Computer Science
Chapter 9 Citrix Virtualization XenDesktop Cloud Computing ICA Paper

Question Description

I’m studying and need help with a Computer Science question to help me learn.

For this weeks assignment, submit a paper that describes virtualization. Pick a virtualization platform of your choice and describe how it manages the hardware to present guest operating systems with virtual hardware.

Please remember that papers should be a minimum of 600 words. Also, don't forget parenthetical and narrative citations in the body of your text.

Assignments should be clear and detailed, sources must be cited in APA format and must have clear organization and flow.

- Strictly No plagiarism

Required Reading

1. Jamsa – Chapter 8

2. Erl – Chapter 5 (Section 5.3 Only)

3. Jamsa – Chapter 9

4. Erl – Chapter 6 (Sections 6.1 and 6.4 Only)


Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Unformatted Attachment Preview

1 2 3 Brief Contents Preface Chapter 1 Introducing Cloud Computing Chapter 2 Software as a Service (SaaS) Chapter 3 Platform as a Service (PaaS) Chapter 4 Infrastructure as a Service (IaaS) Chapter 5 Identity as a Service (IDaaS) Chapter 6 Data Storage in the Cloud Chapter 7 Collaboration in the Cloud Chapter 8 Virtualization Chapter 9 Securing the Cloud Chapter 10 Disaster Recovery and Business Continuity and the Cloud Chapter 11 Service-Oriented Architecture Chapter 12 Managing the Cloud 4 Chapter 13 Migrating to the Cloud Chapter 14 Mobile Cloud Computing Chapter 15 Governing the Cloud Chapter 16 Evaluating the Cloud’s Business Impact and Economics Chapter 17 Designing Cloud-Based Solutions Chapter 18 Coding Cloud-Based Applications Chapter 19 Application Scalability Chapter 20 The Future of the Cloud Glossary of Key Terms Index Credits 5 Contents Preface Chapter 1 Introducing Cloud Computing Web 2.0 and the Cloud Distinguishing Cloud Types Cloud Deployment Models Cloud Service Models Exploring Uses of the Cloud Introducing Scalability Introducing Virtualization Collecting Processing Power Through Grid Computing Chapter Summary Key Terms Chapter Review Chapter 2 Software as a Service (SaaS) Getting Started with SaaS Understanding the Multitenant Nature of SaaS Solutions Understanding OpenSaaS Solutions Understanding Mashups Understanding Service-Oriented Architecture (SOA) Chapter Summary Key Terms Chapter Review 6 Chapter 3 Platform as a Service (PaaS) IT Evolution Leading to the Cloud Benefits of PaaS Solutions Disadvantages of PaaS Solutions Chapter Summary Key Terms Chapter Review Chapter 4 Infrastructure as a Service (IaaS) Understanding IaaS Improving Performance Through Load Balancing Taking a Closer Look at Load Balancing System and Storage Redundancy Utilizing Cloud-Based NAS Devices Advantages of IaaS Solutions Server Types Within an IaaS Solution Chapter Summary Key Terms Chapter Review Chapter 5 Identity as a Service (IDaaS) Understanding Single Sign-On (SSO) Understanding How SSO Works Understanding Federated Identity Management Understanding Account Provisioning Understanding OpenID Mobile ID Management 7 Chapter Summary Key Terms Chapter Review Chapter 6 Data Storage in the Cloud Examining the Evolution of Network Storage Understanding Cloud-Based Data Storage Advantages and Disadvantages of Cloud-Based Data Storage Getting Past the Fear of Cloud-Based Data Cloud-Based Backup Systems Understanding File Systems Industry-Specific Cloud-Based Data Storage Cloud-Based Database Solutions Cloud-Based Block Storage Chapter Summary Key Terms Chapter Review Chapter 7 Collaboration in the Cloud Collaborating in the Clouds Questions to Ask About Collaborative Tools Web-Based Collaboration Began with Web Mail Instant Messaging Isn’t What It Used to Be Cloud-Based Phone and Fax Systems Revisiting File Sharing Editing Shared Files Within the Cloud Collaborating via Web Logs (Blogs) 8 Collaborative Meetings in the Cloud Virtual Presentations and Lectures Using Social Media for Collaboration Using Cloud-Based Calendar Management Using Streaming Video Content to Collaborate Cloud-Based TV Content Chapter Summary Key Terms Chapter Review Chapter 8 Virtualization Understanding Virtualization The History of Virtualization Leveraging Blade Servers Server Virtualization Desktop Virtualization Desktop Solutions on Demand Virtual Networks Data Storage Virtualization Not All Applications Are Well Suited for Virtualization Why Virtualize? Chapter Summary Key Terms Chapter Review Chapter 9 Securing the Cloud General Security Advantages of Cloud-Based Solutions 9 Introducing Business Continuity and Disaster Recovery Understanding Data Storage Wiping Understanding Distributed Denial-of-Service (DDoS) Attacks Packet Sniffing Man-in-the-Middle Attack Monitoring Device Screens Malicious Employees Hypervisor Attack Guest-Hopping Attack SQL-Injection Attack Physical Security Chapter Summary Key Terms Chapter Review Chapter 10 Disaster Recovery and Business Continuity and the Cloud Understanding the Threats Threat: Disk Failure Threat: Power Failure or Disruption Threat: Computer Viruses Threat: Fire Threat: Floods Threat: Disgruntled Employees Threat: Lost Equipment Threat: Desktop Failure Threat: Server Failure 10 Threat: Network Failure Threat: Database System Failure Threat: Phone System Failure Understanding Service-Level Agreements Measuring Business Impact: The Essence of Risk Mitigation Disaster Recovery Plan Template Chapter Summary Key Terms Chapter Review Chapter 11 Service-Oriented Architecture Understanding Service-Oriented Architecture Web Services Are Not Web Pages Many Companies Provide Web Services Discovering Web Services Understanding Web Service Performance Web Service and Reuse Scaling Web Services Web Services and Loose Coupling Treating a Web Service as a Black Box Web Service Interoperability Web Service Description Language Governing Web Services Chapter Summary Key Terms Chapter Review 11 Chapter 12 Managing the Cloud Know Your Service-Level Agreement Ensure and Audit System Backups Know Your System’s Data Flow Beware of Vendor Lock-In Source-Code Escrow Determine Technical Support and Help Desk Procedures Determine Training Procedures Know the Provider’s Security Policies and Procedures Define the Data Privacy Requirements Know Specifics About the Economics of the Cloud and Return on Investment Monitor Capacity Planning and Scaling Capabilities Monitor Audit-Log Use Solution Testing and Validation Chapter Summary Key Terms Chapter Review Chapter 13 Migrating to the Cloud Define the System Goals and Requirements Protect Your Existing Data Use an Experienced Cloud Consultant Know Your Application’s Current Characteristics Remember Vendor Lock-In Define Your Training Requirements Establish a Realistic Deployment Schedule 12 Review the Budget Factors Identify IT Governance Issues Understanding Cloud Bursting Chapter Summary Key Terms Chapter Review Chapter 14 Mobile Cloud Computing The Evolution of Mobile Computing Understanding the G in 3G and 4G The Mobile Cloud Ecosystem Introducing the Mobile Players Pages, Apps, and Widgets Revisiting the Role of HTML Mobile Development Considerations Chapter Summary Key Terms Chapter Review Chapter 15 Governing the Cloud Understanding Corporate Governance Understanding Business Strategy Measure What Is Important Inspect What You Expect Understanding Internal Controls Extending Governance to Information Technology Cloud Computing Governance 13 Chapter Summary Key Terms Chapter Review Chapter 16 Evaluating the Cloud’s Business Impact and Economics Business Economics Total Cost of Ownership Economies of Scale Capital Expenditures Operational Expenses Return on Investment Profit Margins Moore’s Law and the Cloud Understanding Right-Sizing Defining a Large Data Center Other Economic Key Performance Indicators Marketing the Cloud Chapter Summary Key Terms Chapter Review Chapter 17 Designing Cloud-Based Solutions Revisit the System Requirements When to Select a Development Environment Design Is a Give-and-Take Process Designing for Accessibility Designing for Audit 14 Designing for Availability Designing for Backup Designing for Existing and Future Capacity Designing for Configuration Management Designing for Deployment Designing for Disaster Recovery Designing for the Environment (Green Computing) Designing for Interoperability Designing for Maintainability Designing for Performance Designing for Price Designing for Privacy Designing for Portability Designing for Recovery Designing for Reliability Designing for Response Time Designing for Robustness Designing for Security Designing for Testability Designing for Usability Chapter Summary Key Terms Chapter Review Chapter 18 Coding Cloud-Based Applications Creating a Mashup Using Yahoo! Pipes 15 Creating a Simple Yahoo! Pipe Using Google App Engine Creating a Hello, World! Application with Google App Engine Downloading the Google App Engine Software Development Kit Deploying a Simple Google App Engine Example Creating a More Advanced Google App Engine Application Creating a Windows Azure “Hello, World!” Application Chapter Summary Key Terms Chapter Review Chapter 19 Application Scalability Reviewing the Load-Balancing Process Designing for Scalability Scaling Up, Scaling Out, or Both Minimize Objects on Key Pages Selecting Measurement Points Analyze Your Database Operations Evaluate Your System’s Data Logging Requirements Revisit Your Service-Level Agreement Capacity Planning Versus Scalability Scalability and Diminishing Returns Performance Tuning Complication Is the Enemy of Scalability Chapter Summary Key Terms 16 Chapter Review Chapter 20 The Future of the Cloud How the Cloud Will Change Operating Systems Location-Aware Applications Intelligent Fabrics, Paints, and More The Future of Cloud TV Future of Cloud-Based Smart Devices Cloud and Mobile How HTML5 Will Drive Mobile Applications Faster Time to Market for Software Applications Home-Based Cloud Computing Chapter Summary Key Terms Chapter Review Glossary of Key Terms Index Credits 17 Preface FOR YEARS, SOFTWARE DEVELOPERS and network administrators have used the image of a cloud to represent the myriad of communication details that occur as messages flow across the Internet from one computer network to another. This cloud abstraction has now exploded to include processors, both physical and virtual, data storage, software-as-a-service solutions, and mobile applications. Today, cloud-based applications and new capabilities are emerging daily and bringing with them lower cost of entry, pay-for-use processor and data-storage models, greater scalability, improved performance, ease of redundancy, and improved business continuity. With these advantages come increased security challenges and IT-governance concerns. This book examines these issues. As you will learn, two things are certain: The dynamic nature of the cloud will continue and we have only just begun to scratch the cloud’s surface. Chapter 1: Introducing Cloud Computing introduces the abstract nature of cloud computing and the factors that led to its evolution. The chapter examines software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and includes real-world examples of each. The chapter discusses the key advantages of cloud computing, including scalability, redundancy, low cost of entry, and virtualization. Chapter 2: Software as a Service (SaaS) examines browser-based SaaS solutions and their advantages. The chapter features real-world solutions such as for customer relationship management, Taleo for human resources solutions, ADT for SaaS-based payroll processing, and many others. Chapter 3: Platform as a Service (PaaS) introduces cloud-based hardware and software platforms which allow companies, large and small, to move their applications to the cloud quickly and cost effectively. The chapter examines PaaS providers such as Amazon, Google, and Microsoft. Chapter 4: Infrastructure as a Service (IaaS) introduces the concept of a cloud-based data center which reduces or eliminates a company’s need for a large in-house data center. Because of the IaaS provider’s economies of scale, it can reduce a company’s cost of IT operations significantly. Chapter 5: Identity as a Service (IDaaS) examines cloud-based identity-management solutions that simplify user provisioning and resource 18 access. With more solutions distributed across the cloud, IDaaS facilitates the user’s sign-on process across solution providers. Chapter 6: Data Storage in the Cloud examines the integration of cloud-based data storage and the evolution of network-based storage, which led to its creation. The chapter presents several cloud-based data storage solutions that can be enabled at little or no cost. The chapter also examines several low-cost turnkey based backup solutions. Chapter 7: Collaboration in the Cloud looks at cloud-based technologies that allow two or more users to work together to accomplish a task. The chapter describes the evolution of collaboration technologies from instant messaging to virtual meetings to shared documents that support simultaneous editing by multiple users. Chapter 8: Virtualization introduces hardware and software used to create the perception that one or more entities exist, when they may not actually be physically present. The chapter examines solutions for virtual servers, virtual desktops, and virtual networks. Chapter 9: Securing the Cloud examines the real-world security issues that people (even some sophisticated IT users) are uncomfortable with when placing their personal data, or their company’s data, in the cloud. The chapter examines specific security threats and the measures that should be taken to minimize them. Chapter 10: Disaster Recovery and Business Continuity and the Cloud discusses ways that the cloud and its redundant resources improve a company’s ability to recover and continue to operate after a disaster or serious event. The chapter examines common threats to business operations and some cloud-computing solutions that can mitigate them. Chapter 11: Service-Oriented Architecture looks at how the availability of web-based services is changing how developers create programs and the speed at which they can deploy solutions. The chapter examines a variety of real-world web services that are available to programmers for integration into programs. Chapter 12: Managing the Cloud examines the tasks a manager must perform after a company migrates its applications to the cloud, including auditing logs, 19 monitoring system performance, and identifying bottlenecks within the data flow. Chapter 13: Migrating to the Cloud discusses managerial considerations to be evaluated before migrating to the cloud, such as avoiding vendor lock-in, identifying remote data backup operations and security considerations, preparing a budget, and integrating developer and user training. Chapter 14: Mobile Cloud Computing evaluates whether mobile computing is driving the growth of cloud computing or vice versa. The chapter examines the “ecosystem” that is mobile computing as well as how HTML5 will change computing models. Chapter 15: Governing the Cloud discusses the role of IT governance and its extensions for cloud-based computing. The chapter examines the need for and ways to implement cloud-based internal controls. Chapter 16: Evaluating the Cloud’s Business Impact and Economics examines how the cloud’s economy of scale and pay-for-use model will accelerate the ability for companies, large and small, to release cloud-based solutions. The chapter also evaluates the cloud’s impact on operational and capital expenses. Chapter 17: Designing Cloud-Based Solutions discusses the fact that developers will simply pick up and move many existing applications to the cloud. In the future, however, developers should design cloud-based solutions to utilize scalability and redundancy. The chapter examines many common design considerations and ways the cloud will impact them. Chapter 18: Coding Cloud-Based Applications looks at two PaaS providers, Google Apps and Windows Azure, and implements cloud-based applications with each. Developers will learn that creating and deploying cloud-based applications is fast, easy, and inexpensive. Chapter 19: Application Scalability examines how developers can scale applications—vertically, by using faster processors or more powerful servers and horizontally, by supporting the ability to distribute processing better. The chapter looks at design considerations to be evaluated when designing applications for scalability. 20 Chapter 20: The Future of the Cloud examines ways the cloud will extend its reach into cars, televisions, appliances, and even our clothes. By the end of the chapter, readers will realize that we have just scratched the cloud’s surface. 21 chapter 1 Introducing Cloud Computing FOR YEARS DEVELOPERS AND network administrators have represented the Internet within design documents as a cloud. By abstracting the Internet’s technologies and underlying protocols as simply a cloud, as shown in FIGURE 1-1, the developers could temporarily ignore the communication complexity and simply assume that messages would flow successfully from one Internet-connected network to another. Learning Objectives This chapter introduces cloud computing. By the time you finish this chapter, you will be able to do the following: • Understand the abstract nature of cloud computing. • Describe evolutionary factors of computing that led to the cloud. • Describe virtualization at both the desktop and the server level. • Describe and identify common cloud types, which include software as a service, platform as a service, and infrastructure as a service. • Know how businesses and individuals use the cloud. • Describe the benefits and disadvantages of cloud computing. • Understand common security considerations with respect to the cloud. • Describe ways cloud computing can improve system fault tolerance. • Describe Web 2.0 and its relationship to cloud computing. Today the term cloud computing describes the abstraction of web-based computers, resources, and services that system developers can utilize to implement complex web-based systems. Often these cloud-based resources are viewed as virtual, meaning that if a system or solution needs more resources, such as processors or disk space, the resources can simply be added on demand and usually transparently to the application that uses them. Through their virtual nature, cloud-based solutions can be scaled up or down in size, and the 22 companies whose solutions reside in the clouds normally pay only for the resources they consume. Thus, companies that once relied on expensive data centers to house their processing resources can now shift their costs and maintenance efforts to pay-as-you-go, scalable, cloud-based alternatives. FIGURE 1-1 For years developers and network administrators have represented the Internet as a cloud. CASE 1-1 THE APPLE ICLOUD Whether one is a PC user or a Mac evangelist, one must recognize Apple’s ability to introduce technology that changes industries and the way people work and communicate. Apple’s first entrée into the cloud was the iTunes virtual music store. Today iTunes offers millions of songs for download to PCs and Macs, as well as iPods, iPhones, iPads, and other handheld devices. More than just music on a web-based storage device, iTunes laid a foundation for scalable e-commerce, high-bandwidth download transactions, and user device independence. Apple’s iCloud extends the company’s existing functionality by providing users with a cloud-based storage facility for their phones, music, videos, books, and other documents. Using iCloud as a centralized virtual storage facility, users can quickly exchange digital content among their various devices. In fact, users can customize the iCloud settings to make the file exchange seamless and automatic. In other words, if a user stores a digital file within iCloud, behind the scenes iCloud software will push the content to each of the user’s registered devices, as shown in FIGURE 1-2. 23 FIGURE 1-2 Using iCloud, users can synchronize their content to a variety of devices. Exercise What industries might iCloud disrupt? What business services do you anticipate Apple to offer in order to drive revenue through the iCloud? Web Resources For more information on iCloud, see Web 2.0 and the Cloud For years, when companies wanted to place content on the web, they hired web developers, who created the underlying HTML documents. Through this process, the number of documents on the web exploded to billions worldwide. Web 2.0 is a term used to describe the ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

use this copy, I had missed something on the reference section



Institutional Affiliation



In computing, virtualization occurs when one runs virtual assistance in an abstracted layer
from hardware in a computer system. It occurs when one runs multiple operating systems on
their computer at the same time. Applications running on the virtualized computer appear to be
in another machine, while in the real sense; they are on the same computer (Jamsa, 2013). In this
case, the operating system and libraries are visible to the guest's virtualized system. The
programs on the virtualized operating system are not connected to the host operating system. I
recently used Citrix XenDesktop, which is one of the various virtualization platforms one can
use in their computer systems.
Citrix XenDesktop is a virtualization platform developed by Citrix Systems. In managing
the hardware to present guest operating systems with virtual hardware, the Citrix XenDesktop
virtualization platform provides information technology control to VDI desktops. When using
VDI (virtual desktop infrastructure), an end-user connects to the remote desktop from the virtual
machines which run on a server in the cloud (Erl, Puttini & Mahmood, 2014). The user can view
and connect with the machines using a remote display protocol. Notably, the Citrix XenDesktop
platform is compatible with machines that use Microsoft Windows and Linux operating systems.
It is also capable of running on different hypervisors as well as offerings of public cloud
infrastructure. Also, the platform has taken advantage of the advancement of graphics technology
and has the ability to access dedicated processing units. The workloads also use GPU-accelerated
graphics (Erl, Puttini & Mahmood, 2014). Citrix has worked on ensuring that adv...

Juniper (17694)
Purdue University

I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

The tutor was pretty knowledgeable, efficient and polite. Great service!

I did not know how to approach this question, Studypool helped me a lot.

Similar Questions
Related Tags