Server Consolidation and Containment

Download Report

Transcript Server Consolidation and Containment

`
• What is Virtualization?
• “Virtualization is a proven software technology that is
rapidly transforming the IT landscape and fundamentally
changing the way that people compute.”
• Making it possible to run multiple operating systems and
multiple applications on the same computer at the same
time, increasing the utilization and flexibility of hardware
.
•“Discover what virtualization can do for you”
‫ﻸ‬
‫ﻸ‬
a
Abstraction of computer resources.
Hiding the physical characteristics of computing resources from the way in
which other systems, applications, or end users interact with those resources.
‫ﻸ‬
Making a single physical resource appear
to function as multiple logical resources
(ex. OS , Application ,Storage Device)
‫ﻸ‬
Making multiple physical resources
appear as a single logical resource.
The common theme:
hiding of technical detail, through
Encapsulation, Abstraction and Object Orientation
divided into
two main
parts
- Platform virtualization
•Platform virtualization involves the simulation of
computer environments.
- Resource virtualization
•Resource virtualization involves the simulation of
combined, fragmented, or simplified resources.
3rd Gen…
First generation virtualization
dynamically
heterogeneous
providedaggregate
server partitioning
systems
intoapools
of resources
that are
through
hypervisor
or hosted
centrally managed,
continuously optimized
architecture;
and highly available to any application or
operating system.
•second-generation virtualization
Infrastructure-wide
added management,
capacity
Virtualization
planning, and other tools for
consolidating production servers.
2006 + ...
2nd Generation
1st Generation
Single System
Hypervisor-based
Stack
1999-2001
System
Partitioning
Virtual Infrastructure
2003-2005
Automation
Aggregation
Availability
Optimization
Central
Management
Central
Management
Enterprise-Class
Virtualization
Enterprise-Class
Virtualization
System
Partitioning
System
Partitioning
All physical resources are shared by virtual machines resulting in
a resource multiplier effect
Physical
Virtualized
4-way Server
Physical
Virtualized
2 HBAs (paired)
Run up to
32 Virtual
Machines !
Create and
allocate up to
32 Virtual Disks !
2 NICs (paired)
6GB Memory
Allocate up to
12 GB Virtual
Machine Memory !
Create and
allocate up to
16 Virtual NICs !
Dynamic and intelligent allocation of hardware resources to
ensure optimal alignment between business and IT
Distributed Resource Scheduler
•
– Dynamic balancing of computing
resources across resource pools
– Intelligent resource allocation
based on pre-defined rules
Business Demand
•
Resource Pool
What is it?
Customer Impact
– Align IT resources with business
priorities
– Operational simplicity; dramatically
increase system administrator
productivity
– Add hardware dynamically to avoid
over-provisioning to peak load
– Automate hardware maintenance
Add hardware dynamically
• Provisioning is
“fire and forget”
Initially:
CPU 36 GHz, Mem 58 GB
Priority HIGH
• Easily add more
capacity
Resource
Resource
PoolPool
CPU 50Mem
GHz,58GB
Mem 70GB
CPU 36GHz,
Priority
Priority
HIGH HIGH
• Avoid overprovisioning to
peak load
‫ﻸ‬
Virtualization lets you transform hardware into software.
‫ﻸ‬
just like a “
‫ﻸ‬
NO Interfering…..
real” computer..
The VMware Approach to Virtualization
‫ﻸ‬
The VMware approach to virtualization inserts a thin layer of software
directly on the computer hardware or on a host operating system.
‫ﻸ‬
“Hypervisor”
‫ﻸ‬
“Virtualizing a single physical computer is just the beginning. “
‫ﻸ‬
x
VMware offers a robust virtualization platform that can scale across hundreds of
interconnected physical computers and storage devices to form an entire
virtual infrastructure.
`
‫ ﻺ‬Discover the Value of Virtualization
•
Virtualization is a technology that can benefit anyone who uses a computer. Millions of people and
thousands of organizations around the world—including all of the Fortune 100—use VMware
virtualization solutions to
-reduce IT costs
-increasing the efficiency, utilization and flexibility of their existing computer hardware.
‫ ﻸ‬Top 5 Reasons to Adopt Virtualization Software
•
•
•
•
•
Server Consolidation and Infrastructure Optimization: Virtualization makes it possible to
achieve significantly higher resource utilization by pooling common infrastructure resources and
breaking the legacy “one application to one server” model.
Physical Infrastructure Cost Reduction: With virtualization, you can reduce the number of
servers and related IT hardware in the data center. This leads to reductions in real estate, power
and cooling requirements, resulting in significantly lower IT costs.
Improved Operational Flexibility & Responsiveness: Virtualization offers a new way of
managing IT infrastructure and can help IT administrators spend less time on repetitive tasks such
as provisioning, configuration, monitoring and maintenance.
Increased Application Availability & Improved Business Continuity: Eliminate planned
downtime and recover quickly from unplanned outages with the ability to securely backup and
migrate entire virtual environments with no interruption in service.
Improved Desktop Manageability & Security: Deploy, manage and monitor secure desktop
environments that end users can access locally or remotely, with or without a network connection,
on almost any standard desktop, laptop or tablet PC.
Infrastructure Provisioning – Reduce the time for
provisioning new infrastructure to minutes with sophisticated
automation capabilities.
Server Consolidation and Containment – Eliminate server
sprawl by deploying systems into virtual machines
Business Continuity – Reduce the cost and complexity of
business continuity by encapsulating entire systems files that
can be replicated and restored onto any target server
Disaster Recovery– Migrate legacy operating systems and
software applications to virtual machines running on new
hardware for better reliability. A DR Plan recovers technology
platforms and associated technology functions
Improved Networking and Virtual Experince: Networking
virtually with VLan and Virtual Reality products or simulation
Experience
`
•
A virtual machine is a tightly isolated software container that can run its own operating
systems and applications as if it were a physical computer.
•
A virtual machine is composed entirely of software
and contains no hardware components
•
A virtual machine behaves exactly like a physical computer and contains it own
- virtual CPU
- RAM
- Hard disk
- Network interface card (NIC).
•
An operating system can’t tell the difference between a virtual machine and a physical
machine, nor can applications or other computers on a network. Even the virtual machine
thinks it is a rea ompter
‫ﻸ‬
Virtual machines are completely independent from their underlying physical
hardware.
For example, you can configure a virtual machine with virtual components
(eg, CPU, network card, SCSI controller)
‫ﻸ‬
Virtual machines on the same physical server can even run different kinds of
operating systems (Windows, Linux, etc).
‫ﻸ‬
When coupled with the properties of encapsulation and compatibility, hardware
independence gives you the freedom to move a virtual machine from one type of x86
computer to another without making any changes to the device drivers, operating
system, or applications.
‫ﻸ‬
Hardware independence also means that you can run a heterogeneous mixture of
operating systems and applications on a single physical computer.
Before Virtualization:
 Single OS image per machine
 Software and hardware tightly coupled
 Running multiple applications on
same machine often creates conflict
 Underutilized resources
 Inflexible and costly infrastructure
After Virtualization:
 Break dependencies between OS
and hardware
 Manage OS and application as single
unit by encapsulating them into VMs
 Strong fault and security isolation
 VM’s are hardware-independent:
they can be provisioned anywhere
Freedom to choose the most appropriate OS for any application
Windows Server 2003 Standard,
Enterprise, Web Editions, and Small
Business Server
Windows 2000 Server and Advanced
Server
Windows NT : 4.0 Server
• Rigorously tested to run
28 versions of all major
operating systems
Windows XP Professional
Red Hat Linux 7.2, 7.3, 8.0, & 9.0
Red Hat Enterprise Linux 2.1 & 3
Solaris 10 (on x86)
SUSE Linux 8.2, 9.0 and 9.1
SUSE Linux Enterprise Server 8
Novell NetWare 5.1, 6.0 and 6.5
FreeBSD 4.9
NE
W
• Experimental 64-bit
operating system
support
`
• What is a Virtual Infrastructure?
‫ﻸ‬
While a virtual machine represents the hardware resources of an entire computer, a virtual infrastructure
represents the interconnected hardware resources of an entire IT infrastructure—including :
- computers,
- network devices
- shared storage resources.
‫ﻸ‬
‫ﻸ‬
Virtual machines are a fundamental building block
Helps in improving:
availability, security and manageability of mission-critical applications.
‫ﻸ‬
By decoupling the entire software environment from its underlying hardware
infrastructure,virtualization enables the Aggregation of
- Multiple servers
- Storage infrastructure networks
into shared pools of resources that can be delivered dynamically securely and
reliably to applications as needed.
•
Solutions are designed to function independently of the hardware and operating
system to provide customers with a broad platform choice.
VMware customers who have adopted virtual infrastructure solutions
have reported dramatic results, including:
60-80% utilization rates for x86 servers (up from 5-15% in non-virtualized PCs)
Cost savings of more than $3,000 annually for every workload virtualized
Ability to provision new applications in minutes instead of days or weeks
85% improvement in recovery time from unplanned downtime
Before
From 20-40 hrs to build a server
and re-load application…
1. Build and configure hardware
2. Load operating system
3. Load configuration tools
(Backup, Resource Kit,
Monitoring, etc…)
4. Assign 2 IP addresses
5. Build 3 network connections,
copper or fiber
6. Turn over to applications team
to re-load and re-configure
software
7. Test applications
8. Coordinate outage / data
migration
After
…To 15-30 min to copy a virtual
machine and restart
1. Redirect virtual disk to new
VMware virtual machine
instance
[Tools already loaded]
[Application already loaded,
configured]
2. Done
333 servers replaced
per year
appr. 10,000 man/hrs
saved
JPOR*
Then
Now
*JPOR: “Just a Pool of Resources”
Future
Run the most resource intensive enterprise applications such as
databases, CRM and ERP applications in virtual machines
• 16 GB RAM
• Up to 4 virtual
CPUs
• Support for
powerful physical
servers with up to
32 logical CPU and
64 GB RAM
DEMONSTRATION ….
Panjab
MCA III
Roll NO 25
University
[email protected].
in
Sources
http://www.vmware.com
http://www.vmblog.com
`
IT Under Pressure
Management requirements
for improved IT efficiency
Costly but
underutilized
hardware resources
Difficulty of
capacity planning
for future projects
Backlog of new IT
projects demanded
by business
managers
Budget
constraints
Remedies are not so easy!
Slow
Development
& Deployment
Cycles
Uncontrollable
Server Growth
Fire drills
Inflexible, Costly
Insecure
Infrastructure
Contemporary Datacenter Infrastructure,
Utilization and Needs
Increasing use of x86 servers
• 91% of all enterprise servers bought in 2004 (Gartner Dataquest)
But those servers are not utilized efficiently
• Typical x86-based server utilization: 5-15%
• Best practice for x86 servers of one application
per server
• Repurposing servers is difficult and costly
And the need for servers continues to grow
• Need to duplicate datacenter for disaster recovery
• Need additional servers to support test and
development of new applications
• Need servers for staging
Solving the Problem
Server Consolidation.
Server Containment.
Server Consolidation and Containment
Virtual infrastructure provides a managed approach to
regain control over x86-based server sprawl
Server consolidation
– Reduce number of servers in datacenter
to reduce costs
Server containment
– Create virtual machines instead of
provisioning new hardware
– Reduces future hardware needs
Comparing the Options
Physical consolidation
• e.g. racks, blades
• Saves space, but does not improve
utilization
Application consolidation
• Risk of application conflicts,
resource contention
Implement Virtual infrastructure
• Optimizes utilization, availability,
manageability
• Delivers maximum ROI from hardware
Web
Server
APP
Server
Benefits of Solving Server Sprawl
with Virtual Infrastructure
Reduced TCO
• Lower hardware
costs through higher
utilization
• Lower administrative
costs
• Lower overhead
costs for datacenter
Enhanced
Manageability
• SLA management
capabilities
• Better management
of capacity planning
• Centralized
management of
virtual machines
Increased Flexibility
and Responsiveness
• Instant provisioning
using Virtual Center
• Easy to repurpose
physical servers
• Online workload
management
Server Consolidation with VMware Means Customers Can Take This…
300
Servers
…and Replace It With This
300 Servers without
VMware software
8 Servers, 1 rack with
VMware software !!
Server Consolidation
www server
64-core CMP
database server #2
data
database server #1
data
middleware server #1
Optimize Performance
middleware server #1
Server Consolidation
www server
64-core CMP
database server #2
database server #1
middleware server #1
middleware server #1
Isolate Performance
Server Consolidation
www server
64-core CMP
database server #2
database server #1
middleware server #1
middleware server #1
Dynamic Partitioning
Server Consolidation
www server
64-core CMP
database server #2
data
database server #1
middleware server #1
VMWare’s Content-based Page Sharing
 Up to 60% reduced memory
middleware server #1
Inter-VM Sharing
Consolidation Improves Hardware Utilization
Before VMware
After VMware
Virtualization enables consolidation of workloads from
underutilized servers onto a single server
to safely achieve higher utilization
Benefit: Improved Capacity Planning Process
• Monitor and tune utilization
– Centralized virtual machine management
– Monitoring & performance management
– Automated provisioning and migration
• Forecast future capacity needs
– Use Virtual Center to optimize utilization
– Deliver zero-downtime maintenance
– Continuous workload consolidation
– Procure additional hardware based on
long-range capacity forecasts, not in
reaction to immediate project needs
– Transform IT from reactive to proactive
With the release of faster and more reliable hardware
solutions, many organisations are looking towards
consolidating their applications on single or clusters of
servers.
Microsoft has designed VIRTUAL SERVER 2005
Virtual Server 2005
•
•
Windows service with a web interface
Designed for remote administration
•
Fully documented COM API
for scripting and ISVs
Virtualizes everything you find
in a x86 system
Provides virtual disks (VHD),
virtual networking and virtual
video
•
•
Containment through Virtual Infrastructure
– Backward containment
• Combats sprawl due to maintaining existing projects
• Enable support for older applications on new hardware via
virtualization
• Retire legacy hardware from the data center
– Forward containment
• Manage server growth for future projects
• Allows incremental virtualization of workloads
• Provision new projects with virtual machines instead of provisioning
hardware
`
Business Continuity & Disaster Recovery
• What is Business Continuity and Disaster Recovery
Planning?
– The process of creating plans, processes and procedures to
resume or re-establish mission critical business functions
within an acceptable time frame
– A DR Plan recovers technology platforms and associated
technology functions (i.e., networks, etc.)
– Business Continuity plans focus on recovery of business
functions and workgroup functions (i.e., Payroll Department,
Call Center, etc.)
Business Continuity & Disaster Recovery
• Okay, why?
–
–
–
–
Disaster Recovery evolved from Data Center functions
Used to be focused only on centralized processors and platforms
Strictly a “technical” solution
Over time, it was realized that recovery of the platforms did not
mean recovery of the business
– Business Continuity addresses those “non-technical” functions
that are required to restore business
Business Continuity & Disaster Recovery
YES, WE HAVE
CONSOLIDATED OUR
BUSSINESS VERY WELL.!
• Fine, but what differentiates “technical” from “non-technical”?
– “Technical” typically are computer platforms or systems (i.e., mainframes,
servers, midrange, routers, gateways, network comms, etc.) found within
Data Centers or IT areas
– “Non-technical” are functions and processes that support critical business
operations that are external to the above (i.e., HR, Payroll, Legal, Call
Center, etc.)
Business Continuity & Disaster Recovery
• Who is responsible for each plan?
– Since a Disaster Recovery plan is a technology process, then IT
personnel should create and maintain the plan
– A Business Continuity plan is a business recovery that should be driven by
business needs and decisions, therefore created by business personnel
Business Continuity Cycle
A
n
a
l
y
s
e
B
u
s
i
n
e
s
s
I
m
p
a
c
t
A
n
a
l
y
s
i
s
C
u
r
r
e
n
t
R
e
c
o
v
e
r
a
b
i
l
i
t
y
A
n
a
l
y
s
i
s
R
i
s
k
A
n
a
l
y
s
i
s
R
e
c
o
v
e
r
y
S
t
r
a
t
e
g
y
D
e
s
i
g
n
I
m
p
l
.
I
T
R
e
c
o
v
e
r
y
P
l
a
n
I
m
p
l
e
m
e
n
t
I
m
p
l
.
B
u
s
i
n
e
s
s
C
o
n
t
i
n
u
i
t
y
P
l
a
n
B
u
s
i
n
e
s
s
C
o
n
t
i
n
u
i
t
y
P
l
a
n
OPTIONS FOR DISASTER RECOVERY
COMPARISON OF RECOVERY STEPS
VIRTUAL MACHINE BACKUP OPTION
DISASTER RECOVERY CUSTOMER SCENARIO
Result : 16.5 minutes to failure!
Questions?
ROLL NO 39
VNC
virtual network computing
What is VNC?
Virtual Network Computing
• “VNC allows a person at a remote
computer to assume control of another
computer across a network, as if they
were sitting in front of the other computer.”
What make it diff.
 No state is stored at viewer.
 Vnc is small and simple.
 Vnc is Platform independent.
 Vnc is sharable.
 Vnc has free version.
What can I use VNC for?
• Example 1: “Remote system
administration, where VNC is used to
allow administrators to take control of
employee machines to diagnose and fix
problems, or to access and administer
server machines without making a trip to
the console.”
What can I use VNC for?
• Example 2: “VNC can also be used in
educational contexts, for example to allow
a distributed group of students
simultaneously to view a computer screen
being manipulated by an instructor, or to
allow the instructor to take control of the
students' computers to provide
assistance.”
How do I install VNC
• Installing the Server (Windows)
– Download and install like a normal windows program.
– “VNC Server Free Edition for Windows is installed
as an optional component of the setup package. If
VNC Server has been installed then a number of
icons will be created for it under the Start Menu, at the
location specified during installation (usually
RealVNC).”
How do I use VNC?
Windows
– Start/Programs/RealVNC/VNC Viewer/Run VNC
Viewer
How do I use VNC?
• Windows
– Enter server or server:port
Vnc for mobile
Installation
Enter ip address.
Enter the password.
Key benefit
•
•
•
•
Multi os support.
Remote access.
Ability to access any computer remotely.
Program management.
VPN
virtual private network
What is VPN?
Virtual Private Network is a type of
private network that uses public
telecommunication, such as the
Internet, instead of leased lines to
communicate.
Became popular as more employees
worked in remote locations.
Traditional Connectivity
Virtual Private Networks (VPN)
Basic Architecture
Private Networks
vs.
Virtual Private Networks
Employees can access the network (Intranet)
from remote locations.
Secured networks.
The Internet is used as the backbone for VPNs
Saves cost tremendously from reduction of
equipment and maintenance costs.
Scalability
Remote Access Virtual Private
Network
Brief Overview of How it Works
Two connections – one is made to the
Internet and the second is made to the
VPN.
Datagrams – contains data, destination
and source information.
Firewalls – VPNs allow authorized users to
pass through the firewalls.
Protocols – protocols create the VPN
tunnels.
Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Original Datagram
Encrypted Inner Datagram
Datagram Header
Outer Datagram Data Area
Data Encapsulation [From Comer]
Two types of end points:
 Remote Access
 Site-to-Site
Four Critical Functions
Authentication – validates that the data was
sent from the sender.
Access control – limiting unauthorized users
from accessing the network.
Confidentiality – preventing the data to be
read or copied as the data is being
transported.
Data Integrity – ensuring that the data has
not been altered
Encryption
vEncryption -- is a method of “scrambling”
data before transmitting it onto the
Internet.
vPublic Key Encryption Technique
vDigital signature – for authentication
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the
ones above
Advantages: Cost Savings
Eliminating the need for expensive long-distance
leased lines
Reducing the long-distance telephone charges
for remote access.
Transferring the support burden to the service
providers
Operational costs
Advantages: Scalability
Flexibility of growth
Efficiency with broadband technology
Disadvantages
VPNs require an in-depth understanding of
public network security issues and proper
deployment of precautions
Availability and performance depends on factors
largely outside of their control
Immature standards
VPNs need to accommodate protocols other
than IP and existing internal network technology
Industries That May Use a VPN
 Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider
 Manufacturing: allow suppliers to view inventory & allow
clients to purchase online safely
 Retail: able to securely transfer sales data or customer info
between stores & the headquarters
 Banking/Financial: enables account information to be
transferred safely within departments & branches
 General Business: communication between remote
employees can be securely exchanged
VLAN
virtual LAN
What is vlan
• Vlan is a group of host.
• Vlan is a broadcast domain.
• Logical grouping not dependent on
physical location.
• Switches are core component of vlans.
Switches and routers each
play an important role in
VLAN design.
Switches are the core
device that controls
individual VLANs while
routers provide inter VLAN
communication
The Role of the Router
in VLANS
• Policy-based control
• Broadcast management
• Route processing &
distribution
• Provide the communication
between VLANs.
• Provide VLAN access to
shared resources, such as
VLAN PROTOCOL
IEEE 802.1Q
7
1
Preamble SFD
6 6 2
2 2
42-1496
4 byte
DA
TCI
DATA
CRC
SA TPI
D
Type
Length
 Preamble (pre)
alternating pattern of 1 & o that tell receiving station a frame is coming and that provides a
means to synchronize the frame-reception portions of receiving physical layers with the incoming
bit stream.

Start of frame delimiter (sfd)
alternating pattern of ones and zeros, ending with two consecutive 1-bits
indicating that the next bit is the left-most bit in the left-most byte of the destination
address.
 Destination address (DA)
The DA field identifies which station (s) should receive the frame
 Source address (SA)
The SA field identifies the sending station.
 TPID
TPID defined value of 8100 in hex. When a frame has the EtherType equal to 8100, this
frame carries the tag IEEE 802.1Q / 802.1P.
 TCI
Tag Control Information field including user priority, Canonical format indicator and VLAN ID.
3
4
8bit
User priority
CFI
VID
VID
 USER priority
3-bit binary number representing 8 priority levels 0-7.
 CFI
Canonical form indicator.
 VID
VLAN identifier. Uniquely identifies the VLAN to which the frame belongs.
 Length/Type
Indicate either the MAC client data bites or the frame type ID if frame is assembled using optional
format
 DATA
Sequence of n byte for any value.
 Frame check sequence
contains a 32 byte CRC
VLAN membership
• Static vlans
• Dynamic vlans
VLAN Implementation
Benefits
 Improved Administration Efficiency
 Virtual Groups
 Reduction of Routing for
Broadcast Containment
 Enhanced Network Security
Creating workgroups
 Access
 users within the same department
 team for short term projects
 security
 users may work on sensitive information
which should not be seen by other users
 traffic
 When there are a lot of broadcast traffic
between them
`
MCA III
Roll NO 30
Panjab university
[email protected]
What is Virtual Reality?
Virtual reality is a medium composed of interactive computer simulations
that sense the participant’s position and actions and replace or augment the
feedback to one or more senses, giving the feeling of being mentally
immersed or present in the simulation (a virtual world)
Virtual Reality Experience
the user is effectively immersed in a responsive virtual world
user dynamic control of viewpoint
Control becomes an important element of VR systems
Differentiates VR from books and movies (or watching moves in HMD)
Key Elements of Virtual Reality
Experience
• Virtual World - content of a given medium
– screen play, script, etc.
– actors performing the play allows us to experience the virtual world
IMMERSION
– sensation of being in an environment
Mental immersion – suspension of disbelief
Physical immersion – bodily entering the
medium
Related to presence – (mentally immersed)
the participant’s sensation of being in the virtual
environment (Slater)
Sensory Feedback
• – information about the virtual world is
presented to the participant’s senses
– Visual (most common)
– Audio
– Haptic & Tactile
Walking Experiment
Haptic Interface
for Surgery Training
Simulation Scene
VEST: Virtual Endoscopic
Surgery Training
Haptic instrument
interface box
INTERACTIVITY
– the virtual world responds to the user’s
actions.
Computer makes this possible Real-time
Think virtual do real
VR Technological requirements
Real-time 3D rendering hardware and high-quality stereo sound
Specific input and output devices simulating and stimulating human sense
Software to simulate virtual environments that, combined with the hardware,
allows the immediate response to the user actions
Types of Virtual Reality
• Augmented Reality (Mixed Reality)
• Telepresence
• Classical Simulation Environments
Augmented Reality
•
A combination of a real scene viewed by a user and a virtual scene
generated by a computer that augments the scene with additional
information.
Telepresence
– The use of various technologies to produce the effect of placing the user
in another location.
Classical Simulation
•
Classical simulation is a mix of real objects and computer generated stimuli.
VR DEVICES
VR Tracking Manipulation and control devices:
Keeps track of real world items (hand or head)
Position Tracking:
Keeps track of objects in the real world that interact with the user
CAVE
 Cave Automatic Virtual Environment
 Provides the illusion of immersion by projecting stereo images on
the walls and floor of a room-sized cube.
 A head tracking system continuously adjust the stereo projection to
the current position of the leading viewer.
Control Devices
– Control virtual objects in 3 dimensions.
HMD
Head-Mounted Display
 A Helmet or a face mask providing the visual and auditory displays.
 Use LCD or CRT to display stereo images
 May include built-in head-tracker and stereo headphones
BOOM
 Binocular Omni-Orientation Monitor

Head-coupled stereoscopic display device.
 Uses CRT to provide high-resolution display.
 Convenient to use.
 Fast and accurate built-in tracking.
AMD
Arm Mounted Display
Like a HMD but mounted on an articulated arm
Mostly use CRT technology Simplifies tracking of
user
VRD
Virtual Retinal Displays
Scans images directly onto the retina
Still in the research stage Offers potential for high resolution and good field of view
Head Tracking
We can see new views of virtual worlds as we turn our heads.
When moves the head, the scene changes accordingly, just as in real
life
Three-dimensional depth perception is created by “stereoscopy,” where
slightly different views of the same image appear to each eye.
VR Glove
By wearing this Glove we can see our hand in the virtual world, enabling
them to pick up and manipulate objects Provide a new, natural way to
interact and communicate with the computer
SHUTTER GLASSES
Shutter glasses allow displaying stereo computer images using
the existing monitor
The display alternates rapidly between the left and right eye images.
Each eye only saw the image intended for it by opening a shutter in
front of the eye when its image is being displayed.
Shutter glasses typically use electronic shutters made with liquid
crystals.
The shutters would have to be synchronized to the display.
VIRTUAL REALITY: WHY?
VR enables to discover the world through a sense and
motion
learning process, more natural for human beings than the
symbolic reconstructive way (i.e.. writing).
If you can see things and experiment with objects you
can learn in an easier and more entity
Applications Of VR
 Entertainment
– More vivid
– More exciting
– More attractive
Medicine

Practice performing surgery.
 Perform surgery on a remote patient.
 Teach new skills in a safe, controlled
environment.
Manufacturing
– Easy to modify
– Low cost
– High efficient
Education & Training
–
–
–
–
Driving simulators.
Flight simulators.
Ship simulators.
Tank simulators.
VIRTUAL REALITY: TRAINING
VR is already being used in to teach people how to use
expensive equipment, or when the cost of a mistake in Reality is
very high.
• aircraft simulators to train pilots
• military flight simulators
• medicine (virtual surgery)
• virtual therapy (phobias)
VIRTUAL REALITY:
PROTOTYPES
Reduce the need for physical prototype.
Improve product ergonomics and functionality.
Provide manufacturing with early access to product details.
Collaborative design.
Increase understanding of complex 3D assemblies starting from
CAD systems
Provide an effective way to present product configuration and
aesthetics.
VR VISUALISATION
SPATIAL VISUALISATION:
VR provides intuitive ways for exploring 3D environments.
It Can solve problems such as factory construction or reorganization:
• overall efficiency
• machine accessibility
• health and safety
• services etc.
SCIENTIFIC VISUALISATION
The greatest impact of virtual reality will have on science i.e. how it
will change our way of thinking.
Virtual reality encourages viewers to be participants immersed in
the data rather than passive observers watching from a distance.
By thinking of some scientific problems as environments for the first
time now insight gained.
`
MCA III
Roll NO 15
[email protected]