Virtualization/Hyper-V Facts/Cloud Computing Facts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Internal virtual network

A virtual network used to allow communication between virtual machines on the same virtualization host and between virtual machines and the host operating system.

Private virtual network

A virtual network used to allow communication only between virtual machines on the same virtualization server

External virtual network

A virtual network used to provide virtual machines with access to a physical network, allowing them to communicate with externally located servers and clients.

Client Hyper-V requirements: Component: Windows

Requirement: Client Hyper-V requires a 64-bit version of Windows 10 Professional or Enterprise. To run virtual machines on a 32-bit Windows version, you must install a separate virtualization solution (e.g., VMware Player, VMware Workstation, Virtual PC, or VirtualBox).

Create Virtual Machines

To create virtual machines, run Hyper-V Manager and specify the following parameters: A name for the new VM The virtual machine's generation The amount of RAM the VM is allowed to use The shared network switch that you created earlier for the VM to use for networking The VHD file you want to use. You can create a new VHD file or use an existing one. You can use the .vhdx or .vhd format. The .vhd format is older, but is more compatible with other hypervisors. The optical drive you want to use. You can use either a physical optical drive or a virtual .iso file as the optical drive used by the VM. You can install an operating system directly from an ISO file instead of burning it to disk.

Enable Hyper-V

To enable Hyper-V, complete the following steps: 1. Open Settings. 2. Select Apps. 3. Under Related settings, select Programs and Features. 4. In the left pane, select Turn Windows features on or off. 5. Mark Hyper-V and select OK. The system will reboot several times as Hyper-V is enabled.

Configure Virtual Networking

To configure virtual networking: Choose the type of network you want to set up: External virtual network Internal virtual network Private virtual network Use the Virtual Switch Manager to select an NIC if you are configuring an external virtual network.

Connect to the Virtual Machine

You use the Virtual Machine Connection window to interact with a VM. To connect to a VM, run Hyper-V Manager, select the VM that you want to access, and connect to it. You can start, stop, pause, and take snapshots (also called checkpoints) of the virtual machine's current configuration using the Hyper-V manager window.

Virtual machine

A virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine appears to be a self-contained and autonomous system.

Cloud computing

A combination of software, data access, computation, and storage services provided to clients through the internet.

Community cloud

A community cloud is designed to be shared by several organizations. Access is granted only to the users within the organizations who are sharing the community cloud infrastructure. Community clouds can be hosted internally, with each organization sharing the cost of implementation and maintenance. Because of the expense and expertise required to do so, community clouds are commonly hosted externally by a third party

Virtual Hard Disk (VHD)

A file that is created within the host operating system and that simulates a hard disk for the virtual machine. Different hypervisors use different virtual hard disk file formats: Virtual Disk Image (VDI): Oracle VirtualBox Virtual Machine Disk (VMDK): VMware products Virtual Hard Disk (VHD): Microsoft Hyper-V

Hybrid cloud

A hybrid cloud is a combination of public, private, and community cloud resources from different service providers. The goal behind a hybrid cloud is to expand the functionality of a given cloud service by integrating it with other cloud services.

Hypervisor

A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as: CPU Storage RAM Commonly used hypervisor types include: VMware Workstation and ESX (made by VMware) Hyper-V (made by Microsoft) XEN (open source) Oracle VirtualBox Kernel-based Virtual Machine (KVM)

Private cloud

A private cloud provides resources to a single organization. Access is granted to only the users within the organization. Private clouds can be hosted internally, but because of the expense and expertise required to do so, they are typically hosted externally by a third party. An organization commonly enters into an agreement with a cloud service provider, which provides secure access to cloud-based resources. The organization's data is kept separate and secure from any other organization using the same service provider.

Client Hyper-V Virtual networking implementation: Virtual Network: Private

A private virtual network is used to allow communication only between virtual machines on the same virtualization server. A private virtual network is not bound to a physical network adapter. A private virtual network is isolated from all external network traffic on the virtualization server, as well as any network traffic between the management operating system and the external network. This type of virtual network is sometimes called a host-only network. This type of network implementation allows you to create a sandbox environment that is very useful for protecting your network while testing or troubleshooting a virtual host.

Public cloud

A public cloud can be accessed by anyone. Cloud-based computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider. The service provider may or may not require a fee for using these resources. For example, Google provides many publicly accessible cloud applications, such as Gmail and Google Docs.

Partial virtualization

A type of virtualization where only some of the components of the virtual machine are virtualized. Be aware of the following: The operating system uses some virtual components and some real physical hardware components in the actual device where the hypervisor is running. The operating system or application must be modified to run in a partial virtualization environment.

Paravirtualization

A type of virtualization where the hardware is not virtualized. Be aware of the following: All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device; components are not virtual. The guest operating systems run in isolated domains on the same physical hardware. The operating system or application must be modified before they can run in a para-virtualization environment.

Full virtualization

A type of virtualization where the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way.

Client Hyper-V Virtual networking implementation: Virtual Network: External

An external virtual network is used to provide virtual machines with access to a physical network, allowing them to communicate with externally located servers and clients. This configuration also allows virtual machines on the same virtualization server to communicate with each other. This type of virtual network is sometimes called a bridged network.

Client Hyper-V Virtual networking implementation: Virtual Network: Internal

An internal virtual network is used to allow communication between virtual machines on the same virtualization host and between virtual machines and the host operating system. An internal virtual network is not bound to a physical network adapter. As a result, virtual machines using this network are isolated from all external network traffic.

Cloud computing service providers reduce the risk of security breaches in multiple ways. They:

Authenticate all users who access the service and allow users to access only the applications and data that they need. Segregate each organization's centrally stored data. Verify, test, and apply updates to the infrastructure. Establish a formal process for all facets of the service, from user requests to major data breaches and catastrophic events. Implement security monitoring of things like usage and unusual behavior. Implement encryption up to the point of use, such as the client's web browser. Probe for security holes with a third-party service provider. Comply with all regulatory measures, like the Sarbanes-Oxley Act.

If necessary, virtual machines can be moved from one host to another. Follow these guidelines when moving virtual machines:

Before moving a virtual machine, make backup copies of the virtual machine directory and all associated files. If you are moving a virtual machine (guest) to a new virtual host that differs from the original host in platform or architecture, be aware of these options and limitations: A guest can be successfully moved from a 32-bit host to a 64-bit host. A guest that is moved from a 64-bit host to a 32-bit host will probably not work correctly. If the guest is a 64-bit virtual machine, it probably won't start up at all on the 32-bit host. If the original host and the new host both use similar architectures but are from different manufacturers, you usually cannot resume a suspended virtual machine; it must be rebooted. For example, if the original host and new host both have virtualization-enabled 64-bit processors, such as one using an AMD-V and the other using an Intel VT-x CPU, a suspended virtual machine will work after being moved and rebooted.

Hyper-V

Microsoft's enterprise hypervisor

The advantages of cloud computing are:

Flexibility of access Rapid elasticity or scalable provisioning. Rapid elasticity is the ability to provide scalable services. In other words, rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Measured service. Measured service are services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.

Infrastructure as a Service (IaaS)

IaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

Platform as a Service (PaaS)

PaaS delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.

The advantages of cloud computing are (con't):

Resource pooling. Resource pooling allows providers to serve multiple clients and customers with provisional and scalable services. These services can be adjusted to each client's needs without any changes being apparent to the client or end user. Through modern scalable systems involved in cloud computing and software as a service (SaaS), providers can create a sense of infinite or immediately available resources by controlling resource adjustments at a meta level. This allows customers to change their levels of service without being subject to any of the limitations of physical or virtual resources. On-demand computing (ODC). ODC or metering of services is defined as "pay and use" computing power. ODC allows resources to be provided on an as-needed and when-needed basis. Ease of use API availability Ability to "try out" software applications in some cloud computing service models

Software as a Service (SaaS)

SaaS delivers software applications to the client either over the internet or on a local area network. SaaS can be: A simple multi-tenancy implementation in which customers have their own resources that are segregated from other customers. A fine grain multi-tenancy implementation in which resources are shared, but data is segregated from other customers

Move a Virtual Machine

Server versions of Hyper-V provide many virtual machine migration tools that you can use to move a VM between hypervisor hosts. However, Client Hyper-V does not include most of these features. To move a virtual machine between client Hyper-V hosts, you must do the following: 1. Export the VM on the source system using Hyper-V Manager. 2. Copy the exported VM files from the source system to the destination system. 3. Import the VM on the destination system using Hyper-V Manager. As you do so, you must select one of the following import options: Register the VM in place using its existing unique ID. Restore the VM using its existing unique ID. Copy the VM and create a new unique ID.

Client Hyper-V requirements: Component: System

System requirements for Client Hyper-V include the following: A 64-bit CPU. A modern Intel or AMD microprocessor that includes Second Level Address Translation (SLAT) technology. Virtualization enabled in the BIOS/UEFI configuration. At least 4 GB of RAM in the system. However, much more RAM than this will be required if you choose to run multiple virtual machines.

Virtualization

The ability to install and run multiple operating systems concurrently on a single physical machine.

Physical machine

The actual system hardware, such as the hard disk drive(s), optical drive, RAM, processors, etc

Start the Virtual Machine

To start the virtual machine, power it on in Hyper-V Manager. If you created a new VHD file, then you must install an operating system. If you choose to install Windows, then you should install Integration Services (IS) after the installation is complete. IS dramatically improves VM performance by installing modified disk, network, and mouse drivers inside the VM that are Hyper-V aware. In addition, IS lets you cut and paste between the host and guest Windows operating systems installed within VMs. It also enables the mouse to move smoothly in and out of the Virtual Machine Connection window.


संबंधित स्टडी सेट्स

5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools.

View Set

The Nature and Conservation of Energy

View Set

The Enlightenment Assignment and Quiz

View Set

Medical Terminology Chapter 20 Vocabulary

View Set