Академический Документы
Профессиональный Документы
Культура Документы
ACKNO
I w(uld li)e t( than)*
LED!EMENT
Mr" Vij#$ Sh#rm#% wh( heads the #(ltene +haledent India ,-t. .td. /e had the )indness t( acce0t 1e in his gr(u0 and let 1e w(r) with aut(n(1y. Mr" S#ntosh S#&#'u(e2 ass(ciate ad1in-e3ecuti-e2 at #(ltene +haledent. /e hel0ed 1e when I started the internshi0 and 1ade sure I w(r) sa4ely with all the data regarding the c(10any5s sales and 4uture initiati-es. /e als( e30lained 1e the 0rinci0les (n which the new centrali6ed data7ase had t( 7e 7uild 7y 1e. /e was 7usy 7ut ne-er re4used t( answer 1y 8uesti(ns. Mr" M#njeet Sin)h% 1ar)eting 1anager2 (4 the c(10any. /is e30erience in 1anaging the statistical data was -ery use4ul t( 1e. I c(uld a-(id s(1e catches than)s t( hi1. 9iscussing with hi1 t( 4igure (ut the 4ew 0resentati(ns I had t( 1a)e and the 4eed7ac) 4(r1 I had t( design 4(r 1y w(r) was really hel04ul t((. Mr" Ron#* R" A))#r+#(2 1ar)eting re0resentati-e at the c(10any wh( hel0ed 1e t( carry (ut 1y 0r(gra1 0ractically 7y sharing his wee)ly re0(rts (n regular 7asis with 1e and als( gi-ing in0uts (n h(w t( 1a)e the 0r(gra1 1(re idealistic. Besides 1y 0r(ject2 I really enj(yed 1y stay at the #(ltene +haledent ,-t. .td.2 a00reciated all the 0e(0le I w(r)ed with and s0ent g((d 1(1ents with the1. That:s why I sincerely than) all the sta44 (4 the c(10any 4(r their war1 gestures al(ng with the 0r(4essi(nal attitude t(wards the w(r). I e30ress 1y gratitude t(wards 1y Instituti(n2 %1ity ;ch((l (4 <ngineering and Techn(l(gy2 %1ity =ni-ersity2 >?I9%2 /?I2 "s. >atasha /asteer (/?9 IT 9e0tt.!2 "s. ;a0na ;inha (,r(gra1 .eader! and "s. #hetna #haudhary (Faculty Guide! with(ut wh(1 this 0r(ject w(uld ha-e 7een a distant reality.
Krishn# Vij#$+#r)i$
A,STRACT
T(day5s c(10uting needs re8uire IT de0art1ents t( address 1(re ,# 1anage1ent challenges than they did just a 4ew years ag(. =sers increasingly de1and access t( their a00licati(ns and data at any l(cati(n and 4r(1 any de-ice. The 4ast gr(wth (4 c(10uter users wh( r(a1 4r(1 (ne ,# t( an(ther has led c(10anies t( 0r(-ide access t( the user5s des)t(0 4r(1 any c(10uter in the w(r)0lace2 detaching the user 4r(1 the 0hysical ,#. =sers are als( increasing their use (4 0ers(nal techn(l(gy at h(1e. This increase leads the1 t( e30ect si1ilar 0ers(nal c(n4igurati(ns and techn(l(gical 4reed(1s in the w(r)0lace. %dditi(nally2 users are n(w 1(re li)ely t( use their (wn de-ices t( access c(r0(rate a00licati(ns2 such as c(r0(rate e1ail2 4r(1 their 0ers(nal 1(7ile 0h(nes. In4rastructure -irtuali6ati(n is a 0(wer4ul trend in the industry t(day2 7ut the c(nce0t (4 -irtuali6ati(n has 7een ar(und 4(r 1any years. Virtuali6ati(n techn(l(gy has 7een 0ursued 7y -end(rs as a 4ra1ew(r) t( di-ide the res(urces (4 a c(10uter int( 1ulti0le e3ecuti(n en-ir(n1ents using a -ariety (4 hardware and s(4tware a7stracti(n techni8ues2 resulting in the se0arati(n (4 the l(gical inter4ace 4r(1 the 0hysical 1achine. Virtuali6ati(n (riginated in the 19@0s as a techni8ue t( (0ti1i6e the use (4 -ery e30ensi-e and relati-ely scarce c(10uting res(urces. 9es)t(0 -irtuali6ati(n (44ers a way t( e3tend the 7ene4its (4 -irtuali6ati(n A 7etter 0er4(r1ance2 l(wer T#?2 higher security and greater 4le3i7ility A t( the 4ull des)t(0. <ach des)t(0 is su00(rted 7y a 0hysical ,# that creates nu1er(us challenges including data securityB u0date and re4resh cyclesB 0(wer2 heat and s0ace c(nsu10ti(nB and the 1anage1ent (4 l(cal 0ac)aged a00licati(ns li)e 0r(ducti-ity suites and 7r(wsers2 as well as h(1e-gr(wn a00licati(ns. "uch li)e ser-er -irtuali6ati(n2 -irtuali6ati(n des)t(0s in-(l-es se0arating the 0hysical l(cati(n (4 a client de-ice 4r(1 its l(gical inter4ace. In 0ractical ter1s2 des)t(0 -irtuali6ati(n all(ws end users t( access all (4 their data and a00licati(ns with(ut 7eing tied d(wn t( a s0eci4ic hardware de-ice. It als( all(ws IT de0art1ents t( reduce 1anage1ent and su00(rt c(sts2 al(ng with ca0ital e30enses 4(r des)t(0 hardware. %d-ances in 1(7ile hardware architectures and tre1end(us gr(wth (4 high-s0eed wide-area cellular syste1s deli-er anyti1e and any0lace a-aila7ility (4 netw(r)3
7ased in4(r1ati(n ser-ices t( the (wners (4 1(7ile c(10uting de-ices. <-er-gr(wing 0(0ularity (4 1(7ile de-ices2 such as s1art 0h(nes and net7(()s2 dri-es the de1and 4(r the de-el(01ent (4 inn(-ati-e s(4tware and hardware architectures2 a00licati(ns2 and netw(r) ser-ices ai1ed at these de-ices. %s a result2 we are witnessing a 0aradig1 shi4t in the way 0e(0le use c(10uting techn(l(gy in their e-eryday li-es. Ce1(te 9es)t(0 Virtualisati(n all(ws users t( re1(tely c(nnect t( their des)t(0s and ser-ers thr(ugh any Ce1(te 9es)t(0 ,r(t(c(l (C9,! and all(ws a (ne t( (ne c(nnecti(n t( hardware 4(r re1(te access (r ad1inistrati(n 0ur0(ses while securely encry0ting data. It ai1s t( s(l-e a -ariety (4 0r(7le1s. It is the 0er4ect s(luti(n 4(r hel0 des) de0art1ents2 re1(te su00(rt needs2 and e-en e-eryday users wh( are l(()ing t( access their des)t(0s re1(tely thr(ugh a secure c(nnecti(n.
#?>T<>T;
INTRODUCTION..................................................................................................................... 7 MATERIALS AND METHODOLGY......................................................................................10 RESULTS AND DISCUSSION.............................................................................................. 13 REMOTE DESKTOP VIRTUALIZATION...........................................................................13 TYPES OF DESKTOP VIRTUALIZATION.....................................................................15 HOW TO ACHIEVE DESKTOP VIRTUALIZATION?.....................................................15 DEFINING DATA COMMUNICATIONS.............................................................................16 CDPD TECHNOLOGY: THE HOT COOKIE......................................................................18 CDPD NETWORK RELIABILITY...................................................................................22 APPLICATIONS OF MOBILE COMPUTING ....................................................................24 PROTOCOLS FOR DESKTOP VIRTUALIZATION............................................................28 REMOTE DESKTOP PROTOCOL (RDP).....................................................................28 PC IP............................................................................................................................ !1 APPLICATION VIRTUALIZATION.....................................................................................34 APPLICATION DELIVERY............................................................................................ !5 THE BENEFITS OF APPLICATION VIRTUALIZATION................................................!" ISSUES WITH APPLICATION VIRTUALIZATION........................................................!" VDI VIRTUAL DESKTOP INFRASTRUCTURE!..............................................................38 VDI BENEFITS.............................................................................................................. !8 BENEFITS OF VIRTUAL DESKTOP COMPUTING..........................................................41 LIMITATIONS OF DESKTOP VIRTUALIZATION..............................................................42 COMPLEXITY AND SHIGH COSTS OF VDI DEPLOYMENT AND MANAGEMENT...........42 CONCLUSION....................................................................................................................... 43 REFRENCES......................................................................................................................... 45 APPENDIX............................................................................................................................ 46
"
T%B.< ?F FIG=C<;
BRIEF HISTORY..................................................................................................................... 7 FIGURE 1 MOBILE S!ITCHING CENTRE..........................................................................." FIGURE 2 MATERIALS IN DES#TOP VIRTUALI$ATION.................................................10 FIGURE 3 MOBILE COMMUNICATIONS OVERVIE!......................................................16 FIGURE 4 CIRCUIT S!ITCHED CDPD.............................................................................1% FIGURE 5 CDPD OVERVIE!............................................................................................... 20 FIGURE 6 CDPD NET!OR#.............................................................................................. 22 FIGURE 7 POLICE INCIDENT INFORMATION SCREEN...................................................25 FIGURE " TAXI DISPATCH NET!OR#.............................................................................27 FIGURE % APPLICATION VIRTUALI$ATION.....................................................................34 FIGURE 10 VIRTUAL DES#TOP INFRASTRUCTURE......................................................3" FIGURE 12 USE CASES FOR VDI.....................................................................................40 FIGURE 14 MA&OR TRENDS IN COMPUTING.................................................................43
INTRODUCTION
#(10anies are increasingly turning t( -irtuali6ati(n as the answer t( these new challenges. 9es)t(0 -irtuali6ati(n is the act (4 se0arating the di44erent c(10uting layers and st(ring s(1e (r all (4 the1 in a data center. Thr(ugh -irtuali6ati(n2 e10l(yees can access their a00licati(ns and data sa4ely (-er a netw(r) and the ris) (4 data l(ss is 1ini1i6ed. ?n the IT side2 -irtuali6ati(n accelerates de0l(y1ent (4 new ca0a7ilities with(ut needing t( ac8uire new hardware and c(n4igure c(10(nents. It als( reduces a00licati(n testing re8uire1ents and c(10ati7ility issues while si10li4ying disaster rec(-ery and c(10liance. Further2 (-er the 0ast 4ew years2 7usinesses ha-e si10li4ied their data center 1anage1ent -ia ser-er -irtuali6ati(n techn(l(gies and achie-ed en(r1(us c(st 7ene4its in the 0r(cess. >(w2 new ad-ances in -irtuali6ati(n and 1(re a-aila7ility (4 7r(ad7and access ena7le c(10anies t( d( the sa1e with enter0rise des)t(0s 7y 0r(-iding the t((ls necessary t( rearrange h(w ,# c(10(nents interact and t( ch((se where th(se c(10(nents reside. Mobile Computing: A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. "(7ile -(ice c(11unicati(n is widely esta7lished thr(ugh(ut the w(rld and has had a -ery ra0id increase in the nu17er (4 su7scri7ers t( the -ari(us cellular netw(r)s (-er the last 4ew years. %n e3tensi(n (4 this techn(l(gy is the a7ility t( send and recei-e data acr(ss these cellular netw(r)s. This is the 0rinci0le (4 1(7ile c(10uting. In this re0(rt we gi-e descri0ti(n (4 Ce1(te 9es)t(0 Virtualisati(n and e3isting cellular netw(r)s and descri7e in detail the #9,9 techn(l(gy which all(ws data c(11unicati(ns acr(ss these netw(r)s. Finally2 we l(() at the a00licati(ns (4 "(7ile #(10uting in the real w(rld.
BRIEF HISTORY
"(7ile tele0h(ny t(() (44 with the intr(ducti(n (4 cellular techn(l(gy which all(wed the e44icient utilisati(n (4 4re8uencies ena7ling the c(nnecti(n (4 a large nu17er (4 users and n(t just sca1s. 9uring the 19D0:s anal(g techn(l(gy was used.
#
%1(ng the 1(st well )n(wn syste1s were the >"T900 and '&0 (>(rdic "(7ile Tele0h(ne! and the %",; (%d-anced "(7ile ,h(ne ;er-ice!. In the 1990:s the digital cellular techn(l(gy was intr(duced with G;" (Gl(7al ;yste1 "(7ile! 7eing the 1(st widely acce0ted syste1 ar(und the w(rld. ?ther such syste1s are the 9#;1D00 (9igital #(11unicati(n ;yste1! and the ,#;1900 (,ers(nal #(11unicati(n ;yste1!. % cellular netw(r) c(nsists (4 1(7ile units lin)ed t(gether t( switching e8ui01ent2 which interc(nnect the di44erent 0arts (4 the netw(r) and all(w access t( the 4i3ed ,u7lic ;witched Tele0h(ne >etw(r) (,;T>!. The techn(l(gy is hidden 4r(1 -iewB it:s inc(r0(rated in a nu17er (4 transcei-ers called Base ;tati(ns (B;!. <-ery B; is l(cated at a strategically selected 0lace and c(-ers a gi-en area (r cell hence the na1e cellular c(11unicati(ns. % nu17er (4 adjacent cells gr(u0ed t(gether 4(r1 an area and the c(rres0(nding B;s c(11unicating thr(ugh a s( called "(7ile ;witching #entre (";#!. The ";# is the heart (4 a cellular radi( syste1. It is res0(nsi7le 4(r r(uting2 (r switching2 calls 4r(1 the (riginat(r t( the recei-er. It can 7e th(ught (4 1anaging the cell2 7eing res0(nsi7le 4(r set-u02 r(uting c(ntr(l and ter1inati(n (4 the call2 4(r 1anage1ent (4 inter-";# hand (-er and su00le1entary ser-ices2 and 4(r c(llecting charging and acc(unting in4(r1ati(n. The ";# 1ay 7e c(nnected t( (ther ";#s (n the sa1e netw(r) (r t( the ,;T>.
Figure : Mobile !witching Centre
The 4re8uencies used -ary acc(rding t( the cellular netw(r) techn(l(gy i10le1ented. F(r G;"2 D90 - 91& "/6 range is used 4(r trans1issi(n and 9 & -9@0 "/6 4(r rece0ti(n. The 9#; (9istri7uted #(11unicati(n ;yste1! techn(l(gy uses 4re8uencies in the 1D00"/6 range while ,#; (,ers(nal #(11unicati(n ;yste1! in the 1900"/6 range. <ach cell has a nu17er (4 channels ass(ciated with it. These are assigned t( su7scri7ers (n de1and. +hen a "(7ile ;tati(n (";! 7ec(1es :acti-e: it registers
with the nearest B;. The c(rres0(nding "; #entre st(res the in4(r1ati(n a7(ut that "; and its 0(siti(n. This in4(r1ati(n is used t( direct inc(1ing calls t( the ";. I4 during a call the "; 1(-es t( an adjacent cell then a change (4 4re8uency will necessarily (ccur - since adjacent cells ne-er use the sa1e channels. This 0r(cedure is called hand (-er and is the )ey t( "(7ile c(11unicati(ns. %s the "; is a00r(aching the edge (4 a cell2 the B; 1(nit(rs the decrease in signal 0(wer. The strength (4 the signal is c(10ared with adjacent cells and the call is handed (-er t( the cell with the str(ngest signal. 9uring the switch2 the line is l(st 4(r a7(ut '001s. +hen the "; is g(ing 4r(1 (ne area t( an(ther it registers itsel4 t( the new ";#. Its l(cati(n in4(r1ati(n is u0dated2 thus all(wing ";s t( 7e used (utside their :h(1e: areas.
1. A&ministr#tor/&e'ine& 0irtu#( m#chine E <nca0sulates a 4ull des)t(0 en-ir(n1ent2 including an (0erating syste12 a00licati(ns and (0ti(nal 1anage1ent and security t((ls. 2. Im#)e repositor$E;t(res all -irtual i1ages (n a central ser-er and ena7les -irtual i1ages -ersi(n 1anage1ent2 client-authenticated i1age retrie-al2 and e44icient d(wnl(ad (4 a new i1age (r u0dates. . M#n#)ement ser0erE%ss(ciates -irtual i1ages 4r(1 the i1age re0(sit(ry al(ng with ad1inistrat(r usage 0(licies t( %cti-e 9irect(ry users (r gr(u0s. The
1%
"anage1ent ;er-er als( aggregates clients: e-ents2 and st(res the1 in an e3ternal data7ase 4(r 1(nit(ring and re0(rting 0ur0(ses. '. M#n#)ement conso(eE<na7les ad1inistrat(rs t( c(ntr(l the 1anage1ent ser-er and the i1age re0(sit(ry. &. En&/user c(ient ///The -irtual des)t(0 end de-ice c(nsists (4 4ewest c(10(nents and c(uld 7e (ne (4 the 4(ll(wing* a. 7. Thin clients Fer( #lients
Virtu#( im#)es repositor$ #n& &e(i0er$ E4(r si10li4ying the 0r(cess (4 creating2 testing2 deli-ering2 and 1aintaining -irtual i1ages 4r(1 a central l(cati(n* %d1inistrat(r c(ns(le 4(r -irtual i1age creati(n and testing. #entrali6ed -irtual i1ages re0(sit(ry 4(r i1age st(rage2 -ersi(ning2 and deli-ery 7ased (n "icr(s(4t II; we7 ser-ers. % client c(10(nent that aut(1atically retrie-es -irtual i1ages 4r(1 the centrali6ed re0(sit(ry. %ut(-installati(n 0ac)age 4(r sel4-de0l(y1ent (4 the client c(10(nent and the -irtual i1ages -ia re1(-a7le 1edia (such as 9V9! (r 4r(1 a we7site. ;u00(rt 4(r i1age deli-ery thr(ugh c(ntent distri7uti(n syste1s.
Centr#(i1e& m#n#)ement #n& monitorin)Ehel0s ad1inistrat(rs 1anage the entire li4e-cycle (4 -irtual 1achines de0l(yed (n des)t(0s. The centrali6ed 1anage1ent and 1(nit(ring ca0a7ilities include* % central 1anage1ent ser-er that c(ntr(ls all de0l(yed -irtual 1achines.
11
Integrati(n with %cti-e 9irect(ry t( ena7le 0r(-isi(ning (4 -irtual i1ages 7ased (n gr(u0 1e17ershi0 (r user identity.
=ser authenticati(n 0ri(r t( accessing the -irtual i1age (whether the h(st is (nline (r (44line!. ;u00(rt 4(r de0l(y1ent thr(ugh(ut a heter(gene(us en-ir(n1ent2 adjusting 1e1(ry all(cati(n 4(r the -irtual ,# acc(rding t( the a-aila7le C%" (4 the end0(int2 and changing netw(r) settings acc(rding t( the l(cal netw(r).
% central data7ase (4 client acti-ity and e-ents 4acilitating 1(nit(ring and re1(te tr(u7lesh((ting.
Us#)e po(ic$ #n& &#t# tr#ns'er contro( E9es)t(0 Virtuali6ati(n en-ir(n1ent en4(rces the 4(ll(wing user (r gr(u0 usage 0(licies2 access 0er1issi(ns t( -irtual i1ages2 and data trans4er 0er1issi(ns* Virtual i1age 0r(tecti(n that 0re-ents unauth(ri6ed e3ecuti(n. % c(n4igura7le e30irati(n 4(r the -irtual i1age (r a ti1e li1it 4(r (44line use (t( 4(rce the user t( re-auth(ri6e 7e4(re c(ntinuing t( w(r) (44line!. The a7ility t( all(w (r 7l(c) data trans4er 7etween the -irtual 1achine and the end0(int2 -ia c(0y and 0aste2 4ile trans4er2 (r 0rinting. Se#m(ess en&/user e2perience E The 4(ll(wing can 7e c(n4igured t( 0r(-ide a sea1less e30erience2 1a)ing users unaware (4 the -irtual 1achines running in the 7ac)gr(und. It reduces the training re8uired 4(r de0l(ying -irtuali6ati(n t( n(ntechnical users*
,u7lished a00licati(nsE%00licati(ns installed (n the -irtual 1achine are a-aila7le thr(ugh the standard des)t(0 ;tart 1enu. These a00licati(ns run in Virtual ,#2 7ut are sea1lessly integrated int( the user des)t(0 and a00ear side-7y-side with nati-e a00licati(ns.
12
,(wer user 1(deETechnical users and ad1inistrat(rs can -iew the -irtual 1achine l(ading 0r(cesses and des)t(0 i4 re8uired.
cust(1i6e and 1(di4y their des)t(0s t( 1eet their s0eci4ic needs. In this way2 des)t(0 -irtuali6ati(n (44ers i10r(-ed 4le3i7ility c(10ared with the si10ler clientIser-er 0aradig1.
14
-O
Virtual 9es)t(0 In4rastructure KV9IL is an integrated s(luti(n (4 hardware2 s(4tware and 1anage1ent t((ls t( 0r(-ide a re0lace1ent 4(r standard des)t(0 de0l(y1ents. In the si10lest ter1s2 V9I 0laces user des)t(0s (n a centrali6ed ser-er.
1"
9ata #(11unicati(ns ha-e 7een achie-ed using a -ariety (4 netw(r)s such as ,;T>2 leased-lines and 1(re recently I;9> (Integrated ;er-ices 9ata >etw(r)! and %T" (%synchr(n(us Trans4er "(de!IFra1e Celay. These netw(r)s are 0artly (r t(tally anal(g (r digital using techn(l(gies such as circuit-switching2 0ac)etswitching etc.
16
Circuit s+itchin) i10lies that data 4r(1 (ne user (sender! t( an(ther (recei-er! has t( 4(ll(w a 0re-s0eci4ied 0ath. I4 a lin) t( 7e used is 7usy2 the 1essage cann(t 7e redirected2 a 0r(0erty which causes 1any delays. P#c*et s+itchin) is an atte10t t( 1a)e 7etter utili6ati(n (4 the e3isting netw(r) 7y s0litting the 1essage t( 7e sent int( 0ac)ets. <ach 0ac)et c(ntains in4(r1ati(n a7(ut the sender2 the recei-er2 the 0(siti(n (4 the 0ac)et in the 1essage as well as 0art (4 the actual 1essage. There are 1any 0r(t(c(ls de4ining the way 0ac)ets can 7e send 4r(1 the sender t( the recei-er. The 1(st widely used are the Virtual #ircuit;witching syste12 which i10lies that 0ac)ets ha-e t( 7e sent thr(ugh the sa1e 0ath2 and the 9atagra1 syste1 which all(ws 0ac)ets t( 7e sent at -ari(us 0aths de0ending (n the netw(r) a-aila7ility. ,ac)et switching re8uires 1(re e8ui01ent at the recei-er2 where rec(nstructi(n (4 the 1essage will ha-e t( 7e d(ne. The intr(ducti(n (4 1(7ility in data c(11unicati(ns re8uired a 1(-e 4r(1 the ,u7lic ;witched 9ata >etw(r) (,;9>! t( (ther netw(r)s li)e the (nes used 7y 1(7ile 0h(nes. ,#;I has c(1e u0 with an idea called #9,9 (#ellular 9igital ,ac)et 9ata! techn(l(gy which uses the e3isting 1(7ile netw(r) (4re8uencies used 4(r 1(7ile tele0h(ny!. "(7ility i10le1ented in data c(11unicati(ns has a signi4icant di44erence c(10ared t( -(ice c(11unicati(ns. "(7ile 0h(nes all(w the user t( 1(-e ar(und and tal) at the sa1e ti1eB the l(ss (4 the c(nnecti(n 4(r '001s during the hand (-er is undetecta7le 7y the user. +hen it c(1es t( data2 '001s is n(t (nly detecta7le 7ut causes huge dist(rti(n t( the 1essage. There4(re data can 7e trans1itted 4r(1 a 1(7ile stati(n under the assu10ti(n that it re1ains sta7le (r within the sa1e cell.
1#
Overview #9,9:s 0rinci0le lies in the usage (4 the idle ti1e in 7etween e3isting -(ice signals that are 7eing sent acr(ss the cellular netw(r)s. The 1aj(r ad-antage (4 this syste1 is the 4act that the idle ti1e is n(t chargea7le and s( the c(st (4 data trans1issi(n is -ery l(w. This 1ay 7e regarded as the 1(st i10(rtant c(nsiderati(n 7y 7usiness indi-iduals. #9,9 netw(r)s all(w 4i3ed (r 1(7ile users t( c(nnect t( the netw(r) acr(ss a 4i3ed lin) and a 0ac)et switched syste1 res0ecti-ely. Fi3ed users ha-e a 4i3ed 0hysical lin) t( the #9,9 netw(r). In the case (4 a 1(7ile end user2 the user can2 i4
18
#9,9 netw(r) 4acilities are n(n-e3istent2 c(nnect t( e3isting circuit switched netw(r)s and trans1it data -ia these netw(r)s. This is )n(wn as #ircuit ;witched #9,9 (#;-#9,9!.
;er-ice c(-erage is a 4unda1ental ele1ent (4 0r(-iding e44ecti-e wireless s(luti(ns t( users and using this 1eth(d achie-es this (7jecti-e. +here #9,9 is a-aila7le data is s0lit int( 0ac)ets and a 0ac)et switched netw(r) 0r(t(c(l is used t( trans0(rt the 0ac)ets acr(ss the netw(r). This 1ay 7e (4 either 9atagra1 (r Virtual #ircuit ;witching 4(r1. The data 0ac)ets are inserted (n 1(1entarily un(ccu0ied -(ice 4re8uencies during the idle ti1e (n the -(ice signals. #9,9 netw(r)s ha-e a netw(r) hierarchy with each le-el (4 the hierarchy d(ing its (wn s0eci4ied tas)s.
1$
"(7ile <nd =ser Inter4ace. =sing a single de-ice such as a ,ers(nal 9igital %ssistant (r 0ers(nal c(10uter which has 7een c(nnected t( a Cadi( Fre8uency (CF! "(de1 which is s0ecially ada0ted with the antennae re8uired t( trans1it data (n the cellular netw(r)2 the 1(7ile end user can trans1it 7(th data and -(ice signals. V(ice signals are trans1itted -ia a 1(7ile 0h(ne c(nnected t( the CF "(de1 =nit. CF "(de1s trans4er data in 7(th 4(rward and re-erse channels using Gaussian "ini1u1 ;hi4t Keying (";K! 1(dulati(n 2 a 1(di4ied 4(r1 (4 Fre8uency ;hi4t Keying (F;K!.
"(7ile 9ata Base ;tati(n ("9B;!. In each cell (4 the cellular rece0ti(n area2 there is a "(7ile 9ata Base ;tati(n ("9B;! which is res0(nsi7le 4(r detecti(n (4 idle ti1e in -(ice channels2 4(r relaying data 7etween the 1(7ile units and the "(7ile 9ata Inter1ediate
2%
;yste1s ("9I;!2 sending (4 0ac)ets (4 data (nt( the a00r(0riate un(ccu0ied 4re8uencies as well as recei-ing data 0ac)ets and 0assing the1 t( the a00r(0riate "(7ile end user within its d(1ain.
o
9etecti(n (4 idle ti1e. This is achie-ed using a scanning recei-er (als( )n(wn as sni44er! h(used in the "9B;. The sni44er detects -(ice tra44ic 7y 1easuring the signal strength (n a s0eci4ic 4re8uency2 hence detecting an idle channel. Celaying data 0ac)ets 7etween 1(7ile units and netw(r)s. I4 the sni44er detects tw( idle channels then the "9B; esta7lishes tw( CF air-lin)s 7etween the end user unit and itsel4.
"(7ile 9ata Inter1ediate ;yste1s ("9I;! Gr(u0s (4 "9B; that c(ntr(l each cell in the cellular netw(r) rece0ti(n area are c(nnected t( a higher le-el entity in the netw(r) hierarchy2 the "(7ile 9ata Inter1ediate ;yste1s. #(nnecti(n is 1ade -ia a wide7and trun) ca7le. 9ata 0ac)ets are then relayed 7y "9B; t( and 4r(1 1(7ile end users and "9I;.
Inter1ediate ;yste1s (I;! "9I; are interc(nnected t( these I; which 4(r1 the 7ac)7(ne (4 the #9,9 syste1. These syste1s are unaware (4 1(7ility (4 end-users2 as this is hidden 7y l(wer le-els (4 the netw(r) hierarchy. The I;s are the syste1s that 0r(-ide the #9,9 inter4ace t( the -ari(us c(10uter and 0h(ne netw(r)s.
21
=ser %uthenticati(n The 0r(cedure which chec)s i4 the identity (4 the su7scri7er trans4erred (-er the radi( 0ath c(rres0(nds with the details held in the netw(r).
=ser %n(ny1ity Instead (4 the actual direct(ry tele0h(ne nu17er 2 the Internati(nal "(7ile ;u7scri7er Identity (I";I! nu17er is used within the netw(r) t( uni8uely identi4y a 1(7ile su7scri7er.
Fraud ,re-enti(n ,r(tecti(n against i10ers(nati(n (4 auth(ri6ed users and 4raudulent use (4 the netw(r) is re8uired.
,r(tecti(n (4 user data* %ll the signals within the netw(r) are encry0ted and the identi4icati(n )ey is ne-er trans1itted thr(ugh the air. This ensures 1a3i1u1 netw(r) and data security.
The data 0ac)ets are trans1itted at s0eeds (4 ty0ically 19.2 Kil(7itsIsec(nd t( the "9B;2 7ut actual thr(ugh0ut 1ay 7e as l(w as 9.@ Kil(7itsIsec(nd due t( the e3tra redundant data that is added t( trans1itted 0ac)ets. This in4(r1ati(n includes sender address2 recei-er address and in the case (4 9atagra1 ;witching2 a 0ac)et (rdering nu17er. #hec) data is als( added t( all(w err(r c(rrecti(n i4 7its are inc(rrectly recei-ed. <ach data 0ac)et is enc(ded with the chec) data using a Ceed-;(l(1(n
22
4(rward err(r c(rrecti(n c(de. The enc(ded se8uence is then l(gically ?C:ed with a 0seud(-rand(1 se8uence2 t( assist the "9B; and 1(7ile units in synchr(ni6ati(n (4 7its. The trans1itted data is als( encry0ted t( 1aintain syste1 security. #9,9 4(ll(ws the ?;I standard 1(del 4(r 0ac)et switched data c(11unicati(ns. The #9,9 architecture e3tends acr(ss layers (ne2 tw( and three (4 the ?;I layer 1(del. The 1(7ile end users handle the layer ' 4uncti(ns (trans0(rt! and higher layers (4 the ?;I 1(del such as user inter4ace.
23
F(r <state %gents <state agents can w(r) either at h(1e (r (ut in the 4ield. +ith 1(7ile c(10uters they can 7e 1(re 0r(ducti-e. They can (7tain current real estate in4(r1ati(n 7y accessing 1ulti0le listing ser-ices2 which they can d( 4r(1 h(1e2 (44ice (r car when (ut with clients. They can 0r(-ide clients with i11ediate 4eed7ac) regarding s0eci4ic h(1es (r neigh7(rh((ds2 and with 4aster l(an a00r(-als2 since a00licati(ns can 7e su71itted (n the s0(t. There4(re2 1(7ile c(10uters all(w the1 t( de-(te 1(re ti1e t( clients.
<1ergency ;er-ices %7ility t( recei-e in4(r1ati(n (n the 1(-e is -ital where the e1ergency ser-ices are in-(l-ed. In4(r1ati(n regarding the address2 ty0e and (ther details (4 an incident can 7e dis0atched 8uic)ly2 -ia a #9,9 syste1 using 1(7ile c(10uters2 t( (ne (r se-eral a00r(0riate 1(7ile units which are in the -icinity (4 the incident. /ere2 the relia7ility and security i10le1ented in the #9,9 syste1 w(uld 7e (4 great ad-antage.
24
In c(urts 9e4ense c(unsels can ta)e 1(7ile c(10uters in c(urt. +hen the (00(sing c(unsel re4erences a case which they are n(t 4a1iliar2 they can use the c(10uter t( get direct2 real-ti1e access t( (n-line legal data7ase ser-ices2 where they can gather in4(r1ati(n (n the case and related 0recedents. There4(re 1(7ile c(10uters all(w i11ediate access t( a wealth (4 in4(r1ati(n2 1a)ing 0e(0le 7etter in4(r1ed and 0re0ared.
In c(10anies "anagers can use 1(7ile c(10uters in2 say2 critical 0resentati(ns t( 1aj(r cust(1ers. They can access the latest 1ar)et share in4(r1ati(n. %t a s1all recess2 they can re-ise the 0resentati(n t( ta)e ad-antage (4 this in4(r1ati(n. They can c(11unicate with the (44ice a7(ut 0(ssi7le new (44ers and call
2"
1eetings 4(r discussing res0(nds t( the new 0r(0(sals. There4(re2 1(7ile c(10uters can le-erage c(10etiti-e ad-antages.
;t(c) In4(r1ati(n #(llati(nI#(ntr(l In en-ir(n1ents where access t( st(c) is -ery li1ited i.e.* 4act(ry wareh(uses. The use (4 s1all 0(rta7le electr(nic data7ases accessed -ia a 1(7ile c(10uter w(uld 7e ideal. 9ata c(llated c(uld 7e directly written t( a central data7ase2 -ia a #9,9 netw(r)2 which h(lds all st(c) in4(r1ati(n hence the need 4(r trans4er (4 data t( the central c(10uter at a later date is n(t necessary. This ensures that 4r(1 the ti1e that a st(c) c(unt is c(10leted2 there is n( inc(nsistency 7etween the data in0ut (n the 0(rta7le c(10uters and the central data7ase.
#redit #ard Veri4icati(n %t ,(int (4 ;ale (,?;! ter1inals in sh(0s and su0er1ar)ets2 when cust(1ers use credit cards 4(r transacti(ns2 the interc(11unicati(n re8uired 7etween the 7an) central c(10uter and the ,?; ter1inal2 in (rder t( e44ect -eri4icati(n (4 the card usage2 can ta)e 0lace 8uic)ly and securely (-er cellular channels using a 1(7ile c(10uter unit. This can s0eed u0 the transacti(n 0r(cess and relie-e c(ngesti(n at the ,?; ter1inals.
Ta3iITruc) 9is0atch =sing the idea (4 a centrally c(ntr(lled dis0atcher with se-eral 1(7ile units (ta3is!2 1(7ile c(10uting all(ws the ta3is t( 7e gi-en 4ull details (4 the dis0atched j(7 as well as all(wing the ta3is t( c(11unicate in4(r1ati(n a7(ut their wherea7(uts 7ac) t( the central dis0atch (44ice. This syste1 is als( e3tre1ely use4ul in secure deli-eries i.e.* ;ecuric(r. This all(ws a central c(10uter t( 7e a7le t( trac) and recei-e status in4(r1ati(n 4r(1 all (4 its 1(7ile secure deli-ery -ans. %gain2 the security and relia7ility 0r(0erties (4 the #9,9 syste1 shine thr(ugh.
26
<lectr(nic "ailI,aging =sage (4 a 1(7ile unit t( send and read e1ails is a -ery use4ul asset 4(r any 7usiness indi-idual2 as it all(ws hi1Iher t( )ee0 in t(uch with any c(lleagues as well as any urgent de-el(01ents that 1ay a44ect their w(r). %ccess t( the Internet2 using 1(7ile c(10uting techn(l(gy2 all(ws the indi-idual t( ha-e -ast arrays (4 )n(wledge at hisIher 4ingerti0s. ,aging is als( achie-a7le here2 gi-ing e-en 1(re interc(11unicati(n ca0a7ility 7etween indi-iduals2 using a single 1(7ile c(10uter de-ice
2#
F(ur c(10(nents within the C9, stac) instance are the "ulti0(int #(11unicati(n ;er-ice ("#;"=N!2 the Generic #(n4erence #(ntr(l (G##!2 +dtshare.sys2 and Tdtc0.sys.
"#;"u3 c(ntr(ls channel assign1ent2 0ri(rity le-els2 and seg1entati(n (4 data 7eing sent. It essentially a7stracts the 1ulti0le C9, stac)s int( a single entity.
G## all(ws the creati(n and deleti(n (4 sessi(n c(nnecti(ns and c(ntr(ls res(urces 0r(-ided 7y "#;.
Tdtc0.sys* a trans0(rt dri-er t( 0ac)age the 0r(t(c(l (nt( the underlying netw(r) 0r(t(c(l2 T#,II,.
3EATURES C9, includes the 4(ll(wing 4eatures and ca0a7ilities* <ncry0ti(n* C9, uses a ci0her designed t( e44iciently encry0t s1all a1(unts (4 data C(a1ing disc(nnect* % user can 1anually disc(nnect 4r(1 a re1(te des)t(0 sessi(n with(ut l(gging (44. The user is aut(1atically rec(nnected t( their disc(nnected sessi(n when he (r she l(gs 7ac) (nt( the syste12 either 4r(1 the sa1e de-ice (r a di44erent de-ice. +hen a user:s sessi(n is une30ectedly ter1inated 7y a netw(r) (r client 4ailure2 the user is disc(nnected 7ut n(t l(gged (44. #li07(ard 1a00ing* =sers can delete2 c(0y2 and 0aste te3t and gra0hics 7etween a00licati(ns running (n the l(cal c(10uter and th(se running in a re1(te des)t(0 sessi(n2 and 7etween sessi(ns. Ce1(te c(ntr(l* #(10uter su00(rt sta44 can -iew and c(ntr(l a re1(te des)t(0 sessi(n. ;haring in0ut and dis0lay gra0hics 7etween tw( re1(te des)t(0 sessi(ns gi-es a su00(rt 0ers(n the a7ility t( diagn(se and res(l-e 0r(7le1s re1(tely.
2$
;u00(rt 4(r 2-7it c(l(r. I10r(-ed 0er4(r1ance (-er l(w-s0eed dial-u0 c(nnecti(ns thr(ugh reduced 7andwidth.
Key7(ard h(()ing. The a7ility t( direct s0ecial +ind(ws )ey c(17inati(ns2 in 4ull-screen 1(de2 t( the l(cal c(10uter (r t( a re1(te c(10uter.
;(und2 dri-e2 0(rt2 and netw(r) 0rinter redirecti(n. ;(unds that (ccur (n the re1(te c(10uter can 7e heard (n the client c(10uter running the C9# client2 and l(cal client dri-es will 7e -isi7le t( the re1(te des)t(0 sessi(n.
;u00(rts di44erent ty0es (4 netw(r) t(0(l(gies li)e T#,II,2 I;9>2 I,N. C9, is designed t( su00(rt di44erent ty0es (4 netw(r) t(0(l(gies and 1ulti0le .%> 0r(t(c(ls.
C9, 0r(-ides an e3tensi7le 7ase and su00(rts u0 t( @'2000 se0arate channels 4(r data trans1issi(n
DISADVANTA!ES4 /igh 7andwidth re8uire1ents and netw(r) latency 9i44iculty in 4(rwarding thr(ugh r(uters. #ann(t access all )inds (4 syste1s.
3%
PCoIP
,#(I, (,# (-er I,!2 4irst released in 200$2 is a dis0lay 0r(t(c(l that deli-ers -irtual des)t(0s t( re1(te end0(ints (-er any I, netw(r). This 0r(t(c(l has accelerated the ad(0ti(n (4 des)t(0 -irtuali6ati(n s(luti(ns. It als( (-erc(1es the li1itati(ns (4 earlier re1(te dis0lay 0r(t(c(ls li)e C9,. The netw(r) latency enc(untered in C9, is i10r(-ed 1arginally in ,#(I,. ,#(I, is a 4le3i7le de0l(y1ent 1(del and 0r(-ides single 0(int (4 1anage1ent. It is a dyna1ic 0r(t(c(l that 0r(-ides dis0lay t( te3t 7ased user (r designers with 9 re8uire1ents. ,#(I, su00(rts all des)t(0 -ide( c(des and 4(r1ats2 high res(luti(n2 4ull 4ra1e rate 9 gra0hics2 G,= w(r)stati(ns and =;B 0(rts c(nnecti-ity. 9e4ault 0(rt (4 ,#(I, is &0002. 3EATURES Three 1(st i10(rtant 4eatures (4 ,#(I, which 1a)es it r(7ust 4(r des)t(0 -irtuali6ati(n are* 1. /(st rendering* The user data and 0r(cessing are li1ited t( the ser-ers. ,#(I, 7r(adcasts encry0ted 0i3els (nly t( the user end there7y 0reser-ing the ,# en-ir(n1ent. %s the de-ice at the user end just has t( dec(de the 0i3els t( dis0lay2 it is 0(ssi7le t( ha-e ;tateless2 dec(de (nly clients called 6er( clients at user end. There are n( a00licati(n de0endencies and inc(10ati7ilities. The 4uture a00licati(n will als( w(r) and (ne way (4 deli-ery reduces netw(r) latency. 2. "ulti-c(dec i1age dec(10(siti(n* >(t all i1age ele1ents (n dis0lay are (4 the sa1e ty0e. Thus2 using sa1e c(dec 4(r all (4 the1 will (nly increase the netw(r) latency. ,#(I, rec(gni6es di44erent ty0es (4 c(ntent and then uses di44erent c(10ressi(n alg(rith1 and c(dec 7ased (n the c(ntent ty0e. This intelligent i1age dec(10(siti(n and (0ti1i6ed i1age enc(ding als( reduces trans1issi(n 7andwidth. . 9yna1ic netw(r) ada0ti(n* ,#(I, can 7e c(n4igured t( 1anage Bandwidth usage. ,#(I, aut(1atically adjusts the i1age 8uality 7ased (n the netw(r) a-aila7ility. ,#(I,5s rendering a00r(ach is a 0r(gressi-e 7uild. Fr(1 highly c(10ressed gl(ssy i1age it gradually 7uilds a 4ull l(ssless i1age. ,#(I,
31
uses =9, 0r(t(c(l 4(r (0ti1al 0er4(r1ance (4 1edia and strea1ing c(ntent while reducing 7andwidth re8uire1ents. ,ENE3ITS O3 PCOIP4 ,#(I, has 7een a 7rea)thr(ugh inn(-ati(n in dis0lay c(10ressi(n and 0r(0agati(n (-er .%> and +%> netw(r)s. Its 7ene4its are* 1. <nhanced >etw(r) Bandwidth* ,#-(-er-I, techn(l(gy trans1its 0i3els2 n(t data2 decreasing netw(r) latency and 7andwidth usage. ,#(I, als( adjusts as 0er the netw(r) c(nditi(ns t( 0r(-ide 7est user e30erience. 2. Fle3i7le 9e0l(y1ent* ,#-(-er-I, techn(l(gy is deli-ered in 7(th hardware and s(4tware i10le1entati(ns. %s s(4tware end0(ints it is integrated with third 0arty -end(rs 0r(-iding des)t(0 -irtuali6ati(n s(luti(ns. /ardware end0(ints include 6er( clients that (44er the ,#(I, 4uncti(nality. . #(st (4 (wnershi0* ,#-(-er-I, re0laces the traditi(nal ,# with 6er( client (r (rgani6ati(n s0eci4ic de-ices which reduce 1aintenance2 su00(rt and 0r(-isi(ning. This leads t( reduced T#?. '. ;ecurity and 7usiness c(ntinuity* ,#-(-er-I, techn(l(gy uses 12D 7it %<; encry0ti(n (4 0i3els t( 7e trans1itted and data ne-er lea-es the data center. %nti-irus (r anti-1alware is n( 1(re a re8uisite. =;B de-ices are authenticated2 and restricted de-ices l(c)ed d(wn. Finally2 y(ur c(r0(rate I, is 0r(tected. &. >( dri-ers re8uired* =nli1ited des)t(0 0er4(r1ance scala7ility as ,#-(-erI, techn(l(gy is inde0endent (4 h(st #,= (r gra0hics 0r(cessing. #(10lete (0erating syste1 and a00licati(n inde0endence.
ZERO CLIENTS4
Fer( clients are ,#(I, 7ased hardware end0(ints. Fer( clients ha-e the 7est 0(ssi7le 0er4(r1ance and are suited 4(r highest de1anding re8uire1ents li)e 9 designing. Its i10(rtant 4eatures are as 4(ll(ws* 1! ?; and a00licati(n inde0endence 2! .(w 0(wer re8uire1ents and 4an-less
32
! ?nly dec(des h(st rendered 0i3els '! >( c(10(nents li)e #,=2 C%"2 G,= &! .(w 1aintenance @! #(st sa-ings and green c(10uting 7ene4its. $! Cadically ;i10le
33
APPLICATION VIRTUALIZATION
Traditi(nally2 a00licati(ns re8uire t( 7e installed (n the des)t(0Iclient where they share res(urces li)e runti1e li7raries2 registry and (ther c(n4igurati(n settings. In the #pp(ic#tion 0irtu#(i1#tion 1(del2 indi-idual a00licati(ns are enca0sulated with the res(urces they need t( run. %00licati(ns aren5t installed directly (n the client c(10uter2 rather2 is(lated 4r(1 its underlying h(st (0erating syste12 as well as 4r(1 (ther a00licati(ns.
%00licati(n -irtuali6ati(n 1ust 0r(-ide* 1. %ll res(urces re8uired 7y the -irtual a00licati(n are included in the 0ac)age 2. The -irtual a00licati(n is c(10letely se0arated 4r(1 the (0erating syste1 and (ther a00licati(nsB . The -irtual a00licati(n cann(t 1(di4y the nati-e ?; in any way '. The -irtual a00licati(n 7eha-es as i4 installed (n the client de-ice.
34
APPLICATION DELIVER.
STREAMIN ;trea1ing is trans0(rting a00licati(n s0eci4ic dataIres(urces t( the client de-ice when the a00licati(n is e3ecuted. ?nly a 1ini1u1 a1(unt (4 data (c(11(nly 7etween 10- 0O (4 the t(tal a00licati(n! is deli-ered t( a client 7e4(re the a00licati(n is launched. /ence the 4irst ti1e launch (4 the a00licati(n is -ery 8uic)2 and the l(ad (n the netw(r) is reduced t((. %dditi(nal 4eatures (4 the a00licati(n are deli-ered (n de1and2 (r in the 7ac)gr(und with(ut user inter-enti(n. %00licati(n 0ac)ages are st(red (n a (centrali6ed! ser-er. ;trea1ing can (0erate at a 4ile-le-el (wh(le 4iles are c(0ied when they are needed! (r 7l(c)-le-el (4ile chun)s are c(0ied when they are needed!. ;trea1ing is suita7le in well-c(nnected en-ir(n1ents where a00licati(ns sh(uld 7e e3ecuted (nde1and 4r(1 a netw(r) res(urce and end-user i1ages sh(uld 7e )e0t stateless A e.g. V9I and C9;IT;.
EN!A"S#$ATION In <nca0sulati(n2 a00licati(ns are enc#psu(#te& (r iso(#te& 4r(1 (ther a00licati(ns and the underlying +ind(ws ?0erating ;yste1. The a00licati(n is e3ecuted inside the Virtual <n-ir(n1ent and 7eha-es as i4 it is running al(ne in the ?0erating ;yste1. ;ince the %00licati(n Virtuali6ati(n 0re-ents changes t( ;yste1 #(10(nents2 the underlying ?0erating ;yste1 is 0r(tected.
"ORTAB$E A""$I!ATIONS ,(rta7le a00licati(ns are s(4tware 0r(gra1s that can run inde0endently with(ut installing 4iles t( the client de-ice and irres0ecti-e (4 the -ersi(n (4 +ind(ws installed (n the syste1. They are c(11(nly used (n a re1(-a7le st(rage de-ice such as a #92 =;B 4lash dri-e2 4lash card2 (r 4l(00y dis). %gent-less %00licati(n Virtuali6ati(n 1ay c(n-ert e-en c(10le3 a00licati(n int( 0(rta7le a00s.
3"
ISSUES
In a shared en-ir(n1ent li)e h(sted V9I (r ;B#2 the (-erhead (4 a00licati(n -irtuali6ati(n needs t( 7e acc(unted 4(r. %00licati(n -irtuali6ati(n 1ight ha-e e44ect (n* #,=I"e1(ry* The -irtuali6ed a00licati(ns 1ight use 1(re #,= cycles andI(r 1e1(ry than l(cally installed a00licati(ns2 a44ecting (ther users (n the sa1e ser-er in a C9;2 (r T;2 en-ir(n1ent (r users (n the sa1e h(st in a h(sted V9I en-ir(n1ent.
36
>etw(r)* Virtuali6ed a00licati(ns are (4ten strea1ed t( the userPs des)t(0 (r sessi(n. 9e0ending (n the si6e (4 the -irtuali6ed a00licati(n and the distri7uti(n 1eth(d the a00licati(n -irtuali6ati(n s(luti(n is using2 this 1ight ha-e an i10act (n the netw(r).
9is)I;t(rage* First (4 all2 the si6e (4 the -irtuali6ed a00licati(ns can 7e i10(rtant 4(r the dis) si6ing (4 the 0hysical des)t(0 (r la0t(0s (r Virtual "achines. The a00licati(n -irtuali6ati(n s(luti(n can use a caching 1eth(d where the -irtuali6ed a00licati(n is cached (n dis). +hen h(sting a large nu17er (4 -irtual des)t(0s2 the caching (4 the -irtuali6ed a00licati(ns ta)es 0lace in these entirely -irtuali6ed des)t(0s. #u1ulati-e this can ta)e u0 a l(t (4 dis) s0ace. +hene-er 0(ssi7le2 a shared caching 1eth(d sh(uld 7e c(nsidered.
I10act (n I?5s* ?n a 0hysical des)t(0 the nu17er (4 I?,; is n(thing t( w(rry a7(ut2 7ut with shared st(rage this is (ne (4 the 7iggest challenges in a V9I 0r(ject. %00licati(n Virtuali6ati(n 1ight ha-e increase the nu17er (4 I?,; greatly2 resulting in degraded 0er4(r1ance.
3#
VDI ,ENE3ITS
;<#=CITQ* %ll the data is c(n4ined within the data center2 and there is n( l(cal data (n the des)t(0 de-ices. %dditi(nally2 n( data can 7e d(wnl(aded 4r(1 the
38
des)t(0 t( the =;B de-ices (with(ut 0er1issi(n!2 and this 0re-ents users 4r(1 c(0ying 4iles 4r(1 the -irtual 1achines. /ence2 greater security. I",C?V<9 9<;KT?, "%>%G<"<>T* des)t(0 1anage1ent is greatly i10r(-ed 7ecause (4 Fast 0r(-isi(ning 4(r users2 new w(r)stati(ns can 7e set u0 -ery 4ast and the de0l(y1ent (4 Virtual 9es)t(0s and the s(4tware is 4ast and si10le. Fewer hel0 des) calls and 4ewer des)t(0 related 0r(7le1s. #entrali6ed 0atching and a00licati(n installati(nIstrea1ing with(ut l(ading the netw(r). <3cellent 1anage1ent t((ls 4(r ad1inistrati(n and c(ntr(l (-er V9I. #?;T B<><FIT;* V9I thin clients are less e30ensi-e than des)t(0s2 and their re4resh cycle is l(nger than th(se (4 traditi(nal ,#s.. ?rgani6ati(ns can le-erage e3isting ;%> (r >%; de-ices 4(r s(luti(n. The c(st (4 1aintenance (4 w(r)0lace 7ased (n -irtual 1achines is l(wer and des)t(0 1anage1ent c(sts decline 7y si10li4ying ser-er hardware and client de-ices. <><CGQ ;%VI>G;* V9I thin clients use ' watts c(10ared t( the 90-1@0 4(r traditi(nal w(r)stati(nB generate less heat2 and n(ise. #ar7(n 4((t0rint is greatly used as they use less electricity and their re4resh cycles are l(nger (lesser ewaste!. "?BI.< +?CKF?C#<* the 1aj(r 7ene4it (4 V9I is that user des)t(0s are 0(rta7le. The user can rec(nnect 4r(1 any l(cati(n with a -ariety (4 de-ices. This results in n( d(wnti1e 1aintenance t((. <>/%>#<9 =;<C <N,<CI<>#<* des)t(0s can run (n 4aster ser-ers with reduced latency in a00licati(ns (as the res(urces reside in the sa1e 0lace!. ,r(7le1s can 7e 8uic)ly res(l-ed and des)t(0 res(urces can 7e 1(di4ied with
3$
little (r n( interru0ti(n t( the user5s w(r). %nd there is n( white n(ise 4r(1 s0inning 4ans and dis) dri-es. F.<NIBI.ITQ* <ach -irtual 1achine is an i1age that can 7e si10ly c(0ied (r 1(-ed. This gi-es 4le3i7ility t( users and the ad1inistrat(rs can rec(-er data (r the wh(le -irtual 1achine.
4%
;u00(rt is i10r(-ed 7y shad(wing sessi(ns and watching the user5s ste0s =se C9, t((ls (r the V"ware ser-er c(ns(le t( 4(ll(w what the user is d(ing when gi-ing su00(rt re1(tely2 (r ta)e c(ntr(l (4 the 1achine.
<asy rec(-ery2 re0lace1ent (4 1achines. Blue screen2 dead ?;2 n( 0r(7le1R ;i10ly delete the -irtual 1achine and re0lace it in 1inutes rather than h(urs. >( need t( 0hysically c(llect a 1achine.
#entrali6ed c(ntr(l2 shutd(wn (r restart 1achines re1(tely I4 a user changes de0art1ent2 si10ly change the c(nnecti(n 0r(4ile 4(r that user2 all(wing the1 t( access the a00r(0riate de0art1ent 7uild ;hutd(wn (r restart a client 1achine re1(tely
"anage y(ur 0((l (4 1achines %dd (r re1(-e -irtual des)t(0s as needed in a 4ew 1inutes. >( need t( wait 4(r hardware t( arri-e2 when sta44 changes (ccur. .(wer c(sts ?ld ,#s and l(w c(st thin clients can 7e used2 as the 0r(cessing is d(ne 7y the ser-er n(t the client >( di44icult Ter1inal ;er-er 1anage1ent2 rd 0arty utilities needed >( Ter1inal ;er-er #%. c(sts Ceduced su00(rt and ti1e ad1inistering 0hysical des)t(0s.
41
42
CONCLUSION
+ith the ra0id techn(l(gical ad-ance1ents in %rti4icial Intelligence2 Integrated #ircuitry and increases in #(10uter ,r(cess(r s0eeds2 the 4uture (4 1(7ile c(10uting l(()s increasingly e3citing. +ith the e10hasis increasingly (n c(10act2 s1all 1(7ile c(10uters2 it 1ay als( 7e 0(ssi7le t( ha-e all the 0racticality (4 a 1(7ile c(10uter in the si6e (4 a hand held (rgani6er (r e-en s1aller. =se (4 %rti4icial Intelligence 1ay all(w 1(7ile units t( 7e the ulti1ate in 0ers(nal secretaries2 which can recei-e e1ails and 0aging 1essages2 understand what they are a7(ut2 and change the indi-idual 0ers(nal schedule acc(rding t( the 1essage. This can then 7e chec)ed 7y the indi-idual t( 0lan hisIher day. The w(r)ing li4estyle will change2 with the 1aj(rity (4 0e(0le w(r)ing 4r(1 h(1e2 rather than c(11uting. This 1ay 7e 7ene4icial t( the en-ir(n1ent as less trans0(rtati(n will 7e utili6ed. This scary c(nce0t (4 a w(rld 4ull (4 inani1ate 6(17ies sitting2 l(c)ed t( their 1(7ile stati(ns2 accessing e-ery s0here (4 their li-es -ia the c(10uter screen 7ec(1es e-er 1(re real as techn(l(gy2 es0ecially in the 4ield (4 1(7ile data c(11unicati(ns2 ra0idly i10r(-es and2 as sh(wn 7el(w2 trends are -ery 1uch t(wards u7i8uit(us (r 1(7ile c(10uting.
43
Indeed2 techn(l(gies such as Interacti-e tele-isi(n and Vide( I1age #(10ressi(n already i10ly a certain degree (4 1(7ility in the h(1e2 ie. h(1e sh(00ing etc. =sing the 1(7ile data c(11unicati(n techn(l(gies discussed2 this 1(7ility 1ay 7e 0ushed t( e3tre1e. The 4uture (4 "(7ile #(10uting is -ery 0r(1ising indeed2 alth(ugh techn(l(gy 1ay g( t(( 4ar2 causing detri1ent t( s(ciety.
44
RE3RENCES
1. #hristy ,ettey2 Gartner <sti1ates I#T Industry %cc(unts 4(r 2 ,ercent (4 Gl(7al #?2 <1issi(ns2 Gartner >ewsr((12 2@ %0ril2 200$. 2. T(1isla- ,etr(-iS2 KreTi1ir Fertalj2 'emystifying 'esktop 1irtuali#ation2 +;<%;2 2009. . >atalie .a17ert2 'emystifying Client 1irtuali#ation2 F(rrester5s2 %0ril 192 200D. '. "ichael C(se2 Fredric) +. Br(ussard2 Agent less Application virtuali#ation: 4nabling the 4volution of the 'esktop2 I9#2 "ay 200D. &. U(n Br(d)in2 1Mware 5olsters 'esktop 1irtuali#ation product2 >etw(r) +(rld2 >(-e17er 2009. @. 9enise 9u7ie2 6eighing the pros and cons of 'esktop 1irtuali#ation 2 >etw(r) +(rld2 Uune 2010. $. "ichael C(se and Candy ,erry2 7uantifying business 1alue of 1Mware 1iew 2 I9#2 ;e0te17er 2010. D. Cu7en ;0ruijt2 Application 1irtuali#ation !mackdown2 ,VC2 ;e0te17er 2010 9. Ce1(te 9es)t(0 Virtuali6ati(n* 68-/4 (A(49 'esktop 1irtuali#ation 7y G-ntelligroupH. 10. 9aniel Be-eridge21'-: A +ew 'esktop !trategy A :uide to Managing ;ser 'esktop 4nvironments with 1irtual 'esktop -nfrastructure2 V"ware F?<9=;
11. =nderstanding the Ce1(te 9es)t(0 ,r(t(c(l2 "icr(s(4t2 "arch 200$. Cetrie-ed
4r(1 htt0*IIsu00(rt.1icr(s(4t.c(1I)7I1D@@0$
12. Ce1(te 9es)t(0 ,r(t(c(l2 ";9> .i7rary2 "ay 20112 Cetrie-ed 4r(1
htt0*II1sdn.1icr(s(4t.c(1Ien-usIli7raryIaa D 01&(-WV;.D&!.as03
13. ,#(I, Techn(l(gy e30lained2 Teradici2 20112 Cetrie-ed 4r(1
htt0*IIwww.teradici.c(1I0c(i0I0c(i0-techn(l(gy.0h0 1'. V"ware View with ,#(I,* In4(r1ati(n Guide2 V"ware Inc2 2011
4"
APPENDI8
AES: Advanced !SI: !pen System Encryption Standard API: Application Program Interface CPU: Central Processing Unit FTA: File Type Associate GCC: Generic Conference Control GDI: Graphics Device Interconnection PC: Personal Comp ter PCoIP: PC over IP 'DC: 'emote Des$top
Storage
Area
Comm nication Technology I!PS: Inp t ! tp t per Second IP: Internet Protocol ISD": Integrated Service Digital "et#or$ ITU: International
Service
*ased
o#nership TS: Terminal services US*: Universal Serial * s US(: User State
Comm nication Service "AS: "et#or$ Attached Storage !S: !perating System
46