Module 05 - Virtualized Data Center - Networking Flashcards

1
Q

Process of logically segmenting or grouping physical network(s) and making them operate as single or multiple independent network(s) called “Virtual Network(s)”.

A

Network Virtualization

(5.4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resides INSIDE a physical server.Consists of logical switches called virtual switches.Provides connectivity among VMs inside a physical server.Provides connectivity to Hypervisor kernel.Connects to physical network via PNIC.

A

Virtual Machine (VM) Network

(5.6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What elements are required to supprt Network Virtualization

A

1) Physical switch’s Operating System, 2)Hypervisor Virtual Network features
(5. 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benefits of Network Virtualization

A

1) Enhances security, 2)Enhances performance, 3)Improves manageability, 4)Improves utilization and reduces CAPEX
(5. 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual components that connect VMs to the VM network and storage systems.

A

1) Virtual NIC, 2)Virtual Host Bus Aadapter (HBA), 3)Virtual Switch
(5. 11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical components that connect VMs to the VM network and storage systems.

A

1) NIC, 2)HBA, 3)Converged Network Adapter (CAN), 4)Switches & Routers
(5. 11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What generates the MAC addresses and allocates a MAC address to a virtual NIC at the time of VM creation?

A

Hypervisor

(5.15)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enables a VM to access FC RDM disk / LUN assigned to the VM. Configured using N_Port ID Virtualization (NPIV) technology.Enables zoning and LUN masking at the VM level.

A

Virtual HBA

(5.16)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: In the absence of virtual HBA, VMs share the WWN identity of a physical HBA or CNA to access RDM disks. There is no option to uniquely secure and manage storage for an individual VM.

A

True

(5.16)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: A virtual switch cannot connect to multiple physical NICs, supporting load balancing and failover.

A

False

(5.18)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: A virtual switch has no control over inbound traffic. Load balancing and failover of inbound traffic is performed by supported physical switches that are connected to the virtual switch via physical NICs.

A

True

(5.18)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a virtual switch do if it has no connection to a physical NIC?

A

If the virtual switch has no connection to a physical NIC, it directs VM traffic WITHIN the physical server.

(5.19)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There is no direct ______________ between virtual switches within a compute system.

A

Connection

(5.20)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of Virtual Switch Ports

A

1) Hypervisor kernel ports, 2) VM ports, 3 Uplink ports
(5. 21)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mechanism for applying uniform network policy settings to a group of VM ports

A

VM Port Group

(5.21)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Aggregation of multiple virtual switches distributed across multiple physical servers

A

Distributed Virtual Switch

(5.22)

17
Q

Transfers hypervisor storage I/Os (SCSI I/Os) to iSCSI storage systems.Has built-in iSCSI initiator.Encapsulates SCSI I/O into iSCSI frames and then encapsulates iSCSI frames into Ethernet frames.Uses its own MAC and IP addresses for transmission of Ethernet frames over the Ethernet network.Offloads iSCSI processing (SCSI to iSCSI) from hypervisor.

A

iSCSI HBA

(5.24)

18
Q

Hypervisor recognizes it as an FC HBA and as a NIC.NIC: Used as a link between virtual and physical switches.FC HBA: Provides hypervisor access to the FC storage.

A

Converged Network Adapter (CNA)

(5.24)

19
Q

True or False: The hypervisor kernel has a built-in software iSCSI initiator.

A

True.This software initiator is used to perform iSCSI processing when hypervisor accesses the iSCSI storage via physical NICs

(5.24)

20
Q

The most common technique for configuring VLAN participation in a VDC environment.

A

Port-based VLAN

(5.27)

21
Q

Can a VM or storage system be a member of multiple VLANs?

A

Yes. Requires support of respective OS

(5.28)

22
Q

A technology that allows traffic from multiple VLANs to traverse a single network connection.

A

VLAN Trunking

(5.29)

23
Q

Process of inserting or removing a marker (tag) with VLAN-specific information (VLAN ID) into the Ethernet frame.

A

VLAN Tagging

(5.31)

24
Q

A logical fabric on an FC SAN that enables communication among a group of nodes, regardless of their physical location in the fabric.

A

Virtual Storage Area Network (VSAN)

(5.33)

25
Q

True or False: A VSAN has its own fabric services (name server, zoning), configuration, and set of FC addresses.

A

True

(5.33)

26
Q

How are converged VLANs and VSANs related?

A

Fiber Channel over Ethernet (FCoE) converges VLAN and VSAN. FCoE requires a VLAN for each VSAN.

(5.34)

27
Q

Three Requirements for Network Traffic Management

A

1) Load Balancing, 2)Policy-based Management, 3)Resource sharing without contention
(5. 36)

28
Q

An external device(switch/router) is used to distribute incoming traffic to a set of servers. External device uses a single virtual IP address.

A

Hardware Based Load Balancing

(5.38)

29
Q

Three types of load balancing policies:

A

1) Round Robin, 2)Weighted Round Robin, 3)Least Connections
(5. 38)

30
Q

Load balancing technique implemented in software running on a physical or virtual machine.

A

Software Based Load Balancing.

(5.39)

31
Q

Examples of Software Based Load Balancing

A

1) DNS Round Robin, 2)Microsoft Network Load Balancing (works in a server cluster)
(5. 39)

32
Q

__________ occurs when a switch port blocks traffic if threshold is reached and drops the subsequent frames over the next time interval.

A

Storm Control

(5.40)

33
Q

___________ logically groups physical NICs connected to a virtual switch.

A

NIC Teaming

(5.41)

34
Q

Sets limit on maximum bandwidth per traffic type (traffic type will not exceed limit). Specified in Mbps. Applies to a NIC team.

A

Limit

(5.42)

35
Q

Specifies relative priority for allocating bandwidth to different traffic types. Is specified as numbers. Applies to a physical NIC.

A

Share

(5.42)

36
Q

Controls network bandwidth at virtual / distributed virtual switch or port group. Prevents impact on business-critical application traffic by non-critical traffic flow.

A

Traffic Shaping

(5.43)

37
Q

Technique allowing a physical server to use multiple physical paths for transferring data between the physical server and a LUN on a storage system.

A

Multipathing

(5.44)

38
Q

Cisco’s third-party distributed virtual switch for VMware ESX/ESXi.Separates VDC and compute administration.

A

Cisco Nexus 1000V

(5.46)

39
Q

EMC multipathing solution for VMware ESX/ESXi and Microsoft Hyper-V. Delivers advanced multipathing compared to hypervisor’s native multipathing.

A

EMC PowerPath/VE

(5.47)