Implementing Client Virtualization and Cloud Computing Flashcards
Definition of Virtualization
Virtualization: Software allowing a host computer to run multiple guest operating systems known as virtual machines.
What does a virtual platform require
Computer(s)
The hypervisor or Virtual Machine Monitor (VMM)
Guest operating systems or Virtual Machines (VMs)
Give the functions of hypervisors and a description of hypervisors
Each VM runs in a protected space
View from inside the VM is a CPU and memory
A hard disk is an image file
Components such as network adapters are emulated
Main functions of hypervisors
Emulation
Guest OS support
Assigning resources to each guest’s OS
Configuring networking
Configuring security
Definition of Type 2 hypervisor and examples
Type 2 hypervisor: A host-based hypervisor in which you install the host operating system first, then install the hypervisor.
Examples:
VMware Workstation
Oracle Virtual Box
Parallels Workstation
Definition of Type 1 hypervisor and examples
Type 1 hypervisor: A bare metal hypervisor that you install directly on the server’s hardware.
Examples:
VMware ESX Server
Microsoft Hyper-V
Citrix XEN Server
Linux KVM
Give all the points processor support and resource requirements
CPU with built-in instruction sets to facilitate virtualization
Intel: VT-x
AMD: AMD-v
SLAT to improve virtual memory performance
Intel: EPT
AMD: RVI
Multiple CPU resources
SMP
Multiple physical processors
Multi-core
HyperThreading
Each guest OS requires memory above that required by the host.
Each guest OS requires hard disk space for the VM image.
Most hypervisors allow guest VMs to use host adapters and peripherals.
Give a full description of virtual networks
Multiple VMs can communicate with each other using standard networking protocols.
Guest OS emulates standard network adapter hardware.
Can often have multiple adapters.
Configurable just like a physical adapter.
Hypervisor implements network connectivity via virtual switches.
Function like Ethernet switches.
Implemented in software.
Connectivity between virtual adapters and virtual switches configured in the hypervisor.
Can configure connectivity between host physical NIC and virtual switches.
Provides a bridge between the host platform and physical network switches.
Allows frames to pass between:
Physical and virtual machines.
Virtual machines and the host.
Give points to virtual machines
Client and Server OSs can be virtualized
Some hypervisors have limited support for certain OSs
Many purposes for deploying a virtual platform
Client-side virtualization
Deployed to desktop-type machines
Server-side virtualization
What is client-side virtualization
Client-side virtualization: Any solution designed to run on desktops or workstations in which the user interacts with the virtualization host directly.
Give examples of Virtual Machines
Virtual labs
Support legacy software applications
Development environment
Training
Definition of Server-side virtualization
Server-side virtualization: A solution in which one or more virtual servers are created on a physical server in which each virtual server acts like it was a separate computer.
Definition of server consolidation
Server consolidation: Using virtual servers, make more efficient use of system resources and hardware since most servers’ capacity is not fully utilized.
Give the advantages of virtual machines
Better hardware utilization:
Typical server hardware resource utilization of 10%.
Implies 8-9 additional server instances could obtain the same performance.
Definition of Rogue VM
Rogue VM: A virtual machine that has been installed without authorization.
Definition of VM sprawl
VM sprawl: The uncontrolled development of more and more virtual machines.
Give a full description of Guest OS Security
Each guest OS must be patched and protected against malware.
Running security software on each guest OS can cause performance issues.
Rogue VMs and VM sprawl are major security concerns.
System management software can detect rogue VMs.
VMs should conform to an application template.
Rogue developers often install backdoors and logic bombs.