SlideShare une entreprise Scribd logo
1  sur  22
Principles of Virtualization
Prepare and Manage Remote Applications through
Virtualization
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
• Prepare and manage remote applications:
• Configuring application sharing
• Package applications for deployment by using
RemoteApp
• Installing and configuring the RD Session Host Role
Service on the server
ADAD 2
Virtualization Application
Application Virtualization
ADAD 3
Virtualization Technology
Most of the organizations have started using
virtualization technology in their environment –
why?
• Provide various advantages.
• Problem: IT industry spends most of the money for
maintenance.
• Solution: If we use virtualization, we can reduce the
maintenance cost.
• Example: Instead of having ten physical server we can
have one physical machine and run ten virtual machine
on the server. It reduces the power consumption as well.
ADAD 4
Contd…
Virtualization Technology
• Most important advantages in virtualization
technology – provide solutions to reduce down
time.
• So, it leads to high availability.
• Virtualization makes operations simpler.
• The virtualization technology can available as
server virtualization, desktop virtualization,
application virtualization, network virtualization.
ADAD 5
Application Virtualization
• The most recent addition to IT virtualization is
Application virtualization.
• App virtualization lets, the user to utilize and
access the application without installing it on their
local machine.
• This technology detaches the installation of
application from the machine which is accessing it.
• Virtual applications are packaged and sent to the
end user’s computer in such a way that the
applications will not disturb anything which is
already running on the computer.
ADAD 6
Application Virtualization
• We can reduce the workload on the client
computer with app virtualization because the
application is not installed on the local machine
and in remote app virtualization the application is
not running on the local machine.
• There are two types of application virtualization:
1. Remote
2. Streaming
ADAD 7
1. Remote Application Virtualization
• In RAV, the application will be running on a remote
server - using network connection the user can
access and run the application from the local
machine.
• The remote app virtualization relies on a remote
display protocol.
• The seamless windows technology allows the
applications running in the remote machine to be
fully integrated with the local machine. So, the
application will behave as if it is installed on the
local machine.
ADAD 8
Contd…
1. Remote Application Virtualization
• Constant network connection should be
maintained for the functioning of remote app
virtualization, because the end user’s local machine
is accessing the application using the network
connection.
ADAD 9
2. Streaming Application Virtualization
• In SAV, when an end user requests for an application,
the components which are required to run the
application are downloaded to the end user’s local
machine, then the application is executed in the local
machine.
• Only the components which are required to run the
application is downloaded initially.
• The remaining component will be downloaded when it
is required. Once, the components are fully
downloaded the end user can access the application
without network connection. Because the application
is running in the local machine, when the application is
closed all the files that are related to the application
are removed from the local machine.
ADAD 10
Advantages
1. Decreased system impact – When we use
application virtualization the application is not
installed in the client machine. The application
related data and files are not stored in the local
machine. Everything is stored in the server. Even
in the streaming app virtualization when the app
is closed all the application related files are
removed. So, we can save the storage space in
the client machine. The application is not directly
run on the local machine. So, it also saves the
processing power.
ADAD 11
Contd…
Advantages
2. No Conflicts - With Application virtualization, from
a client computer users can access multiple versions
of the same application at the same time without
any conflicts.
For example, in your organization every user is using
an application that will support only Windows 7 OS,
now you want to upgrade all the machine to
Windows 8 but the application will not run on the
windows 8 OS. In this situation the app virtualization
is very useful.
ADAD 12
Contd…
Advantages
3. Extended application lifespan – we can run the
old applications which is not supported by the newer
operating systems.
4. Extended hardware lifespan - The newer
applications require more processing power and high
configuration machine. If we want to use this
application, we need to upgrade the hardware of the
client machine because the older client machine has
low configuration, but if we virtualize these
application then we can run it on the older desktops
which has less configuration.
ADAD 13
Contd…
Advantages
5. Efficient updates - At the server level, all system
patches and updates are done once, when
applications are virtualized. No need to update each
machine separately.
6. Full portability - Virtualized applications can
stream from any network share without a local client
or a backend server.
ADAD 14
Disadvantages
1. Server dependency - We need at least one host
server for application virtualization – need
Virtualization software that must be installed on
the server before we can virtualize any
application.
2. Peripheral devices - Applications that interact
with local scanners and network devices may not
work properly because it is not running on the
local machine.
ADAD 15
Contd…
Disadvantages
3. Device Interaction - Since USB drives don’t work
with virtualization software, we cannot virtualize the
application which requires the use of an attached storage
like smart card.
4. Multimedia - We cannot virtualize the application
which requires multimedia hardware.
• All the computer programs cannot be virtualized. For
example, applications that require a device driver.
• It is difficult to virtualize the Anti-virus programs and
those applications which require heavy operating
system integration, like, Window Blinds and Style XP .
ADAD 16
Prepare and Manage
Remote Applications
ADAD 17
Prepare and Manage Remote Applications –
How
• With the help of remote administration features of
the Windows – one can manage the applications
of all the systems from a remote server.
• One can access the computers of our organization
from a remote server and install application,
modify application and delete application on the
remote machine by using the Remote Desktop
Snap-in.
• In addition to that one can assign or publish
applications.
ADAD 18
Prepare and Manage Remote Applications
• One can assign an application to the users or to the
computers for the access of each person to have
the application on their computers whenever
needed.
• When you want the application to be available to
the users you may publish any application to the
users in the group and they will have the access to
the application whenever necessary as you publish
the application to them.
• These users then determine when to install the
application.
ADAD 19
To create a new connection to a remote
computer :
1. Open the Remote Desktops snap-in from your server.
2. In the wizard right-click the Remote Desktops.
3. Then Click Add new connection.
4. In the Add New Connection wizard, in Server name or
IP address, specify the name or IP address of the server.
5. In Connection Name, specify a name for this
connection. This step is optional you can continue
without specifying name.
6. If you do not want to connect to the console of the
server, uncheck the Connect to console check box.
7. Click OK.
ADAD 20
To publish an application to users:
1. Open the Group Policy Software
Installation wizard.
2. In the details pane, right-click, New and
then click Package.
3. In the Open wizard, select the Windows
Installer package that you want to
published and click Open.
4. In the Deploy Software wizard, click
Published.
ADAD 21
Thank You
ADAD 22

Contenu connexe

Tendances

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationAhmad Hafeezi
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
VMware Overview
VMware OverviewVMware Overview
VMware OverviewMadhu Bala
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualizationHwanju Kim
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Rubal Sagwal
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Conceptfatimaanique1
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesJason TC HOU (侯宗成)
 

Tendances (20)

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
cloud computing
cloud computingcloud computing
cloud computing
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Ubuntu installation-presentations
Ubuntu installation-presentationsUbuntu installation-presentations
Ubuntu installation-presentations
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Virtualization
Virtualization Virtualization
Virtualization
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 

Similaire à Prepare and Manage Remote Applications through Virtualization

Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applicationsRubal Sagwal
 
Softricity - Bri-Forum 2005
Softricity -  Bri-Forum 2005Softricity -  Bri-Forum 2005
Softricity - Bri-Forum 2005Jeff Fisher
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5solarisyougood
 
Exam Microsoft 70-696 Managing Enterprise Devices and Apps Exam
Exam Microsoft 70-696 Managing Enterprise Devices and Apps ExamExam Microsoft 70-696 Managing Enterprise Devices and Apps Exam
Exam Microsoft 70-696 Managing Enterprise Devices and Apps Examlaura beckman
 
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinar
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinarMove Desktop Apps to the Cloud - RollApp & Embarcadero webinar
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinarEmbarcadero Technologies
 
Twelve Factor App With Lagom
Twelve Factor App With LagomTwelve Factor App With Lagom
Twelve Factor App With LagomKnoldus Inc.
 
Benefits of cloud based school erp
Benefits of cloud based school erpBenefits of cloud based school erp
Benefits of cloud based school erpJunction Tech
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudIOSR Journals
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationJeff Fisher
 
CLOUD AND ANDROID APP DEVELOPMENT
CLOUD AND ANDROID APP DEVELOPMENTCLOUD AND ANDROID APP DEVELOPMENT
CLOUD AND ANDROID APP DEVELOPMENTTechahead Software
 
GDG Devfest 2016 session on Android N
GDG Devfest 2016 session on Android NGDG Devfest 2016 session on Android N
GDG Devfest 2016 session on Android NImam Raza
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Rhomobile 5.5 Release Notes
Rhomobile 5.5 Release NotesRhomobile 5.5 Release Notes
Rhomobile 5.5 Release NotesKonstantin Rybas
 
Developing for Android-Types of Android Application
Developing for Android-Types of Android ApplicationDeveloping for Android-Types of Android Application
Developing for Android-Types of Android ApplicationNandini Prabhu
 
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile IntegrationOracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile IntegrationChris Muir
 
Basic of Android App Development
Basic of Android App DevelopmentBasic of Android App Development
Basic of Android App DevelopmentAbhijeet Gupta
 
59 ways to publish an application v0.9
59 ways to publish an application v0.959 ways to publish an application v0.9
59 ways to publish an application v0.9marcelvenema
 
wireless notice board
 wireless notice board wireless notice board
wireless notice boardAnmol Purohit
 

Similaire à Prepare and Manage Remote Applications through Virtualization (20)

Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Softricity - Bri-Forum 2005
Softricity -  Bri-Forum 2005Softricity -  Bri-Forum 2005
Softricity - Bri-Forum 2005
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
Exam Microsoft 70-696 Managing Enterprise Devices and Apps Exam
Exam Microsoft 70-696 Managing Enterprise Devices and Apps ExamExam Microsoft 70-696 Managing Enterprise Devices and Apps Exam
Exam Microsoft 70-696 Managing Enterprise Devices and Apps Exam
 
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinar
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinarMove Desktop Apps to the Cloud - RollApp & Embarcadero webinar
Move Desktop Apps to the Cloud - RollApp & Embarcadero webinar
 
Twelve Factor App With Lagom
Twelve Factor App With LagomTwelve Factor App With Lagom
Twelve Factor App With Lagom
 
Benefits of cloud based school erp
Benefits of cloud based school erpBenefits of cloud based school erp
Benefits of cloud based school erp
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in Cloud
 
Microsoft SoftGrid Application Virtualization
Microsoft SoftGrid Application VirtualizationMicrosoft SoftGrid Application Virtualization
Microsoft SoftGrid Application Virtualization
 
CLOUD AND ANDROID APP DEVELOPMENT
CLOUD AND ANDROID APP DEVELOPMENTCLOUD AND ANDROID APP DEVELOPMENT
CLOUD AND ANDROID APP DEVELOPMENT
 
GDG Devfest 2016 session on Android N
GDG Devfest 2016 session on Android NGDG Devfest 2016 session on Android N
GDG Devfest 2016 session on Android N
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Rhomobile 5.5 Release Notes
Rhomobile 5.5 Release NotesRhomobile 5.5 Release Notes
Rhomobile 5.5 Release Notes
 
Developing for Android-Types of Android Application
Developing for Android-Types of Android ApplicationDeveloping for Android-Types of Android Application
Developing for Android-Types of Android Application
 
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile IntegrationOracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
 
Basic of Android App Development
Basic of Android App DevelopmentBasic of Android App Development
Basic of Android App Development
 
Microservices
MicroservicesMicroservices
Microservices
 
59 ways to publish an application v0.9
59 ways to publish an application v0.959 ways to publish an application v0.9
59 ways to publish an application v0.9
 
wireless notice board
 wireless notice board wireless notice board
wireless notice board
 

Plus de Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityRubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSRubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureRubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual MachineRubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesRubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualizationRubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerRubal Sagwal
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission MediaRubal Sagwal
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 

Plus de Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission Media
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Prepare and Manage Remote Applications through Virtualization

  • 1. Principles of Virtualization Prepare and Manage Remote Applications through Virtualization Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents • Prepare and manage remote applications: • Configuring application sharing • Package applications for deployment by using RemoteApp • Installing and configuring the RD Session Host Role Service on the server ADAD 2
  • 4. Virtualization Technology Most of the organizations have started using virtualization technology in their environment – why? • Provide various advantages. • Problem: IT industry spends most of the money for maintenance. • Solution: If we use virtualization, we can reduce the maintenance cost. • Example: Instead of having ten physical server we can have one physical machine and run ten virtual machine on the server. It reduces the power consumption as well. ADAD 4
  • 5. Contd… Virtualization Technology • Most important advantages in virtualization technology – provide solutions to reduce down time. • So, it leads to high availability. • Virtualization makes operations simpler. • The virtualization technology can available as server virtualization, desktop virtualization, application virtualization, network virtualization. ADAD 5
  • 6. Application Virtualization • The most recent addition to IT virtualization is Application virtualization. • App virtualization lets, the user to utilize and access the application without installing it on their local machine. • This technology detaches the installation of application from the machine which is accessing it. • Virtual applications are packaged and sent to the end user’s computer in such a way that the applications will not disturb anything which is already running on the computer. ADAD 6
  • 7. Application Virtualization • We can reduce the workload on the client computer with app virtualization because the application is not installed on the local machine and in remote app virtualization the application is not running on the local machine. • There are two types of application virtualization: 1. Remote 2. Streaming ADAD 7
  • 8. 1. Remote Application Virtualization • In RAV, the application will be running on a remote server - using network connection the user can access and run the application from the local machine. • The remote app virtualization relies on a remote display protocol. • The seamless windows technology allows the applications running in the remote machine to be fully integrated with the local machine. So, the application will behave as if it is installed on the local machine. ADAD 8
  • 9. Contd… 1. Remote Application Virtualization • Constant network connection should be maintained for the functioning of remote app virtualization, because the end user’s local machine is accessing the application using the network connection. ADAD 9
  • 10. 2. Streaming Application Virtualization • In SAV, when an end user requests for an application, the components which are required to run the application are downloaded to the end user’s local machine, then the application is executed in the local machine. • Only the components which are required to run the application is downloaded initially. • The remaining component will be downloaded when it is required. Once, the components are fully downloaded the end user can access the application without network connection. Because the application is running in the local machine, when the application is closed all the files that are related to the application are removed from the local machine. ADAD 10
  • 11. Advantages 1. Decreased system impact – When we use application virtualization the application is not installed in the client machine. The application related data and files are not stored in the local machine. Everything is stored in the server. Even in the streaming app virtualization when the app is closed all the application related files are removed. So, we can save the storage space in the client machine. The application is not directly run on the local machine. So, it also saves the processing power. ADAD 11
  • 12. Contd… Advantages 2. No Conflicts - With Application virtualization, from a client computer users can access multiple versions of the same application at the same time without any conflicts. For example, in your organization every user is using an application that will support only Windows 7 OS, now you want to upgrade all the machine to Windows 8 but the application will not run on the windows 8 OS. In this situation the app virtualization is very useful. ADAD 12
  • 13. Contd… Advantages 3. Extended application lifespan – we can run the old applications which is not supported by the newer operating systems. 4. Extended hardware lifespan - The newer applications require more processing power and high configuration machine. If we want to use this application, we need to upgrade the hardware of the client machine because the older client machine has low configuration, but if we virtualize these application then we can run it on the older desktops which has less configuration. ADAD 13
  • 14. Contd… Advantages 5. Efficient updates - At the server level, all system patches and updates are done once, when applications are virtualized. No need to update each machine separately. 6. Full portability - Virtualized applications can stream from any network share without a local client or a backend server. ADAD 14
  • 15. Disadvantages 1. Server dependency - We need at least one host server for application virtualization – need Virtualization software that must be installed on the server before we can virtualize any application. 2. Peripheral devices - Applications that interact with local scanners and network devices may not work properly because it is not running on the local machine. ADAD 15
  • 16. Contd… Disadvantages 3. Device Interaction - Since USB drives don’t work with virtualization software, we cannot virtualize the application which requires the use of an attached storage like smart card. 4. Multimedia - We cannot virtualize the application which requires multimedia hardware. • All the computer programs cannot be virtualized. For example, applications that require a device driver. • It is difficult to virtualize the Anti-virus programs and those applications which require heavy operating system integration, like, Window Blinds and Style XP . ADAD 16
  • 17. Prepare and Manage Remote Applications ADAD 17
  • 18. Prepare and Manage Remote Applications – How • With the help of remote administration features of the Windows – one can manage the applications of all the systems from a remote server. • One can access the computers of our organization from a remote server and install application, modify application and delete application on the remote machine by using the Remote Desktop Snap-in. • In addition to that one can assign or publish applications. ADAD 18
  • 19. Prepare and Manage Remote Applications • One can assign an application to the users or to the computers for the access of each person to have the application on their computers whenever needed. • When you want the application to be available to the users you may publish any application to the users in the group and they will have the access to the application whenever necessary as you publish the application to them. • These users then determine when to install the application. ADAD 19
  • 20. To create a new connection to a remote computer : 1. Open the Remote Desktops snap-in from your server. 2. In the wizard right-click the Remote Desktops. 3. Then Click Add new connection. 4. In the Add New Connection wizard, in Server name or IP address, specify the name or IP address of the server. 5. In Connection Name, specify a name for this connection. This step is optional you can continue without specifying name. 6. If you do not want to connect to the console of the server, uncheck the Connect to console check box. 7. Click OK. ADAD 20
  • 21. To publish an application to users: 1. Open the Group Policy Software Installation wizard. 2. In the details pane, right-click, New and then click Package. 3. In the Open wizard, select the Windows Installer package that you want to published and click Open. 4. In the Deploy Software wizard, click Published. ADAD 21