` what is virtualization? “virtualization is a proven software technology that is rapidly...
Post on 23-Jan-2016
223 views
TRANSCRIPT
`
• What is Virtualization?
• “Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute.”
• Making it possible to run multiple operating systems and multiple applications on the same computer at the same time, increasing the utilization and flexibility of hardware
.
•“Discover what virtualization can do for you”
أل Abstraction of computer resources.
hiding of technical detail, through Encapsulation, Abstraction and Object Orientation
The common theme:
أل Making multiple physical resourcesappear as a single logical resource.
Making a single physical resource appear أل to function as multiple logical resources (ex. OS , Application ,Storage Device)
Hiding the physical characteristics of computing resources from the way in أل a which other systems, applications, or end users interact with those resources.
- Platform virtualization
- Resource virtualization
•Platform virtualization involves the simulation of computer environments.
•Resource virtualization involves the simulation of combined, fragmented, or simplified resources.
1999-2001 1999-2001
2003-20052003-2005
2006 + ...2006 + ...
AutomationAggregationAvailability Optimization
CentralManagement
Enterprise-Class Virtualization
System Partitioning
CentralManagement
Enterprise-Class Virtualization
System Partitioning
System Partitioning
1st GenerationSingle System
Hypervisor-basedStack
1st GenerationSingle System
Hypervisor-basedStack
3rd Gen…Infrastructure-wide
Virtualization
3rd Gen…Infrastructure-wide
Virtualization
2nd GenerationVirtual Infrastructure2nd Generation
Virtual Infrastructure
First generation virtualization provided server partitioning
through a hypervisor or hosted architecture;
•second-generation virtualization added management, capacity planning, and other tools for consolidating production servers.
dynamically aggregate heterogeneous systems into pools of resources that are
centrally managed, continuously optimized and highly available to any
application or operating system.
4-way Server
6GB Memory
Run up to 32 Virtual
Machines !
Allocate up to 12 GB Virtual
Machine Memory !
Physical Virtualized
All physical resources are shared by virtual machines resulting in a resource multiplier effect
2 HBAs (paired)
2 NICs (paired)
Create and allocate up to 32 Virtual Disks !
Create and allocate up to 16 Virtual NICs !
Physical Virtualized
• What is it?
– Dynamic balancing of computing resources across resource pools
– Intelligent resource allocation based on pre-defined rules
• Customer Impact
– Align IT resources with business priorities
– Operational simplicity; dramatically increase system administrator productivity
– Add hardware dynamically to avoid over-provisioning to peak load
– Automate hardware maintenance
Dynamic and intelligent allocation of hardware resources to ensure optimal alignment between business and IT
Resource Pool
Business Demand
Distributed Resource Scheduler
• Provisioning is “fire and forget”
• Easily add more capacity
• Avoid over-provisioning to peak load
Add hardware dynamically
Resource PoolCPU 36GHz, Mem 58GB
Priority HIGH
Resource PoolCPU 50 GHz, Mem 70GB
Priority HIGH
Initially:CPU 36 GHz, Mem 58 GBPriority HIGH
أل Virtualization lets you transform hardware into software.
أل just like a “real” computer..
أل NO Interfering…..
The VMware approach to virtualization inserts a thin layer of software أل directly on the computer hardware or on a host operating system.
”Hypervisor“ أل
“ .Virtualizing a single physical computer is just the beginning“ أل
VMware offers a robust virtualization platform that can scale across hundreds of أل x interconnected physical computers and storage devices to form an entire virtual infrastructure.
The VMware Approach to Virtualization
`
• Virtualization is a technology that can benefit anyone who uses a computer. Millions of people and thousands of organizations around the world—including all of the Fortune 100—use VMware virtualization solutions to
-reduce IT costs-increasing the efficiency, utilization and flexibility of their existing computer hardware.
• Server Consolidation and Infrastructure Optimization: Virtualization makes it possible to achieve significantly higher resource utilization by pooling common infrastructure resources and breaking the legacy “one application to one server” model.
• Physical Infrastructure Cost Reduction: With virtualization, you can reduce the number of servers and related IT hardware in the data center. This leads to reductions in real estate, power and cooling requirements, resulting in significantly lower IT costs.
• Improved Operational Flexibility & Responsiveness: Virtualization offers a new way of managing IT infrastructure and can help IT administrators spend less time on repetitive tasks such as provisioning, configuration, monitoring and maintenance.
• Increased Application Availability & Improved Business Continuity: Eliminate planned downtime and recover quickly from unplanned outages with the ability to securely backup and migrate entire virtual environments with no interruption in service.
• Improved Desktop Manageability & Security: Deploy, manage and monitor secure desktop environments that end users can access locally or remotely, with or without a network connection, on almost any standard desktop, laptop or tablet PC.
Discover the Value of Virtualization إل
Top 5 Reasons to Adopt Virtualization Software أل
Server Consolidation and Containment – Eliminate server sprawl by deploying systems into virtual machines
Business Continuity – Reduce the cost and complexity of business continuity by encapsulating entire systems files that can be replicated and restored onto any target server
Infrastructure Provisioning – Reduce the time for provisioning new infrastructure to minutes with sophisticated automation capabilities.
Disaster Recovery– Migrate legacy operating systems and software applications to virtual machines running on new hardware for better reliability. A DR Plan recovers technology platforms and associated technology functions
Improved Networking and Virtual Experince: Networking virtually with VLan and Virtual Reality products or simulation Experience
`
• A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer.
• A virtual machine is composed entirely of software and contains no hardware components
• A virtual machine behaves exactly like a physical computer and contains it own
- virtual CPU
- RAM
- Hard disk
- Network interface card (NIC).
• An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. Even the virtual machine thinks it is a “”
أل Virtual machines are completely independent from their underlying physical hardware. For example, you can configure a virtual machine with virtual components
(eg, CPU, network card, SCSI controller)
أل Virtual machines on the same physical server can even run different kinds of operating systems (Windows, Linux, etc).
أل When coupled with the properties of encapsulation and compatibility, hardware independence gives you the freedom to move a virtual machine from one type of x86 computer to another without making any changes to the device drivers, operating system, or applications.
أل Hardware independence also means that you can run a heterogeneous mixture of operating systems and applications on a single physical computer.
Before Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same
machine often creates conflict Underutilized resources Inflexible and costly infrastructure
After Virtualization: Break dependencies between OS
and hardware Manage OS and application as single
unit by encapsulating them into VMs Strong fault and security isolation VM’s are hardware-independent:
they can be provisioned anywhere
Windows Server 2003 Standard, Enterprise, Web Editions, and Small Business Server
Windows 2000 Server and Advanced Server
Windows NT : 4.0 Server
Windows XP Professional
Red Hat Linux 7.2, 7.3, 8.0, & 9.0
Red Hat Enterprise Linux 2.1 & 3
Solaris 10 (on x86)
SUSE Linux 8.2, 9.0 and 9.1
SUSE Linux Enterprise Server 8
Novell NetWare 5.1, 6.0 and 6.5
FreeBSD 4.9
NEW
• Rigorously tested to run 28 versions of all major operating systems
• Experimental 64-bit operating system support
Freedom to choose the most appropriate OS for any application
`
• What is a Virtual Infrastructure?أل While a virtual machine represents the hardware resources of an entire computer, a virtual infrastructure
represents the interconnected hardware resources of an entire IT infrastructure—including :
- computers,- network devices - shared storage resources.
أل Virtual machines are a fundamental building block
أل Helps in improving: availability, security and manageability of mission-critical applications.
By decoupling the entire software environment from its underlying hardware ألinfrastructure,virtualization enables the Aggregation of
- Multiple servers - Storage infrastructure networks into shared pools of resources that can be delivered dynamically securely and
reliably to applications as needed.
• Solutions are designed to function independently of the hardware and operating system to provide customers with a broad platform choice.
60-80% utilization rates for x86 servers (up from 5-15% in non-virtualized PCs)
Cost savings of more than $3,000 annually for every workload virtualized
Ability to provision new applications in minutes instead of days or weeks
85% improvement in recovery time from unplanned downtime
VMware customers who have adopted virtual infrastructure solutions
have reported dramatic results, including:
333 servers replaced per yearappr. 10,000 man/hrs saved
From 20-40 hrs to build a server and re-load application…
1. Build and configure hardware
2. Load operating system
3. Load configuration tools (Backup, Resource Kit, Monitoring, etc…)
4. Assign 2 IP addresses
5. Build 3 network connections, copper or fiber
6. Turn over to applications team to re-load and re-configure software
7. Test applications
8. Coordinate outage / data migration
…To 15-30 min to copy a virtual machine and restart
1. Redirect virtual disk to new VMware virtual machine instance[Tools already loaded][Application already loaded, configured]
2. Done
Before After
Then Now Future
*JPOR: “Just a Pool of Resources”
JPOR*
• 16 GB RAM• Up to 4 virtual
CPUs• Support for
powerful physical servers with up to 32 logical CPU and 64 GB RAM
Run the most resource intensive enterprise applications such as databases, CRM and ERP applications in virtual machines
….
VirtualBox.lnk
MCA III Roll NO 25
PanjabUniversity
Sourceshttp://www.vmware.com
http://www.vmblog.com
`
IT Under PressureManagement requirements for improved IT efficiency
Costly but underutilized
hardware resources
Backlog of new IT projects demanded
by business managers
Difficulty of capacity planning for future projects
Budget constraints
Remedies are not so easy!
Inflexible, CostlyInsecure
Infrastructure
Inflexible, CostlyInsecure
Infrastructure
Slow Development& Deployment
Cycles
UncontrollableServer Growth
Fire drills
Contemporary Datacenter Infrastructure,
Utilization and Needs Increasing use of x86 servers
• 91% of all enterprise servers bought in 2004 (Gartner Dataquest)
But those servers are not utilized efficiently
• Typical x86-based server utilization: 5-15%
• Best practice for x86 servers of one application per server
• Repurposing servers is difficult and costly
And the need for servers continues to grow
• Need to duplicate datacenter for disaster recovery
• Need additional servers to support test and development of new applications
• Need servers for staging
Solving the Problem
Server Consolidation.
Server Containment.
Server consolidation– Reduce number of servers in datacenter
to reduce costs
Server containment– Create virtual machines instead of
provisioning new hardware
– Reduces future hardware needs
Server Consolidation and Containment
Virtual infrastructure provides a managed approach to regain control over x86-based server sprawl
Comparing the Options
Implement Virtual infrastructure• Optimizes utilization, availability,
manageability• Delivers maximum ROI from hardware
APP Server
Web Server
Physical consolidation
• e.g. racks, blades
• Saves space, but does not improve utilization
Application consolidation
• Risk of application conflicts, resource contention
Reduced TCOEnhanced
ManageabilityIncreased Flexibility and Responsiveness
• Lower hardware costs through higher utilization
• Lower administrative costs
• Lower overhead costs for datacenter
• SLA management capabilities
• Better management of capacity planning
• Centralized management of virtual machines
• Instant provisioning using Virtual Center
• Easy to repurpose physical servers
• Online workload management
Benefits of Solving Server Sprawl with Virtual Infrastructure
Server Consolidation with VMware Means Customers Can Take This…
300 Servers
…and Replace It With This
300 Servers without VMware software
8 Servers, 1 rack with VMware software !!
64-core CMP
Server Consolidationwww server
database server #1
database server #2
middleware server #1
middleware server #1
data
data
Optimize Performance
64-core CMP
Server Consolidationwww server
database server #1
database server #2
middleware server #1
middleware server #1
Isolate Performance
64-core CMP
Server Consolidationwww server
database server #1
database server #2
middleware server #1
middleware server #1
Dynamic Partitioning
64-core CMP
Server Consolidationwww server
database server #1
database server #2
middleware server #1
middleware server #1
data
Inter-VM Sharing
VMWare’s Content-based Page Sharing Up to 60% reduced memory
Consolidation Improves Hardware Utilization
Before VMware After VMware
Virtualization enables consolidation of workloads from underutilized servers onto a single server
to safely achieve higher utilization
Benefit: Improved Capacity Planning Process
• Monitor and tune utilization
– Centralized virtual machine management
– Monitoring & performance management
– Automated provisioning and migration
• Forecast future capacity needs
– Use Virtual Center to optimize utilization
– Deliver zero-downtime maintenance
– Continuous workload consolidation
– Procure additional hardware based on long-range capacity forecasts, not in reaction to immediate project needs
– Transform IT from reactive to proactive
With the release of faster and more reliable hardware solutions, many organisations are looking towards consolidating their applications on single or clusters of servers.
Microsoft has designed VIRTUAL SERVER 2005
Virtual Server 2005• Windows service with a web interface
• Designed for remote administration
• Fully documented COM API for scripting and ISVs
• Virtualizes everything you find in a x86 system
• Provides virtual disks (VHD), virtual networking and virtual video
Containment through Virtual Infrastructure
– Backward containment• Combats sprawl due to maintaining existing projects• Enable support for older applications on new hardware via virtualization• Retire legacy hardware from the data center
– Forward containment• Manage server growth for future projects• Allows incremental virtualization of workloads• Provision new projects with virtual machines instead of provisioning
hardware
`
Business Continuity & Disaster Recovery
• What is Business Continuity and Disaster Recovery Planning?– The process of creating plans, processes and procedures to
resume or re-establish mission critical business functions within an acceptable time frame
– A DR Plan recovers technology platforms and associated technology functions (i.e., networks, etc.)
– Business Continuity plans focus on recovery of business functions and workgroup functions (i.e., Payroll Department, Call Center, etc.)
Business Continuity & Disaster Recovery
• Okay, why?– Disaster Recovery evolved from Data Center functions
– Used to be focused only on centralized processors and platforms
– Strictly a “technical” solution
– Over time, it was realized that recovery of the platforms did not mean recovery of the business
– Business Continuity addresses those “non-technical” functions that are required to restore business
Business Continuity & Disaster Recovery
• Fine, but what differentiates “technical” from “non-technical”?– “Technical” typically are computer platforms or systems (i.e., mainframes,
servers, midrange, routers, gateways, network comms, etc.) found within Data Centers or IT areas
– “Non-technical” are functions and processes that support critical business operations that are external to the above (i.e., HR, Payroll, Legal, Call Center, etc.)
WHAT ABOUT
CONSOLIDATION
?
YES, WE HAVE CONSOLIDATED OUR
BUSSINESS VERY WELL.!
Business Continuity & Disaster Recovery
• Who is responsible for each plan?– Since a Disaster Recovery plan is a technology process, then IT personnel
should create and maintain the plan
– A Business Continuity plan is a business recovery that should be driven by business needs and decisions, therefore created by business personnel
Risk Analysis
Business Impact
Analysis
RecoveryStrategy
Business Continuity
Plan
Impl. Business Continuity
Plan
Impl. IT Recovery
Plan
Current Recoverability
Analysis
Analyse
Implement
Design
Business Continuity Cycle
OPTIONS FOR DISASTER RECOVERY
COMPARISON OF RECOVERY STEPS
VIRTUAL MACHINE BACKUP OPTION
DISASTER RECOVERY CUSTOMER SCENARIO
Result : 16.5 minutes to failure!
Questions?
ROLL NO 39
VNCvirtual network computing
What is VNC?Virtual Network Computing
• “VNC allows a person at a remote computer to assume control of another computer across a network, as if they were sitting in front of the other computer.”
What make it diff. No state is stored at viewer. Vnc is small and simple. Vnc is Platform independent. Vnc is sharable. Vnc has free version.
What can I use VNC for?
• Example 1: “Remote system administration, where VNC is used to allow administrators to take control of employee machines to diagnose and fix problems, or to access and administer server machines without making a trip to the console.”
What can I use VNC for?• Example 2: “VNC can also be used in
educational contexts, for example to allow a distributed group of students simultaneously to view a computer screen being manipulated by an instructor, or to allow the instructor to take control of the students' computers to provide assistance.”
How do I install VNC• Installing the Server (Windows)
– Download and install like a normal windows program.
– “VNC Server Free Edition for Windows is installed as an optional component of the setup package. If VNC Server has been installed then a number of icons will be created for it under the Start Menu, at the location specified during installation (usually RealVNC).”
How do I use VNC?Windows
– Start/Programs/RealVNC/VNC Viewer/Run VNC Viewer
How do I use VNC?• Windows
– Enter server or server:port
Vnc for mobile
InstallationEnter ip address.Enter the password.
Key benefit• Multi os support.
• Remote access.
• Ability to access any computer remotely.
• Program management.
VPNvirtual private network
What is VPN?Virtual Private Network is a type of
private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.
Became popular as more employees worked in remote locations.
Traditional Connectivity
Virtual Private Networks (VPN)Basic Architecture
Private Networks vs.
Virtual Private NetworksEmployees can access the network (Intranet) from
remote locations.
Secured networks.
The Internet is used as the backbone for VPNs
Saves cost tremendously from reduction of equipment and maintenance costs.
Scalability
Remote Access Virtual Private Network
Brief Overview of How it Works
Two connections – one is made to the Internet and the second is made to the VPN.
Datagrams – contains data, destination and source information.
Firewalls – VPNs allow authorized users to pass through the firewalls.
Protocols – protocols create the VPN tunnels.
Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
Data Encapsulation [From Comer]
Two types of end points: Remote Access Site-to-Site
Four Critical FunctionsAuthentication – validates that the data was
sent from the sender.Access control – limiting unauthorized users
from accessing the network.Confidentiality – preventing the data to be
read or copied as the data is being transported.
Data Integrity – ensuring that the data has not been altered
EncryptionEncryption -- is a method of “scrambling”
data before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
Eliminating the need for expensive long-distance leased lines
Reducing the long-distance telephone charges for remote access.
Transferring the support burden to the service providers
Operational costs
Advantages: Cost Savings
Flexibility of growth
Efficiency with broadband technology
Advantages: Scalability
VPNs require an in-depth understanding of public network security issues and proper deployment of precautions
Availability and performance depends on factors largely outside of their control
Immature standards
VPNs need to accommodate protocols other than IP and existing internal network technology
Disadvantages
Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information
within the medical facilities & health care provider
Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely
Retail: able to securely transfer sales data or customer info between stores & the headquarters
Banking/Financial: enables account information to be transferred safely within departments & branches
General Business: communication between remote employees can be securely exchanged
VLANvirtual LAN
What is vlan• Vlan is a group of host.
• Vlan is a broadcast domain.
• Logical grouping not dependent on physical location.
• Switches are core component of vlans.
Switches and routers each play an important role in VLAN design.
Switches are the core device that controls individual VLANs while routers provide inter VLAN communication
The Role of the Router in VLANS• Policy-based control• Broadcast management• Route processing & distribution• Provide the communication
between VLANs.• Provide VLAN access to shared
resources, such as servers & hosts.
VLAN PROTOCOL
IEEE 802.1Q
Preamble (pre)
alternating pattern of 1 & o that tell receiving station a frame is coming and that provides a means to synchronize the frame-reception portions of receiving physical layers with the incoming bit stream.
Start of frame delimiter (sfd)
alternating pattern of ones and zeros, ending with two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination address.
Destination address (DA)
The DA field identifies which station (s) should receive the frame
Source address (SA) The SA field identifies the sending station.
TPID TPID defined value of 8100 in hex. When a frame has the EtherType equal to 8100, this frame
carries the tag IEEE 802.1Q / 802.1P.
7 1 6 6 2 2 2 42-1496 4 bytePreamble SFD DA SA TPI
DTCI Type
LengthDATA CRC
TCI Tag Control Information field including user priority, Canonical format indicator and VLAN ID.
USER priority 3-bit binary number representing 8 priority levels 0-7. CFI Canonical form indicator. VID VLAN identifier. Uniquely identifies the VLAN to which the frame belongs. Length/Type Indicate either the MAC client data bites or the frame type ID if frame is assembled using optional
format DATA Sequence of n byte for any value. Frame check sequence contains a 32 byte CRC
3 4 8bit
User priority CFI VID
VID
VLAN membership• Static vlans
• Dynamic vlans
VLAN Implementation Benefits
Improved Administration Efficiency Virtual Groups Reduction of Routing for Broadcast
Containment Enhanced Network Security
Creating workgroups
Access users within the same department team for short term projects
security users may work on sensitive information
which should not be seen by other users
traffic When there are a lot of broadcast traffic
between them
`
MCA III Roll NO 30Panjab university
What is Virtual Reality?Virtual reality is a medium composed of interactive computer simulations that sense the participant’s position and actions and replace or augment the
feedback to one or more senses, giving the feeling of being mentally
immersed or present in the simulation (a virtual world)
Virtual Reality Experience
the user is effectively immersed in a responsive virtual world
user dynamic control of viewpoint
Control becomes an important element of VR systems
Differentiates VR from books and movies (or watching moves in HMD)
Key Elements of Virtual Reality Experience
• Virtual World - content of a given medium
– screen play, script, etc.
– actors performing the play allows us to experience the virtual world
– sensation of being in an environment
Mental immersion – suspension of disbelief
Physical immersion – bodily entering the medium
Related to presence – (mentally immersed) the participant’s sensation of being in the virtual environment (Slater)
IMMERSION
Sensory Feedback• – information about the virtual world is
presented to the participant’s senses
– Visual (most common)
– Audio
– Haptic & Tactile
Walking Experiment
Haptic Interface for Surgery Training
VEST: Virtual Endoscopic Surgery Training
Simulation Scene
Haptic instrument interface box
INTERACTIVITY
– the virtual world responds to the user’s actions.
Computer makes this possible Real-time
Think virtual do real
VR Technological requirements
Real-time 3D rendering hardware and high-quality stereo sound
Specific input and output devices simulating and stimulating human sense
Software to simulate virtual environments that, combined with the hardware, allows the immediate response to the user actions
Types of Virtual Reality
• Augmented Reality (Mixed Reality)
• Telepresence
• Classical Simulation Environments
Augmented Reality
• A combination of a real scene viewed by a user and a virtual scene generated by a computer that augments the scene with additional information.
Telepresence
– The use of various technologies to produce the effect of placing the user in another location.
Classical Simulation
• Classical simulation is a mix of real objects and computer generated stimuli.
VR DEVICES
VR Tracking Manipulation and control devices:
Keeps track of real world items (hand or head)
Position Tracking:
Keeps track of objects in the real world that interact with the user
CAVE Cave Automatic Virtual Environment
Provides the illusion of immersion by projecting stereo images on the walls and floor of a room-sized cube.
A head tracking system continuously adjust the stereo projection to the current position of the leading viewer.
Control Devices
– Control virtual objects in 3 dimensions.
HMD
Head-Mounted Display
A Helmet or a face mask providing the visual and auditory displays.
Use LCD or CRT to display stereo images
May include built-in head-tracker and stereo headphones
BOOM Binocular Omni-Orientation Monitor
Head-coupled stereoscopic display device. Uses CRT to provide high-resolution display. Convenient to use. Fast and accurate built-in tracking.
AMD
Arm Mounted Display
Like a HMD but mounted on an articulated arm
Mostly use CRT technology Simplifies tracking of user
VRD
Virtual Retinal Displays
Scans images directly onto the retina
Still in the research stage Offers potential for high resolution and good field of view
Head Tracking
We can see new views of virtual worlds as we turn our heads.
When moves the head, the scene changes accordingly, just as in real life
Three-dimensional depth perception is created by “stereoscopy,” where slightly different views of the same image appear to each eye.
VR Glove
By wearing this Glove we can see our hand in the virtual world, enabling
them to pick up and manipulate objects Provide a new, natural way to
interact and communicate with the computer
SHUTTER GLASSESShutter glasses allow displaying stereo computer images usingthe existing monitor
The display alternates rapidly between the left and right eye images.
Each eye only saw the image intended for it by opening a shutter in front of the eye when its image is being displayed.
Shutter glasses typically use electronic shutters made with liquid crystals.
The shutters would have to be synchronized to the display.
VIRTUAL REALITY: WHY?
VR enables to discover the world through a sense and motion
learning process, more natural for human beings than the symbolic reconstructive way (i.e.. writing).
If you can see things and experiment with objects youcan learn in an easier and more entity
Applications Of VR
Entertainment – More vivid– More exciting– More attractive
Medicine
Practice performing surgery. Perform surgery on a remote patient. Teach new skills in a safe, controlled
environment.
Manufacturing
– Easy to modify– Low cost– High efficient
Education & Training
– Driving simulators.– Flight simulators.– Ship simulators.– Tank simulators.
VIRTUAL REALITY: TRAINING
VR is already being used in to teach people how to use expensive equipment, or when the cost of a mistake in Reality is very high.
• aircraft simulators to train pilots
• military flight simulators
• medicine (virtual surgery)
• virtual therapy (phobias)
VIRTUAL REALITY: PROTOTYPES
Reduce the need for physical prototype.
Improve product ergonomics and functionality.
Provide manufacturing with early access to product details.
Collaborative design.
Increase understanding of complex 3D assemblies starting from CAD systems
Provide an effective way to present product configuration and aesthetics.
VR VISUALISATION
SPATIAL VISUALISATION:
VR provides intuitive ways for exploring 3D environments.
It Can solve problems such as factory construction or reorganization:
• overall efficiency
• machine accessibility
• health and safety
• services etc.
SCIENTIFIC VISUALISATION
The greatest impact of virtual reality will have on science i.e. how it will change our way of thinking.
Virtual reality encourages viewers to be participants immersed inthe data rather than passive observers watching from a distance.
By thinking of some scientific problems as environments for the first time now insight gained.
`
MCA III Roll NO 15