StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Systems and Virtualization - Assignment Example

Cite this document
Summary
The paper "Computer Systems and Virtualization" highlights that the Virtual Directory is a separate register including a website that connects to an additional directory. On the local server or over the shared network this can be associated with the virtual directory…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Computer Systems and Virtualization
Read Text Preview

Extract of sample "Computer Systems and Virtualization"

Question 1 Virtualization In simple words, it is defined as “the creation of a product, service, or organization that has an electronic ratherthan a physical existence” (Virtualization, 2007). Virtualization in the context of cloud computing refers to Server Virtualization, Desktop Virtualization, Storage Virtualization and Network Visualization. Server Virtualization is related with replicating the resources such as processors, applications and users along with the physical server. Moreover, server virtualization can be divided in to 3 categories i.e. Mainframe, Midrange and commodities. Mainframe includes virtual machine that is used for running an operating system virtually and ‘z Linux’ a virtual server for Linux developed by IBM. The Midrange virtualization includes Solaris containers and zones and the commodity virtualization consists of VM ware, Oracle VM and Xen. The desktop virtualization is categorized in two PC / MAC and Virtual desktop infrastructure (VDI). The category named as PC / MAC includes virtual box, virtual PC etc. VDI consists of Oracle VDI and desktop virtualization by Citrix. The next category is the storage virtualization, which includes storage area networks and arrays developed by Exadata, Netapps etc. Lastly, there is a category named as network visualization consisting of Virtual Local Area Networks (VLAN). A single piece of hardware is divided into multiple instance by a technology is known as virtualization. The OS (operating system) along with hardware is similar even before virtualization. The division of hardware makes the resource transmission simple as, an operating system (OS) needs to utilize all resources that are available in a box. A single box with the help of resources can host several instances or nodes. For example RAM I/O capacity i.e. permanent storage space, central processing unit and bandwidth (network address). Likewise, this procedure facilitates an effective method for resource management of web application. For instance, a web application that is hosted on a relatively small node works on reduced cost of using entire box and still manages to provide resources from one node to another. In order to enhance the efficiency an unused resources in a box are moved. Optimal resource management is achieved by virtual server; we can also say that there is no requirement for deploying a web application and its components for migration of web services to some other hosts that are subjected to re-installation of new operating system. Consequently, virtualization fulfills the last process by utilizing a hypervisor. Likewise, the hypervisor hosts operating system that provides management of assets for many operating systems of visitors as well as nodes. Hence, as soon as a web application is deployed with virtualization technology, we can get a guest operating system powered by hypervisor. This is the major factor that provides scalability and assignment of more resources for the web application by clicking few buttons (Kusnetzky 2011). It is unnecessary to state that virtualization appeared in the year 1960 because a number of hypervisors are present to select from them. For the trendiest virtualization appliances are Xen and Virtual Box (Kusnetzky 2011). They are considered as open-source assignments due to their commercial popularity through corporations such as VMware and Nimbus data systems. However the process of virtualization is actually without responsibility. In fact, some disadvantages are also associated with its implementation. For example, “a hardware box's configuration is not clear to node users. A hardware box could be near its overall hardware limit, in which case more resources for a node could be limited, even requiring migration to another box”. In addition, it could appear as a weak virtualized resource for instance I/O capacity. In this situation various nodes are present in similar boxes try to interpret form the matching pair of hard drives thus resulting in amplified latency. Moreover, the sidebar contains more information on the topic virtualization and I/O capability. Many of this last virtualization inconvenience are identified at the end of parallel scaling plans (Blokdijk & Menken, 2010). 1.2 Benefits Cloud computing provide many cost effective short term and long-term benefits. The organizations can avail services from multiple cloud-computing providers, to improve computerized business processes and high availability of services within the organization. Cloud computing also provides standardization of APIs, by operating on compatible applications to enable hybrid cloud computing. Moreover, organizations operating on IT infrastructure save staff, and financial resources. Cloud computing is also flexible and facilitate organizations to initialize a project robustly without upsetting on the cost, that may include disk storage, CPU and RAM. Likewise, organizations can buy spaces for data storage on data centers located in different geographical area, that enables them to protect their data in terms of natural disasters and hazards. Furthermore, one more advantage that is significant is related to the uptime and availability of services at all times. In addition, cloud computing is also efficient for handling large data sets. The data is analyzed in terabytes through compensating in order to utilize the business model to facilitate educational bodies by circulated computing along with numerous computers in a low cost and time (Han 2010). Furthermore, the integration of cloud computing and semantic web has produced a new revolutionary e-portfolio. Previously, e-portfolios enclose numerous disputes and restrictions by the development and implementation approach. However, a research by (Kim, Ng et al. 2010) on a proposed data index i.e. Private-Public systems that integrate the applications related to the cloud computing and storage through the architecture of Semantic network architecture. The integration aided semantic web-based virtualization along with superior intellectual exploration achievable. 1.3 Green Computing Virtualization Virtualization has played a dominating role to provide isolation due to security issues while running applications on divided computing devices. Moreover, virtualization apart from isolation provides other vast benefits including design plainness, space reduction in a server room, cost reduction due to centralized management and minimal power consumption. A study was conducted by (Guster, Hemminger et al., 2009), to utilize virtualization for reducing data center infrastructure and to promote green computing. The study was conducted on nine workstations. These workstations were virtualized in to nine different zones on a sole workstation. The conclusion in terms of cost associated with power, the savings were $600 per year and cooling cost savings were $ 300 per year. The total savings were $900 per year. Furthermore, space savings in a corporate environment can also be added. 1.4 Virtualization Security David Jackson who is a superior security architect employed at Logica’s security perform highlights virtualization safety paybacks. Virtualization can be installed with a clean image over an environment that can be infected by viruses or threats. Moreover, it facilitates people to share systems without exposing the personal and classified data. Organizations can centrally monitor application by factors including type, time and levels that are granted to each user. Furthermore, virtualization provides an isolated testing environment for debugging and testing new applications against threats and viruses (Mortleman 2009). Besides, in order to test the new application in an isolated virtualized environment, Jackson cautioned organizations as he said “Virtualisation can make the environment more complex by adding a new layer of software that must be maintained, including performance and availability monitoring, upgrades and patches. Add to this the increased complexity of diagnosing problems and managing virtual images, and you begin to see why an unprepared enterprise can easily be sidelined” (Mortleman, 2009). In the modern years, the virtualization techniques are widely implemented by numerous organizations. Moreover, in the recent times the Security risk identification along with power has been discussed newly. In order to configure the virtualization a complete Guidance is accessible since self-governing groups. For example, the Center for Internet Security and the virtualization vendors use advance assistance as their standard. In this article the risks are identified including its management in order to asses advance technology. The virtual organization substitutes the physical presence of networks as accepted by many security officers, auditors and compliance professionals. The core element is the assurance tricks thus helping to gather most needed features from the virtual environment. In order to secure the virtual environment from threats and vulnerabilities, organizations should follow security safeguards such as: There are various actions that should be taken by the Security teams in order to make sure the enhanced protection for virtual environments, together with (10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009): 1.5 Network Attached Storage In order to store a data present in web applications, initially we need to trust on DAS. As the web application grows the storage demand increases and can grow into the TEBI BYTE and PEBI BYTE range. This can be impossible for the hardware to store such amount of DAS due to several limitations associated to HBA. The data storage related to web applications is frequently deputized to an isolated box that helps in communication by means of host box because they are correctly connected. This would simplify the large amount of data management process thus reducing hardware limitations related to HBA. This is called as NAS or Network Attached Storage. The hardware box NAS also known as device. It comprise of each and every elements and assets such as RAM, CPU, Bandwidth etc. the network file system protocols acts as communication channel connecting the host box and NAS. The protocols related to the network file system contain less efficiency as compared to HBA or DAS protocols counter parts. Moreover, between the most prevalent networks protocols of file system, a Network File System (NFS) is discovered designed for Unix/Linux files. In addition, the Server Message Block (SMB) protocol is also identified for Windows system. The protocols that are discussed above are present in hardware that are located across a network in another box and thus can allow a host to get access into files. 1.6 Storage Area Network Storage Area Network (SAN) demonstrates a more complex explanation for storing data as compare to Network Area Storage (NAS) that utilize network file system (NFS) protocols for configuring the communication between the two nodes i.e. NAS and the host. Likewise, SAN is dependent on protocols such as SCSi and other protocols that are used by DAS. Organizations save cost by deploying NAS instead of DAS and SAN. As the SAN architecture is dependent on DAS based protocols, it is called as appliance embedded with many HBA that are accomplished by providing storage that has more capacity than DSA based storage. Moreover, a SAN is recognized as a large storage solution with massive capacity (Goldworm & Skamarock, 2007). A question comes in mind that what is the difference between NAS and SAN, as they are both separate devices. The physical architecture of NAS comprises of connected physical cables, as it is dependent on network file system (NFS) based protocols. Likewise, these features make it cost effective and more convenient to manage different storage boxes embedded with storage devices. In contrast, SAN has a physical architecture that demonstrates connection via HBA that is identical to DAS. These features make it more costly along with complex data storage management (Goldworm & Skamarock, 2007). The NAS and SAN hybrid appliances along with architectures are become famous in recent years. For the high-performance applications the DAS protocol is used along with the NFS protocol (network file system) in order to support the expense consequences of DAS. In addition, it also provides high storage capacities outside DAS. The dissimilarity among NAS and SAN solutions are difference in storage types. 1.7 Recommendations for Vendor I would like to recommend Hewlett Packard to be my vendor for this product. As HP is a renowned name in the industry and deploys best practices for installation and configuration of Microsoft Vmware ESXi. Moreover, HP is a reliable name with a reputable after sales support and maintenance for any known issues that may occur. Ranging from corporate business solutions and small and medium businesses, their expert consultants provide advice and recommendation for known issues and risks that may occur during migration to Vmware. For the converged infrastructure, HP may recommend ways that may prevent additional cost. Furthermore, HP also provides support for specific situations, for instance, there are support communities that may help solve issues that are common on a wide scale, product and troubleshooting tab provides ample amount of information and guidance for specific products and system software with other supported tools and applications are also archived at the website. 2 Question 2 2.1 Active Directory Requirements Active directory is an essential component which provides efficient and effective network administration. Initially a domain is generated for the dynamic directory functions. The domain name for abc.com will be ‘abc.com’. Single domain model will be adopted as a forest root domain since the organization is a SME. After creating the domain, DNS configuration is required and what type of DNS version to be used; the names used for the domains, servers, and services in Active Directory; and the names of the forests and the forest root domains. The trust plan is also required which parallels the creation of the forest and domain plans, outlines any manually created trusts, the direction of the trusts, and the rationale for them. Trusts can be imple­mented for reasons of performance enhancement within a single forest or to allow access to resources between separate forests. 2.2 User And Group Creation 30 users are created with five groups in the active directory. Each user is assigned membership of the following groups. Group 1 named as “Long Term Lets Group” Group 2 named as “Short Term Lets Group” Group 3 named as “Personnel Group” Group 4 named as “Marketing Group” Group 5 named as “Accounts Group” 2.3 Limited Access For limiting access to the sales and all the remaining staff, Configuration will be conducted inside the “Active directory users and computers” comfort zone. Click Start menu?Administrative Tools, ? Active Directory Users and Computers. In the console, click user account Right-click the user accounts, and then click Properties. Click Account and then click Logon Hours. Click All to select all available times, and then click Logon Denied. Select the time blocks as per the requirements to allow the specific user to log on to the domain, and then click Logon Permitted. A status line provides the options to edit logon times including days of the week, and timings. 2.4 User Login Restriction Active Directory Users and Computers?Properties?Accounts Click the logon workstations dialog box by clicking the Log On To tab. Enter the name of a required workstation. Click Add. Replicate this procedure to identify additional workstations as per the organizations requirements. 2.5 User Restriction on Workstation User restriction is possible by applying group policy capabilities in Windows 2003 Domain; Users can be prevented from logging on to different domains rather than their home domain. In the target domain new ‘domain wide group policy object’ is created and activates by activating “Deny logon locally" to the resource of domain user accounts. The check should be enabled for the option “Deny logon locally”  2.6 Configuring mandatory file access Mandatory file access is implemented by configuring the User's Environment Settings. Active Directory Users and Computers? User's Properties ? Profile tab. Click option named as local path. Insert the path to the home directory in the related field. Example C:\ abc \ %UserName%. 2.7 Password Policy The password policy will be applied within the Active directory users and computers zone. These five elements related to password policy apply on each user created. Enforce password history, (As per organization requirement) Maximum password age, (Maximum 30 days) least password age, (As per organization requirement) lowest password length (10 Characters) Passwords have to fulfill difficult rations (As per organization requirement) 2.8 Account Lockout Policy Access the group policy console which is required for account lockout configuration. On the right hand side expand the security options?expand computer configurations? select Windows settings ? click security settings? click local Policies? select security options. By double clicking properties of automatically log off users when login time expires opens a dialog for defining policy. Clicks define this policy setting and click on enabled tab. In this way policy restriction which enforces for logon hours is activated. 2.9 File Server 2.9.1 Drive Mapping To create a network home directory, Active Directory Users and Computers ?Properties?Profile tab. Click Connect option? and choose a drive letter for the home directory. Universal Naming Convention (UNC) notation will be used to type the complete path to the home directory using the, such as: \\abc\USER_DIRS\ %UserName%. The server name is mandatory to mention in the drive path to ensure that the user can access the directory from any computer within the domain. 2.9.2 Access rights on a Shared Folders The department’s shared folder requires read and write access. Right click on the folder ? Properties?Security. Select everyone in user data properties and select read and write from permissions panel for the specific folder. The long term and short term group will be added in user data properties by selecting read from the permission panel for the folder named as ‘Sales2011’.Managers from each department will be added specifically as users against all employees are created in the active directory. Users (representing as managers of the department) will be added to the user data properties and full writes including read, write and delete will be granted from the security panel. 2.10 Website 2.10.1 Welcome Page For creating a domain logon script ‘start.exe command is executed. It creates a file named as ‘logon.bat’ which contains the commands that the user wants to execute. Two new file are created named as ‘contentsfile.bat’ to call the logon.bat file. These both files are placed in the ‘Netlogon’ share on the domain controllers. For configuring the ‘Netlogon’ click Active Directory Users and Computers ? Microsoft Management Console (MMC)?configure user to configure ‘Netlogon’ scripts. 2.10.2 Virtual directory The Virtual Directory is a separate register including a web site that connects to an additional directory. On the local server or over the shared network this can be associated with the virtual directory. For changing access levels on virtual directories, following steps are used (Assuming that Internet Information Services (IIS) is installed previously). The explanation is in bulleted points for step by step illustration of the process. On the web site or on the directory, click to change the permit. Now select from the menu “properties” and right click. Now select the Directory Security tab. Now select Edit from the Password Authentication Group. The Authentication setting must be checked by the user. Now press the OK button. 2.10.3 Virtual directory Permissions Log on to RMS client as local administrator. Open Registry Editor. generate a fresh registry key named DecommissionunderHKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Common\DRM Under the Decommission registry key, insert a new String Value entry, replacing your-license-server with the name of the RMS cluster used for licensing: Https:// abc /_wmcs/licensing. Double-click the new registry entry, type  http://your- abc_wmcs/decommission, and then click OK. 2.11 Group Policy The rules applied on an object effects on each user who is a member of that group. The configuration will be conducted on the domain controller by execute the ‘Group policy’ console. On the left column, click ?User configuration?Administrative Templates ?Start menu and Taskbar. However, on the other side administrative templates will appear. Select the template ‘Remove run menu from start menu’ and Disable Add/ Remove Programs ? Properties ? select disabled from the settings tab. 2.12 Test plan Run the command from the start menu ? Run ? Dcdiag.exe This command illustrates the statistics of successful active directory implementation, connectivity and efficiency. The result of this test must quote “Test Passed”. References Blokdijk, G., & Menken, I., 2010. Virtualization - the complete cornerstone guide to virtualization best practices: Concepts, terms, and techniques for successfully planning, implementing and managing enterprise IT virtualization technology - second edition Art of Service. HAN, Y., 2010. On the Clouds: A New Way of Computing. Information Technology & Libraries, 29(2), pp. 87-92. Goldworm, B., & Skamarock, A., 2007. Blade servers and virtualization: Transforming enterprise computing while cutting costs Wiley. GUSTER, D., HEMMINGER, C. and KRZENSKI, S., 2009. Using Virtualization to Reduce Data Center Infrastructure and Promote Green Computing. International Journal of Business Research. KUSNETZKY, D., 2011. Virtualization: A Manager's Guide. O'Reilly Media. Virtualization. 2007. Bloomsbury Business Library - Business & Management Dictionary, , pp. 7812-7812. KIM, P., NG, C.K. and LIM, G., 2010. When cloud computing meets with Semantic Web: A new design for e-portfolio systems in the social media era. British Journal of Educational Technology, 41(6), pp. 1018-1028 MORTLEMAN, J., 2009. Security advantages of virtualisation. Computer Weekly, , pp. 23-23. 10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009. eWeek, 26(12), pp. 42-42. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Systems Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Computer Systems Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/information-technology/1491248-computer-systems
(Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words)
Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/1491248-computer-systems.
“Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/information-technology/1491248-computer-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Systems and Virtualization

Virtualisation Technologies

This paper ''Virtualisation Technologies'' tells that virtualization is simply creating an online-based system that can be used to deliver processes.... hellip; virtualization is being deployed and implemented by many institutions of all kinds across the world.... Economic benefits of virtualization Virtualisation has had many economic benefits for the New Castle College.... Even so, such issues can be addressed within a short time accordingly unlike when physical systems are being used....
13 Pages (3250 words) Essay

Virtualization and Computers

The topic for this paper is based on the understanding on how the virtualization of everything affects the modern process of computing as well as how it affects the lives of people in the human society.... This involves the use of virtualization tools such as Microsoft virtual servers. … The target audience of the research addresses the e-generation which refers to the generation of modern young generation who are most often than not involved in dealing with the e-systems so as to accomplish many regular things in their lives, from studies to the social lives. The research process that shall be handled for this study is based on the different procedures used by the target audience to operate through the use of the virtualized e-systems that has now become a huge part of their lives....
12 Pages (3000 words) Essay

Telecommunications and Networking

An essay "Telecommunications and Networking" reports that a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment.... The imaginary Internet cloud of a corporate network environment is trustworthy for data transportation.... hellip; A comprehensive description covering all the concepts of cloud computing is defined as “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services)....
11 Pages (2750 words) Essay

Concepts Associated with Desktop Virtualization

Desktop virtualization is one of the technologies, which is used to separate the physical setting of a client device with regard to the logical interface.... In other words, desktop virtualization is accessed by the users devoid of being tied to a particular hardware device.... This… Desktop virtualization is in the market for quiet sometime, however it has gained its importance in recent times.... Propagation of desktop devices in accordance with the The notion of desktop virtualization is turning out to be a deliberate IT practice in the recent years (Intel Corporation 3-20)....
4 Pages (1000 words) Assignment

Virtualization and Security

The paper "virtualization and Security" discusses that most of the organization nowadays adopts the method of storing data in the virtual server instead of using a physical server.... virtualization involves the process of creating a virtual version instead of the actual thing.... hellip; The user should take caution against threats against virtualization such as theft, virus hacking, Trajons and several others.... virtualization refers to the process of generating a virtual version of something that relates to its actual version....
9 Pages (2250 words) Essay

Server Virtualization

This paper, Server virtualization, outlines that the rise of popularity of networked systems has spurred an increase in client/server applications.... virtualization is a technique that is used to alter one or more properties of the service, without modification to the clients or servers.... The average computer user employs client/server applications.... In most computer networks, the clients and servers are not directly connected, but the messages between them are routed through a series of network routers or switches....
9 Pages (2250 words) Term Paper

Justification for New Hardware for Windows 8,1

is through desktop virtualization.... Enterprise mobility will also be addressed through desktop virtualization.... Unlike previous Windows operating systems that required minimal hardware updates, running Windows 8.... The PC must also have a RAM of 1 gigabyte for 32-bit or 2 gigabyte for a 64-bit computer....
7 Pages (1750 words) Research Proposal

Virtualization Comparison: VMware, Microsoft Hyper-V and VERDE

"virtualization Comparison: VMware, Microsoft Hyper-V and VERDE" paper discusses the difference between the three virtualization solutions in terms of desktop virtualization and server virtualization.... The desktop virtualization allows the computer to run on multiple operating systems through VMware.... hellip; In conclusion, it is evident that virtualization solutions play an important role in terms of increasing the efficiency of desktops and servers....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us