Virtualization Concepts and Networking
19 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The ___ interacts with the NIC Driver in the Virtual Machine.

network

Which option best describes data deduplication?

  • To increase the number of backups stored
  • To compress files without modifying their content
  • To improve processing speed by duplicating data
  • To replace duplicated entities with pointers to the original (correct)

Network I/O control guarantees individual VMs guaranteed bandwidth during high usage periods.

True (A)

What is the primary function of a virtual switch in a virtualized network?

<p>To manage and isolate network traffic between VMs and physical NICs</p> Signup and view all the answers

Match the following levels at which data deduplication can operate:

<p>Byte level = Smallest incremental data unit Block level = Larger chunks of data compared File level = Entire files compared for duplication</p> Signup and view all the answers

The hypervisor connects to the ___ Controller on the physical server to handle storage access.

<p>storage</p> Signup and view all the answers

Why is it recommended to isolate storage traffic from user traffic in a virtualized network?

<p>To prevent network congestion and improve storage performance (D)</p> Signup and view all the answers

Virtual machines cannot support legacy peripherals like parallel and serial ports.

<p>False (B)</p> Signup and view all the answers

What percentage of storage space can data deduplication potentially reclaim?

<p>30 to 90 percent</p> Signup and view all the answers

Cloning virtual machines only duplicates the virtual hardware.

<p>False (B)</p> Signup and view all the answers

How does Fault Tolerance (FT) differ from High Availability (HA) in virtualization?

<p>FT prevents application interruptions, while HA restarts VMs after a server crash. (D)</p> Signup and view all the answers

Virtual machine templates are stored in a read-only state to prevent unintended changes and are often referred to as 'golden images.'

<p>True (A)</p> Signup and view all the answers

What feature would you use to migrate running VMs to another host without interrupting user applications?

<p>vMotion</p> Signup and view all the answers

When a snapshot is created, the original virtual machine disk is locked, and changes are written to a child disk.

<p>locked, child</p> Signup and view all the answers

Which of the following parameters is used to control CPU and memory resources in virtual machines?

<p>Reservations, Shares, Limits (D)</p> Signup and view all the answers

VM-affinity ensures that two virtual machines will always run on different hosts, while anti-affinity ensures they will always run on the same host.

<p>False (B)</p> Signup and view all the answers

What are virtual appliances?

<p>Prebuilt virtual machines containing necessary components to deploy an application.</p> Signup and view all the answers

Which statement is true regarding High Availability (HA) in virtualization?

<p>Clustering links two or more physical servers via network and shared storage to provide redundancy. (C)</p> Signup and view all the answers

Match the following virtual machine concepts with their definitions:

<p>Cloning = Creating an identical copy of a virtual machine Snapshots = Capturing the state of a VM at a specific point in time Templates = Read-only version of a VM for creating new instances Fault Tolerance = Maintaining continuous operation without interruption</p> Signup and view all the answers

Flashcards

Full Clone

A full clone is a complete copy of the original virtual machine disk. It uses the same amount of storage space as the original disk.

Linked Clone

A linked clone shares disk space with the original VM. It only stores changes made to the disk, saving significant storage space compared to a full clone.

Virtual Machine Template

Virtual machine templates are read-only images that prevent accidental changes. They are often called "golden images" because they serve as a base for creating new virtual machines.

Snapshot

When a snapshot is taken, the original VM disk is locked, and changes are written to a new "child" disk. Reverting to the snapshot removes the child disk, restoring the original VM state. Deleting the snapshot merges the changes from the child disk onto the original.

Signup and view all the flashcards

Live Migration

Live migration allows running virtual machines to be moved to a different physical host without interrupting user applications or services.

Signup and view all the flashcards

Fault Tolerance (FT)

Fault Tolerance (FT) prevents service interruptions caused by server crashes. It instantly switches resources to a backup server if the primary server fails.

Signup and view all the flashcards

High Availability (HA)

High Availability (HA) ensures that virtual machines are always available, even if a server fails. It restarts a failed VM on a different server, minimizing downtime.

Signup and view all the flashcards

Clustering

Clustering combines multiple physical servers using networking and shared storage. This redundancy allows for service continuity even if one server fails.

Signup and view all the flashcards

Virtual Appliance

Virtual appliances are pre-configured and tested virtual machines that come ready to deploy an application. They are faster to deploy because they are complete packages that can be easily replaced during updates.

Signup and view all the flashcards

VM Affinity/Anti-affinity

VM affinity ensures that two VMs will always run on the same host, while VM anti-affinity ensures that they will always run on different hosts.

Signup and view all the flashcards

Network Emulator

The component within the hypervisor that simulates a network interface card (NIC) for a virtual machine, allowing it to communicate with the host's network.

Signup and view all the flashcards

Storage Emulator

The component within the hypervisor that simulates a storage controller for a virtual machine, enabling access to storage devices within the host.

Signup and view all the flashcards

Physical NIC

The physical network interface card on the server running the hypervisor. This connects the host to the external network, allowing virtual machines to access the internet and other external networks.

Signup and view all the flashcards

Storage Controller

The hardware controller within the server running the hypervisor which manages storage devices attached to the server. The hypervisor communicates with this controller to provide virtual access to the storage devices for virtual machines.

Signup and view all the flashcards

Data Deduplication

A technique used to optimize storage by identifying and eliminating redundant data. This can be done at various levels, including byte, block, and file level.

Signup and view all the flashcards

Data Deduplication's Purpose

The process of replacing redundant data with pointers to the original data, saving storage space.

Signup and view all the flashcards

External Network Connection

A connection type that allows virtual machines to access external networks, enabling communication with external clients or servers.

Signup and view all the flashcards

Internal Network Connection

A connection type that limits virtual machine communication to within the host system, isolating them from external networks. This is suitable for internal applications and data that should be protected from unauthorized access.

Signup and view all the flashcards

Virtual Switch

A virtualized networking component that facilitates communication between virtual machines and physical network interface cards (NICs). It acts as a bridge, managing and isolating network traffic within the virtualized environment.

Signup and view all the flashcards

Storage Traffic Isolation

Separating storage traffic from general user traffic on a virtualized network. This practice improves storage performance and reduces network congestion.

Signup and view all the flashcards

Study Notes

Virtualization Concepts

  • Hypervisor and Drivers: The emulator in the hypervisor interacts with the NIC driver in the network and the SCSI driver in the virtual machine's storage.
  • Hypervisor Connections: The hypervisor connects to the network interface card (NIC) on the physical server to manage networking capabilities and to the storage controller to handle storage access.
  • Data Deduplication Levels: Data deduplication operates at the byte, block, and file level, potentially reclaiming 30-90% of storage space.
  • Data Deduplication Purpose: The purpose of data deduplication is to replace duplicated entities with pointers to the original, thus increasing processing speed and potentially reducing storage space requirements.

Virtual Machine Network Configurations

  • Sales Team VMs: Use Bridged Network Connection to assign each VM a unique IP address accessible from the external network.
  • Finance Team VMs: Use Network Address Translation (NAT) to assign each VM a unique IP, but preventing external access.

Virtual Switches

  • Virtual Switch Function: The primary function of a virtual switch is to manage and isolate network traffic between VMs and physical network interface cards (NICs).
  • Bandwidth Guarantees: Network I/O control ensures that individual VMs or groups of VMs have guaranteed bandwidth during periods of high usage, even on VMware ESX.

Virtual Machine Isolation

  • Storage Traffic Isolation: It's recommended to isolate storage traffic from user traffic in a virtualized network to prevent network congestion and improve storage performance.

Virtual Machine Cloning

  • Cloning: Cloning duplicates the virtual hardware and software. Full clones require the same storage space as the original VM, while linked clones save storage space by referencing the original VM.
  • Golden Images: Virtual machine templates are stored in a read-only state to prevent unintended changes and are often referred to as "golden images."

Virtual Machine Maintenance

  • Live Migration: Use live migration to migrate running VMs to another host without disrupting user applications during planned downtime.
  • Fault Tolerance and High Availability: Fault Tolerance (FT) prevents application interruptions during server crashes, whereas High Availability (HA) restarts VMs. FT handles planned downtime, HA handles both planned and unplanned downtime.

Virtual Machine Resources

  • Resource Control: Parameters like reservations, allocations, and policies are used to control CPU and memory resources in virtual machines. This is useful for reserving resources for specific tasks.

VM Templates

  • Virtual Appliances: Virtual appliances are prebuilt virtual machines that already contain the application components needed for deployment, making them easily deployable.

Virtual Machine Affinity

  • Affinity and Anti-affinity: VM affinity ensures that two VMs run on different hosts, while anti-affinity ensures they always run on the same host.

High Availability in Virtualization

  • Clustering: Clustering links two or more physical servers through a network and shared storage to provide redundancy.
  • Continuous Operation: High Availability (HA) ensures that virtual machines on failed servers continue running without interruption.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

VC Study Guide - Part 2 PDF

Description

This quiz covers key concepts in virtualization, including hypervisors, data deduplication, and virtual machine network configurations. Examine how hypervisors manage network and storage access while learning about different networking methods used by virtual machines. Test your knowledge on maximizing storage efficiency and network settings for various teams.

More Like This

Use Quizgecko on...
Browser
Browser