Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
` • What is Virtualization? • “Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute.” • Making it possible to run multiple operating systems and multiple applications on the same computer at the same time, increasing the utilization and flexibility of hardware . •“Discover what virtualization can do for you” ﻸ ﻸ a Abstraction of computer resources. Hiding the physical characteristics of computing resources from the way in which other systems, applications, or end users interact with those resources. ﻸ Making a single physical resource appear to function as multiple logical resources (ex. OS , Application ,Storage Device) ﻸ Making multiple physical resources appear as a single logical resource. The common theme: hiding of technical detail, through Encapsulation, Abstraction and Object Orientation divided into two main parts - Platform virtualization •Platform virtualization involves the simulation of computer environments. - Resource virtualization •Resource virtualization involves the simulation of combined, fragmented, or simplified resources. 3rd Gen… First generation virtualization dynamically heterogeneous providedaggregate server partitioning systems intoapools of resources that are through hypervisor or hosted centrally managed, continuously optimized architecture; and highly available to any application or operating system. •second-generation virtualization Infrastructure-wide added management, capacity Virtualization planning, and other tools for consolidating production servers. 2006 + ... 2nd Generation 1st Generation Single System Hypervisor-based Stack 1999-2001 System Partitioning Virtual Infrastructure 2003-2005 Automation Aggregation Availability Optimization Central Management Central Management Enterprise-Class Virtualization Enterprise-Class Virtualization System Partitioning System Partitioning All physical resources are shared by virtual machines resulting in a resource multiplier effect Physical Virtualized 4-way Server Physical Virtualized 2 HBAs (paired) Run up to 32 Virtual Machines ! Create and allocate up to 32 Virtual Disks ! 2 NICs (paired) 6GB Memory Allocate up to 12 GB Virtual Machine Memory ! Create and allocate up to 16 Virtual NICs ! Dynamic and intelligent allocation of hardware resources to ensure optimal alignment between business and IT Distributed Resource Scheduler • – Dynamic balancing of computing resources across resource pools – Intelligent resource allocation based on pre-defined rules Business Demand • Resource Pool What is it? Customer Impact – Align IT resources with business priorities – Operational simplicity; dramatically increase system administrator productivity – Add hardware dynamically to avoid over-provisioning to peak load – Automate hardware maintenance Add hardware dynamically • Provisioning is “fire and forget” Initially: CPU 36 GHz, Mem 58 GB Priority HIGH • Easily add more capacity Resource Resource PoolPool CPU 50Mem GHz,58GB Mem 70GB CPU 36GHz, Priority Priority HIGH HIGH • Avoid overprovisioning to peak load ﻸ Virtualization lets you transform hardware into software. ﻸ just like a “ ﻸ NO Interfering….. real” computer.. The VMware Approach to Virtualization ﻸ The VMware approach to virtualization inserts a thin layer of software directly on the computer hardware or on a host operating system. ﻸ “Hypervisor” ﻸ “Virtualizing a single physical computer is just the beginning. “ ﻸ x VMware offers a robust virtualization platform that can scale across hundreds of interconnected physical computers and storage devices to form an entire virtual infrastructure. ` ﻺDiscover the Value of Virtualization • Virtualization is a technology that can benefit anyone who uses a computer. Millions of people and thousands of organizations around the world—including all of the Fortune 100—use VMware virtualization solutions to -reduce IT costs -increasing the efficiency, utilization and flexibility of their existing computer hardware. ﻸTop 5 Reasons to Adopt Virtualization Software • • • • • Server Consolidation and Infrastructure Optimization: Virtualization makes it possible to achieve significantly higher resource utilization by pooling common infrastructure resources and breaking the legacy “one application to one server” model. Physical Infrastructure Cost Reduction: With virtualization, you can reduce the number of servers and related IT hardware in the data center. This leads to reductions in real estate, power and cooling requirements, resulting in significantly lower IT costs. Improved Operational Flexibility & Responsiveness: Virtualization offers a new way of managing IT infrastructure and can help IT administrators spend less time on repetitive tasks such as provisioning, configuration, monitoring and maintenance. Increased Application Availability & Improved Business Continuity: Eliminate planned downtime and recover quickly from unplanned outages with the ability to securely backup and migrate entire virtual environments with no interruption in service. Improved Desktop Manageability & Security: Deploy, manage and monitor secure desktop environments that end users can access locally or remotely, with or without a network connection, on almost any standard desktop, laptop or tablet PC. Infrastructure Provisioning – Reduce the time for provisioning new infrastructure to minutes with sophisticated automation capabilities. Server Consolidation and Containment – Eliminate server sprawl by deploying systems into virtual machines Business Continuity – Reduce the cost and complexity of business continuity by encapsulating entire systems files that can be replicated and restored onto any target server Disaster Recovery– Migrate legacy operating systems and software applications to virtual machines running on new hardware for better reliability. A DR Plan recovers technology platforms and associated technology functions Improved Networking and Virtual Experince: Networking virtually with VLan and Virtual Reality products or simulation Experience ` • A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. • A virtual machine is composed entirely of software and contains no hardware components • A virtual machine behaves exactly like a physical computer and contains it own - virtual CPU - RAM - Hard disk - Network interface card (NIC). • An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. Even the virtual machine thinks it is a rea ompter ﻸ Virtual machines are completely independent from their underlying physical hardware. For example, you can configure a virtual machine with virtual components (eg, CPU, network card, SCSI controller) ﻸ Virtual machines on the same physical server can even run different kinds of operating systems (Windows, Linux, etc). ﻸ When coupled with the properties of encapsulation and compatibility, hardware independence gives you the freedom to move a virtual machine from one type of x86 computer to another without making any changes to the device drivers, operating system, or applications. ﻸ Hardware independence also means that you can run a heterogeneous mixture of operating systems and applications on a single physical computer. Before Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same machine often creates conflict Underutilized resources Inflexible and costly infrastructure After Virtualization: Break dependencies between OS and hardware Manage OS and application as single unit by encapsulating them into VMs Strong fault and security isolation VM’s are hardware-independent: they can be provisioned anywhere Freedom to choose the most appropriate OS for any application Windows Server 2003 Standard, Enterprise, Web Editions, and Small Business Server Windows 2000 Server and Advanced Server Windows NT : 4.0 Server • Rigorously tested to run 28 versions of all major operating systems Windows XP Professional Red Hat Linux 7.2, 7.3, 8.0, & 9.0 Red Hat Enterprise Linux 2.1 & 3 Solaris 10 (on x86) SUSE Linux 8.2, 9.0 and 9.1 SUSE Linux Enterprise Server 8 Novell NetWare 5.1, 6.0 and 6.5 FreeBSD 4.9 NE W • Experimental 64-bit operating system support ` • What is a Virtual Infrastructure? ﻸ While a virtual machine represents the hardware resources of an entire computer, a virtual infrastructure represents the interconnected hardware resources of an entire IT infrastructure—including : - computers, - network devices - shared storage resources. ﻸ ﻸ Virtual machines are a fundamental building block Helps in improving: availability, security and manageability of mission-critical applications. ﻸ By decoupling the entire software environment from its underlying hardware infrastructure,virtualization enables the Aggregation of - Multiple servers - Storage infrastructure networks into shared pools of resources that can be delivered dynamically securely and reliably to applications as needed. • Solutions are designed to function independently of the hardware and operating system to provide customers with a broad platform choice. VMware customers who have adopted virtual infrastructure solutions have reported dramatic results, including: 60-80% utilization rates for x86 servers (up from 5-15% in non-virtualized PCs) Cost savings of more than $3,000 annually for every workload virtualized Ability to provision new applications in minutes instead of days or weeks 85% improvement in recovery time from unplanned downtime Before From 20-40 hrs to build a server and re-load application… 1. Build and configure hardware 2. Load operating system 3. Load configuration tools (Backup, Resource Kit, Monitoring, etc…) 4. Assign 2 IP addresses 5. Build 3 network connections, copper or fiber 6. Turn over to applications team to re-load and re-configure software 7. Test applications 8. Coordinate outage / data migration After …To 15-30 min to copy a virtual machine and restart 1. Redirect virtual disk to new VMware virtual machine instance [Tools already loaded] [Application already loaded, configured] 2. Done 333 servers replaced per year appr. 10,000 man/hrs saved JPOR* Then Now *JPOR: “Just a Pool of Resources” Future Run the most resource intensive enterprise applications such as databases, CRM and ERP applications in virtual machines • 16 GB RAM • Up to 4 virtual CPUs • Support for powerful physical servers with up to 32 logical CPU and 64 GB RAM DEMONSTRATION …. Panjab MCA III Roll NO 25 University [email protected]. in Sources http://www.vmware.com http://www.vmblog.com ` IT Under Pressure Management requirements for improved IT efficiency Costly but underutilized hardware resources Difficulty of capacity planning for future projects Backlog of new IT projects demanded by business managers Budget constraints Remedies are not so easy! Slow Development & Deployment Cycles Uncontrollable Server Growth Fire drills Inflexible, Costly Insecure Infrastructure Contemporary Datacenter Infrastructure, Utilization and Needs Increasing use of x86 servers • 91% of all enterprise servers bought in 2004 (Gartner Dataquest) But those servers are not utilized efficiently • Typical x86-based server utilization: 5-15% • Best practice for x86 servers of one application per server • Repurposing servers is difficult and costly And the need for servers continues to grow • Need to duplicate datacenter for disaster recovery • Need additional servers to support test and development of new applications • Need servers for staging Solving the Problem Server Consolidation. Server Containment. Server Consolidation and Containment Virtual infrastructure provides a managed approach to regain control over x86-based server sprawl Server consolidation – Reduce number of servers in datacenter to reduce costs Server containment – Create virtual machines instead of provisioning new hardware – Reduces future hardware needs Comparing the Options Physical consolidation • e.g. racks, blades • Saves space, but does not improve utilization Application consolidation • Risk of application conflicts, resource contention Implement Virtual infrastructure • Optimizes utilization, availability, manageability • Delivers maximum ROI from hardware Web Server APP Server Benefits of Solving Server Sprawl with Virtual Infrastructure Reduced TCO • Lower hardware costs through higher utilization • Lower administrative costs • Lower overhead costs for datacenter Enhanced Manageability • SLA management capabilities • Better management of capacity planning • Centralized management of virtual machines Increased Flexibility and Responsiveness • Instant provisioning using Virtual Center • Easy to repurpose physical servers • Online workload management Server Consolidation with VMware Means Customers Can Take This… 300 Servers …and Replace It With This 300 Servers without VMware software 8 Servers, 1 rack with VMware software !! Server Consolidation www server 64-core CMP database server #2 data database server #1 data middleware server #1 Optimize Performance middleware server #1 Server Consolidation www server 64-core CMP database server #2 database server #1 middleware server #1 middleware server #1 Isolate Performance Server Consolidation www server 64-core CMP database server #2 database server #1 middleware server #1 middleware server #1 Dynamic Partitioning Server Consolidation www server 64-core CMP database server #2 data database server #1 middleware server #1 VMWare’s Content-based Page Sharing Up to 60% reduced memory middleware server #1 Inter-VM Sharing Consolidation Improves Hardware Utilization Before VMware After VMware Virtualization enables consolidation of workloads from underutilized servers onto a single server to safely achieve higher utilization Benefit: Improved Capacity Planning Process • Monitor and tune utilization – Centralized virtual machine management – Monitoring & performance management – Automated provisioning and migration • Forecast future capacity needs – Use Virtual Center to optimize utilization – Deliver zero-downtime maintenance – Continuous workload consolidation – Procure additional hardware based on long-range capacity forecasts, not in reaction to immediate project needs – Transform IT from reactive to proactive With the release of faster and more reliable hardware solutions, many organisations are looking towards consolidating their applications on single or clusters of servers. Microsoft has designed VIRTUAL SERVER 2005 Virtual Server 2005 • • Windows service with a web interface Designed for remote administration • Fully documented COM API for scripting and ISVs Virtualizes everything you find in a x86 system Provides virtual disks (VHD), virtual networking and virtual video • • Containment through Virtual Infrastructure – Backward containment • Combats sprawl due to maintaining existing projects • Enable support for older applications on new hardware via virtualization • Retire legacy hardware from the data center – Forward containment • Manage server growth for future projects • Allows incremental virtualization of workloads • Provision new projects with virtual machines instead of provisioning hardware ` Business Continuity & Disaster Recovery • What is Business Continuity and Disaster Recovery Planning? – The process of creating plans, processes and procedures to resume or re-establish mission critical business functions within an acceptable time frame – A DR Plan recovers technology platforms and associated technology functions (i.e., networks, etc.) – Business Continuity plans focus on recovery of business functions and workgroup functions (i.e., Payroll Department, Call Center, etc.) Business Continuity & Disaster Recovery • Okay, why? – – – – Disaster Recovery evolved from Data Center functions Used to be focused only on centralized processors and platforms Strictly a “technical” solution Over time, it was realized that recovery of the platforms did not mean recovery of the business – Business Continuity addresses those “non-technical” functions that are required to restore business Business Continuity & Disaster Recovery YES, WE HAVE CONSOLIDATED OUR BUSSINESS VERY WELL.! • Fine, but what differentiates “technical” from “non-technical”? – “Technical” typically are computer platforms or systems (i.e., mainframes, servers, midrange, routers, gateways, network comms, etc.) found within Data Centers or IT areas – “Non-technical” are functions and processes that support critical business operations that are external to the above (i.e., HR, Payroll, Legal, Call Center, etc.) Business Continuity & Disaster Recovery • Who is responsible for each plan? – Since a Disaster Recovery plan is a technology process, then IT personnel should create and maintain the plan – A Business Continuity plan is a business recovery that should be driven by business needs and decisions, therefore created by business personnel Business Continuity Cycle A n a l y s e B u s i n e s s I m p a c t A n a l y s i s C u r r e n t R e c o v e r a b i l i t y A n a l y s i s R i s k A n a l y s i s R e c o v e r y S t r a t e g y D e s i g n I m p l . I T R e c o v e r y P l a n I m p l e m e n t I m p l . B u s i n e s s C o n t i n u i t y P l a n B u s i n e s s C o n t i n u i t y P l a n OPTIONS FOR DISASTER RECOVERY COMPARISON OF RECOVERY STEPS VIRTUAL MACHINE BACKUP OPTION DISASTER RECOVERY CUSTOMER SCENARIO Result : 16.5 minutes to failure! Questions? ROLL NO 39 VNC virtual network computing What is VNC? Virtual Network Computing • “VNC allows a person at a remote computer to assume control of another computer across a network, as if they were sitting in front of the other computer.” What make it diff. No state is stored at viewer. Vnc is small and simple. Vnc is Platform independent. Vnc is sharable. Vnc has free version. What can I use VNC for? • Example 1: “Remote system administration, where VNC is used to allow administrators to take control of employee machines to diagnose and fix problems, or to access and administer server machines without making a trip to the console.” What can I use VNC for? • Example 2: “VNC can also be used in educational contexts, for example to allow a distributed group of students simultaneously to view a computer screen being manipulated by an instructor, or to allow the instructor to take control of the students' computers to provide assistance.” How do I install VNC • Installing the Server (Windows) – Download and install like a normal windows program. – “VNC Server Free Edition for Windows is installed as an optional component of the setup package. If VNC Server has been installed then a number of icons will be created for it under the Start Menu, at the location specified during installation (usually RealVNC).” How do I use VNC? Windows – Start/Programs/RealVNC/VNC Viewer/Run VNC Viewer How do I use VNC? • Windows – Enter server or server:port Vnc for mobile Installation Enter ip address. Enter the password. Key benefit • • • • Multi os support. Remote access. Ability to access any computer remotely. Program management. VPN virtual private network What is VPN? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Traditional Connectivity Virtual Private Networks (VPN) Basic Architecture Private Networks vs. Virtual Private Networks Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs. Scalability Remote Access Virtual Private Network Brief Overview of How it Works Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Data Encapsulation [From Comer] Two types of end points: Remote Access Site-to-Site Four Critical Functions Authentication – validates that the data was sent from the sender. Access control – limiting unauthorized users from accessing the network. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – ensuring that the data has not been altered Encryption vEncryption -- is a method of “scrambling” data before transmitting it onto the Internet. vPublic Key Encryption Technique vDigital signature – for authentication Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above Advantages: Cost Savings Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Transferring the support burden to the service providers Operational costs Advantages: Scalability Flexibility of growth Efficiency with broadband technology Disadvantages VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged VLAN virtual LAN What is vlan • Vlan is a group of host. • Vlan is a broadcast domain. • Logical grouping not dependent on physical location. • Switches are core component of vlans. Switches and routers each play an important role in VLAN design. Switches are the core device that controls individual VLANs while routers provide inter VLAN communication The Role of the Router in VLANS • Policy-based control • Broadcast management • Route processing & distribution • Provide the communication between VLANs. • Provide VLAN access to shared resources, such as VLAN PROTOCOL IEEE 802.1Q 7 1 Preamble SFD 6 6 2 2 2 42-1496 4 byte DA TCI DATA CRC SA TPI D Type Length Preamble (pre) alternating pattern of 1 & o that tell receiving station a frame is coming and that provides a means to synchronize the frame-reception portions of receiving physical layers with the incoming bit stream. Start of frame delimiter (sfd) alternating pattern of ones and zeros, ending with two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination address. Destination address (DA) The DA field identifies which station (s) should receive the frame Source address (SA) The SA field identifies the sending station. TPID TPID defined value of 8100 in hex. When a frame has the EtherType equal to 8100, this frame carries the tag IEEE 802.1Q / 802.1P. TCI Tag Control Information field including user priority, Canonical format indicator and VLAN ID. 3 4 8bit User priority CFI VID VID USER priority 3-bit binary number representing 8 priority levels 0-7. CFI Canonical form indicator. VID VLAN identifier. Uniquely identifies the VLAN to which the frame belongs. Length/Type Indicate either the MAC client data bites or the frame type ID if frame is assembled using optional format DATA Sequence of n byte for any value. Frame check sequence contains a 32 byte CRC VLAN membership • Static vlans • Dynamic vlans VLAN Implementation Benefits Improved Administration Efficiency Virtual Groups Reduction of Routing for Broadcast Containment Enhanced Network Security Creating workgroups Access users within the same department team for short term projects security users may work on sensitive information which should not be seen by other users traffic When there are a lot of broadcast traffic between them ` MCA III Roll NO 30 Panjab university [email protected] What is Virtual Reality? Virtual reality is a medium composed of interactive computer simulations that sense the participant’s position and actions and replace or augment the feedback to one or more senses, giving the feeling of being mentally immersed or present in the simulation (a virtual world) Virtual Reality Experience the user is effectively immersed in a responsive virtual world user dynamic control of viewpoint Control becomes an important element of VR systems Differentiates VR from books and movies (or watching moves in HMD) Key Elements of Virtual Reality Experience • Virtual World - content of a given medium – screen play, script, etc. – actors performing the play allows us to experience the virtual world IMMERSION – sensation of being in an environment Mental immersion – suspension of disbelief Physical immersion – bodily entering the medium Related to presence – (mentally immersed) the participant’s sensation of being in the virtual environment (Slater) Sensory Feedback • – information about the virtual world is presented to the participant’s senses – Visual (most common) – Audio – Haptic & Tactile Walking Experiment Haptic Interface for Surgery Training Simulation Scene VEST: Virtual Endoscopic Surgery Training Haptic instrument interface box INTERACTIVITY – the virtual world responds to the user’s actions. Computer makes this possible Real-time Think virtual do real VR Technological requirements Real-time 3D rendering hardware and high-quality stereo sound Specific input and output devices simulating and stimulating human sense Software to simulate virtual environments that, combined with the hardware, allows the immediate response to the user actions Types of Virtual Reality • Augmented Reality (Mixed Reality) • Telepresence • Classical Simulation Environments Augmented Reality • A combination of a real scene viewed by a user and a virtual scene generated by a computer that augments the scene with additional information. Telepresence – The use of various technologies to produce the effect of placing the user in another location. Classical Simulation • Classical simulation is a mix of real objects and computer generated stimuli. VR DEVICES VR Tracking Manipulation and control devices: Keeps track of real world items (hand or head) Position Tracking: Keeps track of objects in the real world that interact with the user CAVE Cave Automatic Virtual Environment Provides the illusion of immersion by projecting stereo images on the walls and floor of a room-sized cube. A head tracking system continuously adjust the stereo projection to the current position of the leading viewer. Control Devices – Control virtual objects in 3 dimensions. HMD Head-Mounted Display A Helmet or a face mask providing the visual and auditory displays. Use LCD or CRT to display stereo images May include built-in head-tracker and stereo headphones BOOM Binocular Omni-Orientation Monitor Head-coupled stereoscopic display device. Uses CRT to provide high-resolution display. Convenient to use. Fast and accurate built-in tracking. AMD Arm Mounted Display Like a HMD but mounted on an articulated arm Mostly use CRT technology Simplifies tracking of user VRD Virtual Retinal Displays Scans images directly onto the retina Still in the research stage Offers potential for high resolution and good field of view Head Tracking We can see new views of virtual worlds as we turn our heads. When moves the head, the scene changes accordingly, just as in real life Three-dimensional depth perception is created by “stereoscopy,” where slightly different views of the same image appear to each eye. VR Glove By wearing this Glove we can see our hand in the virtual world, enabling them to pick up and manipulate objects Provide a new, natural way to interact and communicate with the computer SHUTTER GLASSES Shutter glasses allow displaying stereo computer images using the existing monitor The display alternates rapidly between the left and right eye images. Each eye only saw the image intended for it by opening a shutter in front of the eye when its image is being displayed. Shutter glasses typically use electronic shutters made with liquid crystals. The shutters would have to be synchronized to the display. VIRTUAL REALITY: WHY? VR enables to discover the world through a sense and motion learning process, more natural for human beings than the symbolic reconstructive way (i.e.. writing). If you can see things and experiment with objects you can learn in an easier and more entity Applications Of VR Entertainment – More vivid – More exciting – More attractive Medicine Practice performing surgery. Perform surgery on a remote patient. Teach new skills in a safe, controlled environment. Manufacturing – Easy to modify – Low cost – High efficient Education & Training – – – – Driving simulators. Flight simulators. Ship simulators. Tank simulators. VIRTUAL REALITY: TRAINING VR is already being used in to teach people how to use expensive equipment, or when the cost of a mistake in Reality is very high. • aircraft simulators to train pilots • military flight simulators • medicine (virtual surgery) • virtual therapy (phobias) VIRTUAL REALITY: PROTOTYPES Reduce the need for physical prototype. Improve product ergonomics and functionality. Provide manufacturing with early access to product details. Collaborative design. Increase understanding of complex 3D assemblies starting from CAD systems Provide an effective way to present product configuration and aesthetics. VR VISUALISATION SPATIAL VISUALISATION: VR provides intuitive ways for exploring 3D environments. It Can solve problems such as factory construction or reorganization: • overall efficiency • machine accessibility • health and safety • services etc. SCIENTIFIC VISUALISATION The greatest impact of virtual reality will have on science i.e. how it will change our way of thinking. Virtual reality encourages viewers to be participants immersed in the data rather than passive observers watching from a distance. By thinking of some scientific problems as environments for the first time now insight gained. ` MCA III Roll NO 15 [email protected]