Data Canter Virtualization

Only available on StudyMode
  • Topic: Operating system, Virtual machine, Virtualization software
  • Pages : 44 (12815 words )
  • Download(s) : 14
  • Published : March 5, 2013
Open Document
Text Preview
Virtualization: A Manager’s Guide

Virtualization: A Manager’s Guide

Dan Kusnetzky

Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo

Virtualization: A Manager’s Guide
by Dan Kusnetzky
Copyright © 2011 Kusnetzky Group LLC. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com.

Editor: Mike Hendrickson Production Editor: Teresa Elsey Proofreader: Teresa Elsey Printing History: June 2011: First Edition.

Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano

Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Virtualization: A Manager’s Guide, the image of a condor, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

ISBN: 978-1-449-30645-8 [LSI] 1307547056

Table of Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii 1. A Model of Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Model of Virtualization What Is Virtualization? Layers of Virtualization at Work Goals of Virtualization 1 1 2 4

2. Access Virtualization: Providing Universal Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 What Is Access Virtualization? What Does Access Virtualization Do? When Is Access Virtualization the Right Choice? Players in the Access Virtualization World A Few Examples of Access Virtualization in Use 5 6 8 8 9

3. Application Virtualization: Application Isolation, Delivery and Performance . . . . . 11 What Is Application Virtualization? What Does Application Virtualization Do? When Is Application Virtualization a Suggested Approach? Players in the Application Virtualization World A Few Examples of Application Virtualization in Use 11 12 14 15 15

4. Processing Virtualization: Doing System Tricks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 What Is Processing Virtualization? What Does Processing Virtualization Do? When Is Processing Virtualization the Preferred Approach? Players in the Processing Virtualization World A Few Examples of Processing Virtualization in Use 17 18 20 21 22

5. Network Virtualization: Controlling the View of the Network . . . . . . . . . . . . . . . . . . 23 What Is Network Virtualization? 23
v

What Does Network Virtualization Do? When Is Network Virtualization Required? Players in the Network Virtualization World A Few Examples of Network Virtualization in Use

23 25 26 26

6. Storage Virtualization: Where Are Your Files and Applications? . . . . . . . . . . . . . . . . 29 What Is Storage Virtualization? What Does Storage Virtualization Do? When Should Storage Virtualization Be Used? Players in the Storage Virtualization World A Few Examples of Storage Virtualization in Use 29 29 32 32 33

7. Security for Virtual Environments: Guarding the Treasure . . . . . . . . . . . . . . . . . . . . . 35 What Is Security for Virtual Environments? What Does Security for Virtual...
tracking img