1. Briefly explain what is meant by the following terms:
• business domain;
• business function;
2. Summarise how I determine if a guest operating system, say Windows 2008 Server is compatible with Microsoft Hyper V. If an operating system is not compatible with Microsoft Hyper V, what, if anything, can I do to resolve the situation?
3. Describe how I would configure the following IP-related parameters on a Windows server: IP address, subnet mask, and default gateway.
4, List two software products that are currently used in industry to provide server virtualisation.
5. Give two examples of information about a server running virtualisation software you would document as part of a technical specification for that server. For each example of information,describe how you would gather the information.
6. In a project implementing a virtualisation solution, it is typical to have a planning process, a build process and a manage process. Give an example of how the outputs from one phase in the project, such as the planning process, can become an input into the next phase of the project, such as the build process.
7. List two system diagnostic tools I could use to gather information about servers that I am considering for virtualisation. Briefly describe how I would use the tools.
Server virtualization is the procedure which conceals the genuine server assets from the clients. The quantity of physical servers and their individual points of interest, identifying with processors, stockpiling, working frameworks among others, are consolidated into a solitary extensive virtual condition. Utilizing server virtualization programming enables singular applications to be keep running in their own particular separate conditions on a similar machine. This report is being prepared for Ms. Johnson, the IT Manager at ABC College and it outlines the server virtualization plan, specifications designs of a virtual server and also defines how a virtual server will be installed and tested for the ABC College.
Server virtualization plan
ABC College already has twenty physical servers running which contain various operating systems such as the:
- Windows 2012 Server which contains 4 servers, CPU utilization of 5, memory utilization of 50 and finally the size of the disk to be used has a size of 4TB
- Windows 2008 Server which contains 3 servers, CPU utilization of 7, memory utilization of 40 and the size of the hard disk used is 3 TB.
- Ubuntu Linux which contains 3 servers, CPU utilization of 4, memory utilization 40 and the size of hard disk is 2 TB.
So as to implement total virtualization of the servers, a virtualization software is required and in this case, Microsoft hyper V will be preferred for the job since its compatible with all the windows server versions and some client operating systems. In order to perform the virtualization process, the following resources will be required: server software which is hyper v in this case, Ethernet Switch, CPU, cluster node server, Ethernet cables, storage server, memory and a local disk. (Wang, G., & Ng, T. E. 2010)
Following the project of server virtualization, I would like to request for the administrator rights from the IT manager to access and assess the site where the virtualization process will be implemented.
Virtual server specification
During virtualization, windows server 2012 and Hyper v software will be used. Six physical servers will be used.
The cost of the hardware and software to be used is as indicated below:
One cluster node server, 2-core CPU, 500 GB local disk, 64 GB memory, 10 Gb Ethernet
$5,500 (per server)
One 24 port Ethernet switch (1/10 Gb ports)
One ISCSI storage server (4 10Gb ports)
$5,000 for base unit, and $1,000 for each TB of storage used)
Microsoft Hyper-V virtualization license (up to 24 VMs) as art of Windows 2012 Server license.
$3,500 per annum (per server)
Labor costs estimate to design, implement and test a virtualization server
$3,000 (30 hours at $100/hr)
Virtual server installation.
In order to perform the installation process, there are some WHS rules that are required to be followed or adhered to. First, will create policies written down to show commitment. That is, my commitment, the staff and managers and all the stake holders involved in the college to adhere to the WHS policies. Then, will train the staff involved on how to handle the virtualized server to be implemented and how to handle any hazard that might occur as a result of the process. Will also outline how to report any incidences that may occur as well as the investigations behind the occurrence. Will also train the staff on how to keep records, monitoring, analyzing and reviewing the system. In case of any emergencies, will come up with a channel of channeling out the issues and how to handle the emergencies as well. Will also involve all the stake holders involved in consultations regarding the comfortability of the process and how to handle all the anxieties that may arise.
To access the site for the server virtualization, access is needed from the administrator. First I request the authority from the IT manager, then the administrator concerned will provide access to the site. After access is provided, I will perform the following tasks:
- Building the virtual environment phase begins whereby servers are installed and the Hyper V is loaded. VMware is then loaded and then the virtual hosts will be added to manage the platform.
- Servers will then be configured with their static IP addresses and then correction of network settings will be done.
- Then comes the setting of complex root password on all virtual hosts, creating a group in Windows Active Directoryand adding authorized VMware administrators and removing the domain name.
- We then create new VMs and install clean OS to add new virtual machines to the virtual infrastructure.
- Monitoringthe new virtual environment is done using basic tools such as the graphs or more advanced graphs provided by the vCenter.
- Back up is then done on the virtualized physical servers using the existing back up agent.
To review the hardware and software compatibility of the server, one can use the windows server catalog which contains a list of all the versions of servers with their corresponding compatible hardware and software specifications or requirements. Windows server logos can also be used to review the compatibility of the hardware and software.
Virtual server testing.
A virtual machine is used to run tests on the server using TestComplete. To run the tests on virtual machines utilizing TestComplete, one can purchase the Floating User permit of TestComplete, enact it on a physical machine and afterward introduce the TestComplete on virtual machines on the system and utilize it to run the tests. Testing applications on virtual machines have distinctive purposes, for example, can be utilized for dispersed testing of customer server applications, practical testing or in relapse testing. It enables analyzers to test their application under different stages utilizing a solitary PC
The results of the tests can be recorded in a video record. Running the tests however can cause conflicts on the network resulting to system crashes. (Adams, K., & Agesen, O. 2009)
Chowdhury, N. M. K., & Boutaba, R. (2010). A survey of network virtualization. Computer Networks, 54(5), 862-876.
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A. L., Martins, F. C., Anderson, A. V., ... & Smith, L. (2010). Intel virtualization technology. Computer, 38(5), 48-56.
Pfaff, B., Pettit, J., Amidon, K., Casado, M., Koponen, T., & Shenker, S. (2009). Extending Networking into the Virtualization Layer. In Hotnets.
Adams, K., & Agesen, O. (2009). A comparison of software and hardware techniques for x86 virtualization. ACM SIGARCH Computer Architecture News, 34(5), 2-13.
Wang, G., & Ng, T. E. (2010). The impact of virtualization on network performance of amazon ec2 data center. In Infocom, 2010 proceedings ieee (pp. 1-9). IEEE.
Soltesz, S., Pötzl, H., Fiuczynski, M. E., Bavier, A., & Peterson, L. (2009). Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. In ACM SIGOPS Operating Systems Review (Vol. 41, No. 3, pp. 275-287). ACM.