Podcast
Questions and Answers
The ___ interacts with the NIC Driver in the Virtual Machine.
The ___ interacts with the NIC Driver in the Virtual Machine.
network
Which option best describes data deduplication?
Which option best describes data deduplication?
Network I/O control guarantees individual VMs guaranteed bandwidth during high usage periods.
Network I/O control guarantees individual VMs guaranteed bandwidth during high usage periods.
True
What is the primary function of a virtual switch in a virtualized network?
What is the primary function of a virtual switch in a virtualized network?
Signup and view all the answers
Match the following levels at which data deduplication can operate:
Match the following levels at which data deduplication can operate:
Signup and view all the answers
The hypervisor connects to the ___ Controller on the physical server to handle storage access.
The hypervisor connects to the ___ Controller on the physical server to handle storage access.
Signup and view all the answers
Why is it recommended to isolate storage traffic from user traffic in a virtualized network?
Why is it recommended to isolate storage traffic from user traffic in a virtualized network?
Signup and view all the answers
Virtual machines cannot support legacy peripherals like parallel and serial ports.
Virtual machines cannot support legacy peripherals like parallel and serial ports.
Signup and view all the answers
What percentage of storage space can data deduplication potentially reclaim?
What percentage of storage space can data deduplication potentially reclaim?
Signup and view all the answers
Cloning virtual machines only duplicates the virtual hardware.
Cloning virtual machines only duplicates the virtual hardware.
Signup and view all the answers
How does Fault Tolerance (FT) differ from High Availability (HA) in virtualization?
How does Fault Tolerance (FT) differ from High Availability (HA) in virtualization?
Signup and view all the answers
Virtual machine templates are stored in a read-only state to prevent unintended changes and are often referred to as 'golden images.'
Virtual machine templates are stored in a read-only state to prevent unintended changes and are often referred to as 'golden images.'
Signup and view all the answers
What feature would you use to migrate running VMs to another host without interrupting user applications?
What feature would you use to migrate running VMs to another host without interrupting user applications?
Signup and view all the answers
When a snapshot is created, the original virtual machine disk is locked, and changes are written to a child disk.
When a snapshot is created, the original virtual machine disk is locked, and changes are written to a child disk.
Signup and view all the answers
Which of the following parameters is used to control CPU and memory resources in virtual machines?
Which of the following parameters is used to control CPU and memory resources in virtual machines?
Signup and view all the answers
VM-affinity ensures that two virtual machines will always run on different hosts, while anti-affinity ensures they will always run on the same host.
VM-affinity ensures that two virtual machines will always run on different hosts, while anti-affinity ensures they will always run on the same host.
Signup and view all the answers
What are virtual appliances?
What are virtual appliances?
Signup and view all the answers
Which statement is true regarding High Availability (HA) in virtualization?
Which statement is true regarding High Availability (HA) in virtualization?
Signup and view all the answers
Match the following virtual machine concepts with their definitions:
Match the following virtual machine concepts with their definitions:
Signup and view all the answers
Study Notes
Virtualization Concepts
- Hypervisor and Drivers: The emulator in the hypervisor interacts with the NIC driver in the network and the SCSI driver in the virtual machine's storage.
- Hypervisor Connections: The hypervisor connects to the network interface card (NIC) on the physical server to manage networking capabilities and to the storage controller to handle storage access.
- Data Deduplication Levels: Data deduplication operates at the byte, block, and file level, potentially reclaiming 30-90% of storage space.
- Data Deduplication Purpose: The purpose of data deduplication is to replace duplicated entities with pointers to the original, thus increasing processing speed and potentially reducing storage space requirements.
Virtual Machine Network Configurations
- Sales Team VMs: Use Bridged Network Connection to assign each VM a unique IP address accessible from the external network.
- Finance Team VMs: Use Network Address Translation (NAT) to assign each VM a unique IP, but preventing external access.
Virtual Switches
- Virtual Switch Function: The primary function of a virtual switch is to manage and isolate network traffic between VMs and physical network interface cards (NICs).
- Bandwidth Guarantees: Network I/O control ensures that individual VMs or groups of VMs have guaranteed bandwidth during periods of high usage, even on VMware ESX.
Virtual Machine Isolation
- Storage Traffic Isolation: It's recommended to isolate storage traffic from user traffic in a virtualized network to prevent network congestion and improve storage performance.
Virtual Machine Cloning
- Cloning: Cloning duplicates the virtual hardware and software. Full clones require the same storage space as the original VM, while linked clones save storage space by referencing the original VM.
- Golden Images: Virtual machine templates are stored in a read-only state to prevent unintended changes and are often referred to as "golden images."
Virtual Machine Maintenance
- Live Migration: Use live migration to migrate running VMs to another host without disrupting user applications during planned downtime.
- Fault Tolerance and High Availability: Fault Tolerance (FT) prevents application interruptions during server crashes, whereas High Availability (HA) restarts VMs. FT handles planned downtime, HA handles both planned and unplanned downtime.
Virtual Machine Resources
- Resource Control: Parameters like reservations, allocations, and policies are used to control CPU and memory resources in virtual machines. This is useful for reserving resources for specific tasks.
VM Templates
- Virtual Appliances: Virtual appliances are prebuilt virtual machines that already contain the application components needed for deployment, making them easily deployable.
Virtual Machine Affinity
- Affinity and Anti-affinity: VM affinity ensures that two VMs run on different hosts, while anti-affinity ensures they always run on the same host.
High Availability in Virtualization
- Clustering: Clustering links two or more physical servers through a network and shared storage to provide redundancy.
- Continuous Operation: High Availability (HA) ensures that virtual machines on failed servers continue running without interruption.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts in virtualization, including hypervisors, data deduplication, and virtual machine network configurations. Examine how hypervisors manage network and storage access while learning about different networking methods used by virtual machines. Test your knowledge on maximizing storage efficiency and network settings for various teams.