The application virtualization technology used on the cloud is different from the well-known hardware Virtualization Technologies (such as VMware and Virtual PC) and operating system virtualization (such as kerberozzo, cloud-based application virtualization is more lightweight and more suitable for desktops and applications.ProgramSuch as virtualization, to bring a better desktop and software use experience in the PC field.
-
Implementation Principle
-
The following uses the hidden and activated functions of the cloud as an example to briefly describe the implementation principles of cloud application virtualization.
-
No cloud PC is used
-
System Environment: the system contains locally installed software A and other system processes.
-
When the system does not use the cloud, after installing software a locally using the common method, there is a registry entry set for software a in the registry system and a file set for software a in the file system. At the same time, the registry system and the file system also have the registry keys and file sets of other processes of the system.
A and other system processes can generally access the registry system and file system anywhere, regardless of whether the registry key and file set are their own or other processes. The results of all write operations are stored in the original physical location.
-
Cloud PC: Virtual software B, activated
-
System Environment: the system contains virtualized software B, locally installed software B, and other system processes.
-
After software B is virtualized on the cloud, software B is separated from the file written to the registry system by software B and stored in the registry cache and File Cache of software B, the cached data is stored in the unique cloud cache (cloudcache ).
When software B is activated on the cloud, the cloud projects the Registry cache of software B to the registry of the real system, without occupying the physical location space. The same applies to file systems, the File Cache is projected into a real file system, which does not occupy physical space.
In this case, software A and other processes installed in the system can see the registration items and file set of software B, and think it is true. They access and use each other's registry items and file sets as usual.
However, the write and read operations on the registry and file projection of software B are directly targeted at the cache, rather than the locations seen by software A and other processes.
-
PC on the cloud: Software B in the hidden state
-
System Environment: there are hidden software B in the system, locally installed software A and other system processes.
-
S when software B is hidden, the cloud will cancel the projection of the original registry and file of software B, and the process of software A and other systems will not be seen. The effect is equivalent to software B being detached from the system.