SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012


            Desktop virtualization using SaaS
                      Architecture
       Pranit U. Patil, Pranav S. Ambavkar, Dr.B.B.Meshram, Prof. Varshapriya
                                       VJTI, Matunga, Mumbai, India.
                                             pranit_patil@aol.in




Abstract - Desktop virtualization is new desktop            using the existing available cloud stack OpenStack
delivery method in which desktop operating system           which will provide flexibility, extendibility and
instance customized, build and runs in data centers         security of whole system.
and users can access application or the whole desktop
by using their stateless ‘thin clients’ devices. This                       2. RELATED WORK
method promises significant benefits in terms of data
security, total cost of ownership and manageability of
large amount of operating systems instances running         In various fields like IT or educations there have
in corporate intranetworks. In this paper we have           been significant advances of the delivery of
proposed yet Cloud architecture to provide desktop          desktop environments to the end users, mainly
virtualization which is efficient is terms of network       through virtualization techniques and thin client.
bandwidth and applications overhead at client side.

Keywords – cloud computing, desktop virtualization,         There are various existing protocols and
virtualization. Openstack                                   techniques are used to enable desktop
                                                            virtualization. Mainly they are share the same
               1. INTRODUCTION                              concept of relaying the keyboard and mouse
                                                            events from the client to the servers. Here server
Virtualization is relatively generalized term, which        provides client only screen updates. Various
refers to the operation and management of                   efforts have been already taken        the desktop
computing elements on the virtual platform and as           virtualization products like Virtualbox, VMware
a resource solution in order to simplify the                Workstation which are commonly used by users
management and optimize resources. Desktop                  does     not     completely     realize    desktop
virtualization has varied definitions with the              virtualization. In other words, this software runs
context in which it is implemented [1].                     the virtual machine instance on the local or
                                                            remote computer which is possible by providing
Desktop virtualization also referred as virtual             and emulates the set of hardware so that it can be
desktop interface. Desktop virtualization can be            transferred to other machine by means of
defined as virtualization of computer desktop in            removable media or network.
order to achieve security and flexibility. The
                                                            SunRay, the thin client solution from Sun
current desktop virtualization techniques propel the
                                                            Microsystems now Oracle, provides a client and
whole desktop on the end user machine. They pay
                                                            server solution with token based smartcards
more attention to supply high quality display
                                                            allowing users to move from one thin client
effects at the client, increasing interaction between
                                                            device to another and having their session
the machine and end user. This also increase
                                                            managed by tracking the token ID registered on
required network bandwidth and processing at
                                                            smartcard, SunRay is widely deployed within
client side as client have to process and render the
                                                            Sun and has a growing commercial customer
whole propelled desktop. Many times this desktop
                                                            base. It utilizes Xen and PowerVM virtualized
as a whole is unnecessary as end users are tend to
                                                            linux operating system images[2].
use only applications provided within that desktop.
To provide solution of this we have proposed the            Also VMware workstation based virtual
Yet Another Desktop Virtualization (YADV)                   laboratories which provide VNC access to virtual
system. This paper presents introduction to the             machines running on host machines, also there is
desktop virtualization and the efficient and                another solution provided which uses VMware
lightweight desktop virtualization system (YADV)            solution based on RDP rather than VNC. Adams



                                                                                                         666
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012

extends the virtual laboratory through the use of
central NFS storage for virtual machines. Civic                Figure 1. OpenStack Service Architecture
provides middleware infrastructure on top of raw
hardware resources to provide hosting
environment for virtual machine instance and                OpenStack helps to create Infrastructure-as-a-
virtual machine instance and virtual network               Service in a convenient manner by providing
                                                           generic API‟s which can work with different
instance[3]. User can interact with the instance
just like with physical machine.                           cloud vendors and thus prevent vendor lock-in
                                                           issues. OpenStack is not a hypervisor but one of
However systems mentioned above all do not                 its components controls the hypervisor and other
pay much attention on scalability, security and            underlying functions. Due to the scope of the
decreasing desktop granularity and optimize the            paper, we will not discuss details of OpenStack
protocol utilized between clients and servers              and will restrict our discussion to the critical
which are important in various environments,               issues in VM operations.
such as, wireless networks.                                Other components are typical cloud components
                                                           like object storage, network controller, compute
             3. SYSTEM MODEL                               manager and so on. Specifically, the main
                                                           management module in OpenStack is named as
In order to make high utilization of resources and         “nova” and thus the relative names of other
provide more secure and feasible services for              components. Customers typically consume and
users, we propose a lightweight desktop                    interact with cloud services through the API‟s as
virtualization system using OpenStack cloud                shown above. In the following section, we
stack. We first describe the main framework of             briefly describe the basic VM operations and
the system under study.                                    then describe our observations. For clarity we
                                                           would like to emphasize that Virtual Cloud
3.1. System architecture
                                                           Controller or VCC is the combination of the
The main part of „YADV‟ is OpenStack, which                main compute module, cloud management API‟s
is a group of open source projects, that together          and the system administrator that operates on
aim at creating and managing public as well as             these two entities i.e. VCC = nova-compute
private    clouds.    Following    OpenStack[4]            module + cloud management API + system
architectural diagram gives an overall idea of             administrator). Virtual Machine Operations3.1.1
cloud operations in general;                               Creation: In this phase, a cloud user gets
                                                           authenticated via „user-authorization‟ module. It
                                                           is single-sign on authorization where cloud user
                                                           can access all the associated services from
                                                           various components of openstack. To create an
                                                           instance, a cloud user sends request to VCC
                                                           along with a predefined or customized VM
                                                           template that contains basic OS parameters,
                                                           RAM size etc. Here, nova-scheduler picks up a
                                                           computer node from pool of available resources
                                                           depending upon its scheduling algorithm and
                                                           then the execution phase of the instance starts on
                                                           that computer node (VMM).
                                                           3.1.2 Execution:       VM starts executing an
                                                           instance by using customized OS templates
                                                           provided by the user or by fetching an available
                                                           VM image stored in Image Store(Swift). After
                                                           starting an instance, a key pair is generated and
                                                           gets attached to it and nova-network component
                                                           assigns public IP addresses from available pool
                                                           of addresses .Finally, this instance is provided to
                                                           internet users along with the required
                                                           information about the instance.




                                                                                                         667
                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012

3.1.3 Migration: It consists of moving a running
                                                          mkdir ~/livecdtmp
instance between different physical servers
(VMM) without disconnecting the client. It                mv ubuntu-9.04-desktop-i386.iso ~/livecdtmp
includes migration of memory, storage and                 cd ~/livecdtmp
network connectivity of a virtual machine.
3.1.4 Termination: In this phase, a cloud user or
                                                          Mount the Desktop .iso
internet user sends request to terminate the
running instance. Termination process consists of
                                                          mkdir mnt
stopping the instance, saving user data and
removing any temporary data if used by virtual            sudo mount -o loop ubuntu-9.04-desktop-
machine.                                                  i386.iso mnt
Here, the following figure shows, the
environment variable setup for accessing various
services provided by the OpenStack                        Extract .iso contents into dir 'extract-cd'

                                                          mkdir extract-cd
                                                          sudo rsync --exclude=/casper/filesystem.squashfs
                                                          -a mnt/ extract-cd


                                                          Extract the SquashFS filesystem

                                                          sudo unsquashfs mnt/casper/filesystem.squashfs
                                                          sudo mv squashfs-root edit


                                                          To use the network connection within chroot

Figure 2. Environment Variable for OpenStack              sudo cp /etc/resolv.conf edit/etc/


3.2 Customization of Operating System disk                Customization
images:
         In YADV we are going to make                     apt-get update
customized operating system disk images to                apt-get install openssh-server
make sure virtual machine instances will run
smoothly and will have all the necessary                  apt-get install bluefish
packages in it to support the connectivity to the
                                                          apt-get install gnome-panel
client. As we are going to use Ubuntu Linux, the
following procedure will be more or less same to          Here in customization, we have installed SSH
the other Linux based distros. Customization of           server on cooking Ubuntu desktop system which
operating system involves localize to certain             will provide client application to access the
language, install or remove a software                    virtualized instance of the same.
application, update software and change the
system defaults [5]. Here we‟ll install SSH
server and required applications which are                Producing the CD image
required at client side.                                  sudo mkisofs -D -r -V "$IMAGE_NAME" -
The example shown here uses the ubuntu-9.04-              cache-inodes -J -l -b isolinux/isolinux.bin -c
desktop-i386.iso Desktop CD.                              isolinux/boot.cat -no-emul-boot -boot-load-size 4
                                                          -boot-info-table -o ../ubuntu-9.04.1-desktop-
mv ubuntu-9.04-desktop-i386.iso ~/livecdtmp               i386-custom.iso .

Move or copy it into an empty directory




                                                                                                        668
                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012

This will produce iso image of customized                  4.1 Implementation of application streaming
desktop operating system which can we used by
                                                           Many systems like VNC, Windows based RDP
our YADV system which uses Openstack as its
                                                           or Teamviewer only provides full screen display
backbone. The following snapshot shows
                                                           service. However, most of the times, user wants
registered iso images with OpenStack
                                                           to concentrate on single application but not the
                                                           whole desktop, to that these systems does not
                                                           make any sense. In this paper, the following
                                                           issues are studied and implemented: How to
                                                           obtain information within single window at client
                                                           side? How to propel software list and not all the
                                                           desktop to the client? Which client side
                                                           application can be used to ease the burden of
                                                           complex configuration?
                                                           In this system, we used simple technique to deal
                                                           with above problems. Our prototype is based on
                                                           Linux servers and Linux or Windows clients.
                                                           The X-window system is a graphic user
                                                           environment at server side. In the system we are
                                                           going to use X over SSH to get work done along
                                                           with „gnome-terminal‟[6] software application
                                                           which will propel only software list or panel to
                                                           the client, thus background information about the
                                                           rest desktop improving the performance of
                                                           virtualized instance.
Figure 3. Registered iso images with OpenStack
                                                           The figure 4 shows the propelled software list
                                                           on the client machine.
3.2 Software for clients:
The software for client is lightweight and easy to
use, while showing high performance and high
security. It has two main functions, one is to
receive encrypted data from servers and to
process and display them on screen; the other is
to intercept input event from local machine and
send them to server. Actions like window
resizing, configuration, themes and other local
graphical properties also be detected by the
software at client side.
3.3 Interaction between two sides
 In this paper, we use existing SSH protocol to
implement interaction between client and servers
SSH are highly secure method of communication
which provided encryption to prevent data
interception. This protocol simplifies the work of
data processing significantly and makes the
system have good portability among different
platforms including Windows.

                                                           Figure 4. Propelled software list on client
      4. THE YET ANOTHER DESKTOP                           machine
         VIRTUALIZATION SYSTEM
                                                           4.2 Combination of UI elements
In this section, we present the design of the
proposed desktop virtualization system.




                                                                                                         669
                                      All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012

With the assistance of „gnome-panel‟ software               studied conducted on this YADV shown us that
application, the pixel data on server side can be           it provides better QoS and efficiently allocates
shown at client side. „gnome-panel‟ does provide            resources among users.
flexibility to put itself on any edge of the current
                                                            Future works includes the system development
desktop screen of client. Also if the client is also
                                                            based on Web 2.0 which will eliminate need of
linux, then it shown new propelled software list
                                                            using any client side application expect browser.
on the existing software panel with hover effect.
                                                            More work is also needed to further optimize the
4.3 Client side application and implementation              customized disk image to provide quick and easy
                                                            customization according to end user need.
To use desktop propelled with YADV, client
needs to have very simple and lightweight                                     REFERENCES
existing softwares applications like putty or ssh
client.                                                     1) Desktop Virtualization Technologies and
                                                            Implementation: Pranit Patil-IOSRJEN
If the YADV client is linux machine, then user
needs to issue only following commands                      2) http://www.oracle.com/us/
                                                            technologies/virtualization/061984.html
ssh –X ipaddress_of_YADV_server
                                                            3)http://pdf.aminer.org/000/299/287/specificatio
                                                            n_based_computing_environments_for_informat
If the YADV client is windows, it needs to install
                                                            ion_management.pdf
Xming X-server [7] which will acts as a client
and sends keyboard and mouse events to the                  4) http://openstack.org/
YADV server.
                                                            5)https://help.ubuntu.com/community/LiveCDCu
                                                            stomization
   5. CONCLUSION AND FUTURE WORK
In this paper, we have proposed YADV, a novel               6) http://library.gnome.org/users/gnome -
approach to provide remote virtualization
services to the end user,. In the proposed                        terminal
framework, server resources are integrated into             7) http://sourceforge.net/projects/xming/
powerful and scalable computing cloud stack i.e.
OpenStack which used to make more efficient
use of available hardware. Moreover all the
applications are running on virtual machines and
monitored using OpenStack only. The simulation




                                                                                                         670
                                       All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Windows Azure David Chappell White Paper March 09
Windows Azure David Chappell White Paper March 09Windows Azure David Chappell White Paper March 09
Windows Azure David Chappell White Paper March 09guest120d945
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...Fabrizio Volpe
 
A Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsA Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsSrinath Perera
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam readyHai Nguyen
 
Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vRamakrishnan M
 
Citrix app delivery2
Citrix app delivery2Citrix app delivery2
Citrix app delivery2kiatwarakorn
 
003 vm ware_whitepaper_screen
003 vm ware_whitepaper_screen003 vm ware_whitepaper_screen
003 vm ware_whitepaper_screenPaulo R
 
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixCTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixSpiffy
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud ImplementationMorphlabs
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBhuvanesh Hingal
 
S00193ed1v01y200905cac006
S00193ed1v01y200905cac006S00193ed1v01y200905cac006
S00193ed1v01y200905cac006guest120d945
 

Tendances (19)

Windows Azure David Chappell White Paper March 09
Windows Azure David Chappell White Paper March 09Windows Azure David Chappell White Paper March 09
Windows Azure David Chappell White Paper March 09
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
 
A Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsA Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process Executions
 
VDI in Windows Server 2012
VDI in Windows Server 2012VDI in Windows Server 2012
VDI in Windows Server 2012
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper v
 
Sdn03
Sdn03Sdn03
Sdn03
 
Citrix app delivery2
Citrix app delivery2Citrix app delivery2
Citrix app delivery2
 
367 370
367 370367 370
367 370
 
003 vm ware_whitepaper_screen
003 vm ware_whitepaper_screen003 vm ware_whitepaper_screen
003 vm ware_whitepaper_screen
 
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixCTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud Implementation
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
S00193ed1v01y200905cac006
S00193ed1v01y200905cac006S00193ed1v01y200905cac006
S00193ed1v01y200905cac006
 
From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 

En vedette (9)

102 105
102 105102 105
102 105
 
24 26
24 2624 26
24 26
 
75 78
75 7875 78
75 78
 
75 78
75 7875 78
75 78
 
42 46
42 4642 46
42 46
 
27 32
27 3227 32
27 32
 
1 7
1 71 7
1 7
 
315 319
315 319315 319
315 319
 
590 599
590 599590 599
590 599
 

Similaire à 666 670

A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containersprashant desai
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stackarunuiet
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
OpenStack - An Overview
OpenStack - An OverviewOpenStack - An Overview
OpenStack - An Overviewgraziol
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterHemraj Singh Chouhan
 
Introduction Openstack
Introduction OpenstackIntroduction Openstack
Introduction OpenstackRanjith Kumar
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo SurveyPjack Chen
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayObserveIT
 
Deployment of private cloud infrastructure copy
Deployment of private cloud infrastructure   copyDeployment of private cloud infrastructure   copy
Deployment of private cloud infrastructure copyprabhat kumar
 

Similaire à 666 670 (20)

A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containers
 
Mid term report
Mid term reportMid term report
Mid term report
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stack
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Dz25764770
Dz25764770Dz25764770
Dz25764770
 
OpenStack - An Overview
OpenStack - An OverviewOpenStack - An Overview
OpenStack - An Overview
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal Chapter
 
Introduction Openstack
Introduction OpenstackIntroduction Openstack
Introduction Openstack
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo Survey
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing using OpenStack
Cloud Computing using OpenStackCloud Computing using OpenStack
Cloud Computing using OpenStack
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
Deployment of private cloud infrastructure copy
Deployment of private cloud infrastructure   copyDeployment of private cloud infrastructure   copy
Deployment of private cloud infrastructure copy
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

666 670

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Desktop virtualization using SaaS Architecture Pranit U. Patil, Pranav S. Ambavkar, Dr.B.B.Meshram, Prof. Varshapriya VJTI, Matunga, Mumbai, India. pranit_patil@aol.in Abstract - Desktop virtualization is new desktop using the existing available cloud stack OpenStack delivery method in which desktop operating system which will provide flexibility, extendibility and instance customized, build and runs in data centers security of whole system. and users can access application or the whole desktop by using their stateless ‘thin clients’ devices. This 2. RELATED WORK method promises significant benefits in terms of data security, total cost of ownership and manageability of large amount of operating systems instances running In various fields like IT or educations there have in corporate intranetworks. In this paper we have been significant advances of the delivery of proposed yet Cloud architecture to provide desktop desktop environments to the end users, mainly virtualization which is efficient is terms of network through virtualization techniques and thin client. bandwidth and applications overhead at client side. Keywords – cloud computing, desktop virtualization, There are various existing protocols and virtualization. Openstack techniques are used to enable desktop virtualization. Mainly they are share the same 1. INTRODUCTION concept of relaying the keyboard and mouse events from the client to the servers. Here server Virtualization is relatively generalized term, which provides client only screen updates. Various refers to the operation and management of efforts have been already taken the desktop computing elements on the virtual platform and as virtualization products like Virtualbox, VMware a resource solution in order to simplify the Workstation which are commonly used by users management and optimize resources. Desktop does not completely realize desktop virtualization has varied definitions with the virtualization. In other words, this software runs context in which it is implemented [1]. the virtual machine instance on the local or remote computer which is possible by providing Desktop virtualization also referred as virtual and emulates the set of hardware so that it can be desktop interface. Desktop virtualization can be transferred to other machine by means of defined as virtualization of computer desktop in removable media or network. order to achieve security and flexibility. The SunRay, the thin client solution from Sun current desktop virtualization techniques propel the Microsystems now Oracle, provides a client and whole desktop on the end user machine. They pay server solution with token based smartcards more attention to supply high quality display allowing users to move from one thin client effects at the client, increasing interaction between device to another and having their session the machine and end user. This also increase managed by tracking the token ID registered on required network bandwidth and processing at smartcard, SunRay is widely deployed within client side as client have to process and render the Sun and has a growing commercial customer whole propelled desktop. Many times this desktop base. It utilizes Xen and PowerVM virtualized as a whole is unnecessary as end users are tend to linux operating system images[2]. use only applications provided within that desktop. To provide solution of this we have proposed the Also VMware workstation based virtual Yet Another Desktop Virtualization (YADV) laboratories which provide VNC access to virtual system. This paper presents introduction to the machines running on host machines, also there is desktop virtualization and the efficient and another solution provided which uses VMware lightweight desktop virtualization system (YADV) solution based on RDP rather than VNC. Adams 666 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 extends the virtual laboratory through the use of central NFS storage for virtual machines. Civic Figure 1. OpenStack Service Architecture provides middleware infrastructure on top of raw hardware resources to provide hosting environment for virtual machine instance and OpenStack helps to create Infrastructure-as-a- virtual machine instance and virtual network Service in a convenient manner by providing generic API‟s which can work with different instance[3]. User can interact with the instance just like with physical machine. cloud vendors and thus prevent vendor lock-in issues. OpenStack is not a hypervisor but one of However systems mentioned above all do not its components controls the hypervisor and other pay much attention on scalability, security and underlying functions. Due to the scope of the decreasing desktop granularity and optimize the paper, we will not discuss details of OpenStack protocol utilized between clients and servers and will restrict our discussion to the critical which are important in various environments, issues in VM operations. such as, wireless networks. Other components are typical cloud components like object storage, network controller, compute 3. SYSTEM MODEL manager and so on. Specifically, the main management module in OpenStack is named as In order to make high utilization of resources and “nova” and thus the relative names of other provide more secure and feasible services for components. Customers typically consume and users, we propose a lightweight desktop interact with cloud services through the API‟s as virtualization system using OpenStack cloud shown above. In the following section, we stack. We first describe the main framework of briefly describe the basic VM operations and the system under study. then describe our observations. For clarity we would like to emphasize that Virtual Cloud 3.1. System architecture Controller or VCC is the combination of the The main part of „YADV‟ is OpenStack, which main compute module, cloud management API‟s is a group of open source projects, that together and the system administrator that operates on aim at creating and managing public as well as these two entities i.e. VCC = nova-compute private clouds. Following OpenStack[4] module + cloud management API + system architectural diagram gives an overall idea of administrator). Virtual Machine Operations3.1.1 cloud operations in general; Creation: In this phase, a cloud user gets authenticated via „user-authorization‟ module. It is single-sign on authorization where cloud user can access all the associated services from various components of openstack. To create an instance, a cloud user sends request to VCC along with a predefined or customized VM template that contains basic OS parameters, RAM size etc. Here, nova-scheduler picks up a computer node from pool of available resources depending upon its scheduling algorithm and then the execution phase of the instance starts on that computer node (VMM). 3.1.2 Execution: VM starts executing an instance by using customized OS templates provided by the user or by fetching an available VM image stored in Image Store(Swift). After starting an instance, a key pair is generated and gets attached to it and nova-network component assigns public IP addresses from available pool of addresses .Finally, this instance is provided to internet users along with the required information about the instance. 667 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 3.1.3 Migration: It consists of moving a running mkdir ~/livecdtmp instance between different physical servers (VMM) without disconnecting the client. It mv ubuntu-9.04-desktop-i386.iso ~/livecdtmp includes migration of memory, storage and cd ~/livecdtmp network connectivity of a virtual machine. 3.1.4 Termination: In this phase, a cloud user or Mount the Desktop .iso internet user sends request to terminate the running instance. Termination process consists of mkdir mnt stopping the instance, saving user data and removing any temporary data if used by virtual sudo mount -o loop ubuntu-9.04-desktop- machine. i386.iso mnt Here, the following figure shows, the environment variable setup for accessing various services provided by the OpenStack Extract .iso contents into dir 'extract-cd' mkdir extract-cd sudo rsync --exclude=/casper/filesystem.squashfs -a mnt/ extract-cd Extract the SquashFS filesystem sudo unsquashfs mnt/casper/filesystem.squashfs sudo mv squashfs-root edit To use the network connection within chroot Figure 2. Environment Variable for OpenStack sudo cp /etc/resolv.conf edit/etc/ 3.2 Customization of Operating System disk Customization images: In YADV we are going to make apt-get update customized operating system disk images to apt-get install openssh-server make sure virtual machine instances will run smoothly and will have all the necessary apt-get install bluefish packages in it to support the connectivity to the apt-get install gnome-panel client. As we are going to use Ubuntu Linux, the following procedure will be more or less same to Here in customization, we have installed SSH the other Linux based distros. Customization of server on cooking Ubuntu desktop system which operating system involves localize to certain will provide client application to access the language, install or remove a software virtualized instance of the same. application, update software and change the system defaults [5]. Here we‟ll install SSH server and required applications which are Producing the CD image required at client side. sudo mkisofs -D -r -V "$IMAGE_NAME" - The example shown here uses the ubuntu-9.04- cache-inodes -J -l -b isolinux/isolinux.bin -c desktop-i386.iso Desktop CD. isolinux/boot.cat -no-emul-boot -boot-load-size 4 -boot-info-table -o ../ubuntu-9.04.1-desktop- mv ubuntu-9.04-desktop-i386.iso ~/livecdtmp i386-custom.iso . Move or copy it into an empty directory 668 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 This will produce iso image of customized 4.1 Implementation of application streaming desktop operating system which can we used by Many systems like VNC, Windows based RDP our YADV system which uses Openstack as its or Teamviewer only provides full screen display backbone. The following snapshot shows service. However, most of the times, user wants registered iso images with OpenStack to concentrate on single application but not the whole desktop, to that these systems does not make any sense. In this paper, the following issues are studied and implemented: How to obtain information within single window at client side? How to propel software list and not all the desktop to the client? Which client side application can be used to ease the burden of complex configuration? In this system, we used simple technique to deal with above problems. Our prototype is based on Linux servers and Linux or Windows clients. The X-window system is a graphic user environment at server side. In the system we are going to use X over SSH to get work done along with „gnome-terminal‟[6] software application which will propel only software list or panel to the client, thus background information about the rest desktop improving the performance of virtualized instance. Figure 3. Registered iso images with OpenStack The figure 4 shows the propelled software list on the client machine. 3.2 Software for clients: The software for client is lightweight and easy to use, while showing high performance and high security. It has two main functions, one is to receive encrypted data from servers and to process and display them on screen; the other is to intercept input event from local machine and send them to server. Actions like window resizing, configuration, themes and other local graphical properties also be detected by the software at client side. 3.3 Interaction between two sides In this paper, we use existing SSH protocol to implement interaction between client and servers SSH are highly secure method of communication which provided encryption to prevent data interception. This protocol simplifies the work of data processing significantly and makes the system have good portability among different platforms including Windows. Figure 4. Propelled software list on client 4. THE YET ANOTHER DESKTOP machine VIRTUALIZATION SYSTEM 4.2 Combination of UI elements In this section, we present the design of the proposed desktop virtualization system. 669 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 With the assistance of „gnome-panel‟ software studied conducted on this YADV shown us that application, the pixel data on server side can be it provides better QoS and efficiently allocates shown at client side. „gnome-panel‟ does provide resources among users. flexibility to put itself on any edge of the current Future works includes the system development desktop screen of client. Also if the client is also based on Web 2.0 which will eliminate need of linux, then it shown new propelled software list using any client side application expect browser. on the existing software panel with hover effect. More work is also needed to further optimize the 4.3 Client side application and implementation customized disk image to provide quick and easy customization according to end user need. To use desktop propelled with YADV, client needs to have very simple and lightweight REFERENCES existing softwares applications like putty or ssh client. 1) Desktop Virtualization Technologies and Implementation: Pranit Patil-IOSRJEN If the YADV client is linux machine, then user needs to issue only following commands 2) http://www.oracle.com/us/ technologies/virtualization/061984.html ssh –X ipaddress_of_YADV_server 3)http://pdf.aminer.org/000/299/287/specificatio n_based_computing_environments_for_informat If the YADV client is windows, it needs to install ion_management.pdf Xming X-server [7] which will acts as a client and sends keyboard and mouse events to the 4) http://openstack.org/ YADV server. 5)https://help.ubuntu.com/community/LiveCDCu stomization 5. CONCLUSION AND FUTURE WORK In this paper, we have proposed YADV, a novel 6) http://library.gnome.org/users/gnome - approach to provide remote virtualization services to the end user,. In the proposed terminal framework, server resources are integrated into 7) http://sourceforge.net/projects/xming/ powerful and scalable computing cloud stack i.e. OpenStack which used to make more efficient use of available hardware. Moreover all the applications are running on virtual machines and monitored using OpenStack only. The simulation 670 All Rights Reserved © 2012 IJARCET