Module 4 / Unit 2 Virtualization, SAN, and Cloud Services Flashcards
On completion of this unit, you will be able to: □ Identify the technologies used to implement virtualization. □ Describe different types of virtual network components (NICs, switches, routers, and firewalls). □ Understand the use of Storage Area Networks (SAN) and the technologies underpinning them. □ Understand the use of virtualization and cloud computing to provision ondemand cloud / * as a Service infrastructure.
What is a hypervisor?
The software that hosts, configures, and manages multiple “guest” operating systems or Virtual Machines (VM). A hypervisor can be implemented as an OS itself (“bare metal”) or as an application running within the host OS.
True or false? It is only possible for VMs to be networked via a virtual switch (vSwitch).
False - it is possible to configure a VM to use either switches virtualized by the hypervisor or the network’s physical switches (via the host’s NIC).
What are the main differences between NAS and SAN?
Network Attached Storage (NAS) is typically a single appliance providing filelevel access to clients. Storage Area Networks (SAN) provide blocklevel access to multiple storage devices to file servers.
What protocol can be used to implement a SAN without provisioning dedicated storage networking adapters and switches?
iSCSI.
Is InfiniBand a competitor technology to Fiber Channel or an upgrade path allowing integration with legacy infrastructure?
InfiniBand is a competitor technology to Fiber Channel.
What would be the key difference between purchasing cloud web server instances and a virtual hosted server?
The cloud instances should offer better elasticity (being able to provision and pay for peak resources as needed rather than trying to anticipate demand and provision for peak resources at the outset).
What are the main options for implementing connections to a cloud service provider?
You can use the Internet and the provider’s web services (possibly over a VPN) or establish a direct connection for better security and performance. A direct connection could be established by co-locating resources in the same data center or provisioning a direct link to the data center.