The cloud computing companies act as online hard disks of the companies. The cloud computing and virtual machine companies receive a minimal amount for keeping the confidential files of the customers. In return, the virtual machine customers or users are assured that their files are secure. Further, the cloud computing and virtual machine users will save huge amounts. The savings are based on comparing the use of virtual machines and cloud computing use and buying several laptops, personal computers, IPods, and Iphones to process the same financial and other confidential data. Summarizing the above topic, there is nothing for in this complex world except continuing change, particularly within the context of information technology. The advantages of virtual machines over physical machines are very evident. The benefits of Hyper-V, VMware, cloud computing, and other virtual machine processes is very recognizable. Virtualization incorporates the setting up of the physical machines’ partitioning into several virtual machines. Evidently, the implementations of virtual machine use, VMware employ, cloud computing utilization, and Hyper-V operation greatly outshine the benefits of lone physical machine implementation. | REFERENCES: Cerling, T. (2009). Mastering Microsoft Virtualization. New York: J. Wiley & Sons Press. Ciampa, M. (2011). Security Guide to Network Security Fundamentals. New York: Cengage Learning Press. Hyper-V, retrieved September 22, 2012, from Craig, I. Virtual Machines. New York: Springer Press. Drury, Colin. (2006). Cost and Management Accounting. New York: Thompson Press. Lowe, S. (2009). VMware v Sphere 4 Administration Instant Reference. New York: J. Wiley & Sons Press. Sanford, J. (2010). Transforming Enterprise Cloud Services. New York: Springer Press. Singh, A., An Introduction to Virtualization, retrieved September 21, 2012, from Sullivan, D. (2009). The Shortcut Guide to Availability, Continuity, and Disaster Recovery. New York: Real Time Press. Stagner, H. (2009). Pro Hyper-V. New York: Apress Press.s Tulloch, M. (2010). Understanding Microsoft Virtualization Solutions (Second Edition). New York: Microsoft Book Press. VMware, retrieved September 22, 2012, from Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How the present day data centers are turning to virtual data centers Research Paper”, n.d.)
How the present day data centers are turning to virtual data centers Research Paper. Retrieved from https://studentshare.org/information-technology/1457374-how-the-present-day-data-centers-are-turning-to
(How the Present Day Data Centers Are Turning to Virtual Data Centers Research Paper)
How the Present Day Data Centers Are Turning to Virtual Data Centers Research Paper. https://studentshare.org/information-technology/1457374-how-the-present-day-data-centers-are-turning-to.
“How the Present Day Data Centers Are Turning to Virtual Data Centers Research Paper”, n.d. https://studentshare.org/information-technology/1457374-how-the-present-day-data-centers-are-turning-to.
  • Cited: 0 times

CHECK THESE SAMPLES OF How the Present-Day Data Centers are Turning to Virtual Data Centers

Data analysis

Table 1 shows the percentages of teachers from Kuwait who responded to each item measuring the necessity of the reforms to be an effective science teacher.... Over eighty-five percent of teachers believed that the reforms strands were “necessary” or “very necessary” to be… Apart from reform strand classroom management (about 12 percent), in all other reforms, less than ten percent teachers did not believe the reforms were necessary or were uncertain it was needed. Table 2 shows the degree to which teachers from Kuwait Teachers report using many of the reform strands almost every day or several times a week....
3 Pages (750 words) Speech or Presentation

Data analysis

data have been collected in an excel spread sheet from 138 teachers with the help of the questionnaires in relation to the topic that is teachers' mobility and turnover.... The collected data is then analyzed using the software SPSS to determine the result.... The data collected are in the form of the numbers representing each option for every question.... Thus, there was no need to calculate the mean and the median for the given data....
3 Pages (750 words) Speech or Presentation

Data Acquisition and 3D Modelling

The paper "3D data Acquisition and Modeling" proves 3D data acquisition and modeling techniques have the potential of being used with the full propensity in the diversified and versatile areas such as the medical sciences or the Oil exploration industry, for the betterment of humankind.... hellip; data acquisition, with respect to 3D modeling, refers to the collection of data that is used to represent a physical object that exists....
7 Pages (1750 words) Speech or Presentation

Report on Oasis Wellness Center Participation Progress

In the paper "Report on Oasis Wellness Center Participation Progress" the author discusses that he has applied some of the problem-solving techniques that he has learned.... This includes assessing the situation and evaluating individuals with mental illness.... nbsp;… I have recommended the use of peers as a solution to some of the problems....
1 Pages (250 words) Speech or Presentation

Elements Conference & Event Centre Fulfilling the Business Needs

We have specialized and dedicated ourselves to the business of turning your vision into reality for years.... This paper "Elements Conference & Event Centre Fulfilling the Business Needs" focuses on the fact that the author would like to take this prospect to bring Elements to your valued attention....
1 Pages (250 words) Speech or Presentation

The Data Scientists

They argue that data is one of the things already happening and massively changing the face of the earth.... In this regard, a suggestion is made… With data an improvement is eminent in the production industry, to undertake various processes and also to help bringing about new ones data Scientists data scientists make a myriad of recommendations regarding the future following the past and present trends emanating from data usage....
1 Pages (250 words) PowerPoint Presentation

What Happens During an Interview

In the paper "What Happens During an Interview" the author highlights that maintaining eye contact with the panellists is advised as it is a show of self-confidence.... When given a chance to ask questions to the panellists, a candidate should ask well structured and rational questions.... hellip; an interview starts immediately a candidate enters the premises and ends when the candidate vacates the premises hosting the interview....
7 Pages (1750 words) Speech or Presentation

Yoga Classes at the Snowpea City Recreation Center

The paper "Yoga Classes at the Snowpea City Recreation Center" addresses the following concerns - the reality is that the line of thinking espoused by those who are trying to promote yoga and to argue down Hindus who insist on the religious roots of yoga cannot be made universal.... hellip; We have to stop the teaching of yoga at the Snowpea City Recreation Center because teaching yoga amounts to endorsing the Hindu religion in a public arena, and violates the sacred doctrine of the separation of the state and the church....
6 Pages (1500 words) Speech or Presentation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us