SlideShare ist ein Scribd-Unternehmen logo
1 von 86
An Introduction to  Server Virtualisation Alan McSweeney
A loose definition ,[object Object]
Some history ,[object Object],[object Object],[object Object]
Some virtual machines you may know… ,[object Object],[object Object]
The old model ,[object Object],[object Object],[object Object]
The new model ,[object Object],[object Object],[object Object],[object Object]
Increased Hardware Utilisation ,[object Object],[object Object]
Underutilisation of Resources ,[object Object],[object Object],[object Object],[object Object],Actual DSS customer data – 120 servers monitored
Virtual Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object]
How is it implemented? ,[object Object],[object Object]
Type 1 VMM IBM CP/CMS VMware ESX Windows Virtualisation (2008) Xen Virtual Iron Hardware VMM Guest VM Guest VM Guest VM
Type 2 VMM VMware Server Hardware VMM Guest VM Guest VM Guest VM Host OS
Hybrid VMM MS Virtual Server MS Virtual PC Hardware VMM Host VM Guest VM Guest VM
Paravirtualisation ,[object Object],[object Object]
Full Virtualisation ,[object Object],[object Object],[object Object]
Native Virtualisation ,[object Object],[object Object]
Native Virtualisation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s in a Virtual Machine?
What’s in a Virtual Machine - BIOS ,[object Object],[object Object],[object Object]
What’s in a Virtual Machine - Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Combining internal and external virtual switches ,[object Object],[object Object]
What’s in a Virtual Machine - Storage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Licensing Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Support Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Usage Scenarios for Virtualization Consolidation Workload Mobility Business Continuity Management Development and Test
[object Object],[object Object],[object Object],Usage Scenario Production server consolidation Gartner definition
Usage Scenario Production server consolidation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Usage Scenario Business continuity management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Usage Scenario Dynamic datacenter ,[object Object],[object Object],[object Object]
Usage Scenario Development and test ,[object Object],[object Object],[object Object]
Application + OS: Now A Data File ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Entire server – OS, apps, data, devices, and state – is now simply a file.
The Role of Shared Storage ,[object Object],[object Object],[object Object],[object Object]
Live Migration ,[object Object],[object Object],[object Object]
Hardware Infrastructure – Scale Up or Scale Out? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What should an enterprise ready virtualisation platform offer? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Workstation ,[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Server ,[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Infrastructure 3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Non-disruptive capacity on demand
Automate resource assurance for critical applications DRS ,[object Object],[object Object]
Automatic availability for all applications X VMWARE HA
Backup anytime ,[object Object],[object Object],[object Object],VMWARE CONSOLIDATED BACKUP
Microsoft Virtualisation Products ,[object Object],[object Object],[object Object],[object Object]
Virtual PC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Server 2005 R2 SP1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Clustering in Virtual Server 2005 R2 SP1 Host to Host Cluster storage SAN or iSCSI connection Guest to Guest Cluster storage iSCSI connection
Virtual Server 2005 R2 SP1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows Virtualisation ,[object Object],[object Object],[object Object],Hardware VMM (Hypervisor) Guest 1 (“Host OS”) Guest 2
Virtual Machine Manager
Centralized Management: Reports Full set of reports, integration with MOM database Actions one click away in context sensitive Actions Pane
Self Service Portal Ability to control owned virtual machines Thumbnails of all owned virtual machines
Self-Service Portal Provisioning User selects from list of templates Administrator has associated with that user
Self-Service Portal Provisioning New virtual machine ready for use, Terminal Services connection information automatically emailed to user.
Virtual Server 2005 vs Windows Server Virtualization   Virtual Server 2005 R2 Windows Server Virtualization 32-bit VMs? Yes Yes 64-bit VMs? No Yes Multi-processor VMs? No Yes, up to 8 processor VMs VM memory support? 3.6 GB per VM More than 32 GB per VM Hot add memory/processors? No Yes Hot add storage/networking? No Yes Can be managed by System Center Virtual Machine Manager? Yes Yes Microsoft Cluster support? Yes Yes Scriptable / Extensible? Yes, COM Yes, WMI Number of running VMs? 64 More than 64. As many as hardware will allow. User interface Web Interface MMC 3.0 Interface
Xen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XenSource
XenSource Products N/A  N/A  Mid-2007  Shared storage  N/A  N/A  Mid-2007  Live Migration   Red Hat EL 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 5.0; SUSE SLES 9.2, 9.3, 10.1; Debian Sarge  N/A (Windows guests support only)  Red Hat EL 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 5.0; SUSE SLES 9.2, 9.3, 10.1; Debian Sarge  Linux guest support   Windows Server 2003; Windows XP; Windows 2000 Server  Windows Server 2003; Windows XP; Windows 2000 Server  Windows Server 2003; Windows XP; Windows 2000 Server  Windows guest support   Developers, testers, support, IT enthusiasts  Windows IT professionals  Enterprise IT, system integrators  User Profile
Virtual Iron ,[object Object],[object Object],[object Object],[object Object]
Virtual Iron Components Operating systems that are fully virtualised on a physical server Varies Guest operating systems Controls virtual servers through an agent in the service partition Commercial Virtualisation Manager Second software loaded when physical server boots. Manages virtual server creation and configuration and all I/O. GPL Service Partition First software loaded when physical server boots. Manages all hardware resources GPL Hypervisor Function License Component
Virtualization Manager  ,[object Object],[object Object],[object Object]
Virtual Manager Policy-based Automation ,[object Object],[object Object],[object Object],[object Object]
Virtual Iron Architecture
Supported Configurations Up to 16 Virtual disks per virtual server Up to 5 Virtual NIC adapters per virtual server Up to 5 Virtual servers per physical server CPU Up to 96GB RAM per Physical Server Up to 8 Processors per virtual Server 100s per virtual data centre Virtualised Nodes Intel Xeon with Intel VT AMD Opteron with AMD-V Processors 32 and 64-bit Red Hat Enterprise Linux 4 32 and 64-bit SUSE Linux Enterprise Server 9 32-bit Windows XP 32-bit Windows 2003 Operating systems Support Feature
Virtuozzo ,[object Object],[object Object],[object Object]
Parallels Workstation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HP Virtual Server Environment ,[object Object]
Physical to Virtual (P2V) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Converter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Platespin PowerConvert ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Platespin PowerConvert
Portlock Storage Manager ,[object Object],[object Object],[object Object]
Capacity Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Capacity Planner
[object Object],[object Object],[object Object],Platespin PowerRecon Inventory Analyse Workload  Data  Collection Recommend
Some additional products…
VMware Lab Manager ,[object Object],[object Object],[object Object]
VMware ACE
VMware Virtual Desktop Infrastructure
Dunes VS-0 ,[object Object],Dunes VS-O
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Virtual Machine Backup and Replication
Virtual Machine Backup and Replication ,[object Object],[object Object],[object Object],[object Object],[object Object]
esxCharter ,[object Object]
esxMigrator ,[object Object],[object Object],[object Object]
Best Practice Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practice Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
More Information ,[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualizationelliando dias
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology OverviewOpenCity Community
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technologysanjoysanyal
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisationAlessandro Guli
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationAhmad Hafeezi
 
Virtualization
VirtualizationVirtualization
Virtualizationimp_satish
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 

Was ist angesagt? (20)

Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 

Andere mochten auch

Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewAlan McSweeney
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme NotesAlan McSweeney
 
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Alan McSweeney
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataAlan McSweeney
 
Voice Over Internet Protocol
Voice Over Internet ProtocolVoice Over Internet Protocol
Voice Over Internet ProtocolLucyAtthis
 
An Introduction to Apple Computer, Inc.
An Introduction to Apple Computer, Inc.An Introduction to Apple Computer, Inc.
An Introduction to Apple Computer, Inc.whatismanagement81
 
Cloudy forecasts and other trends in information technology
Cloudy forecasts and other trends in information technologyCloudy forecasts and other trends in information technology
Cloudy forecasts and other trends in information technologyAlan McSweeney
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleAlan McSweeney
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best PracticeAlan McSweeney
 
The Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael HanleyThe Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael HanleySara Quinn
 
Data warehouse design
Data warehouse designData warehouse design
Data warehouse designines beltaief
 
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSHermann GBILIMAKO
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Alan McSweeney
 
Notes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationNotes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationAlan McSweeney
 
Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Alan McSweeney
 
Economics of Utility Computing
Economics of Utility ComputingEconomics of Utility Computing
Economics of Utility ComputingAlan McSweeney
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewAlan McSweeney
 
Data Warehouse Design & Dimensional Modeling
Data Warehouse Design & Dimensional ModelingData Warehouse Design & Dimensional Modeling
Data Warehouse Design & Dimensional ModelingCode Mastery
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The CustomerAlan McSweeney
 

Andere mochten auch (20)

Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity Overview
 
Data Warehouse Programme Notes
Data Warehouse Programme NotesData Warehouse Programme Notes
Data Warehouse Programme Notes
 
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
Voice Over Internet Protocol
Voice Over Internet ProtocolVoice Over Internet Protocol
Voice Over Internet Protocol
 
An Introduction to Apple Computer, Inc.
An Introduction to Apple Computer, Inc.An Introduction to Apple Computer, Inc.
An Introduction to Apple Computer, Inc.
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
Cloudy forecasts and other trends in information technology
Cloudy forecasts and other trends in information technologyCloudy forecasts and other trends in information technology
Cloudy forecasts and other trends in information technology
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level Role
 
Bpm Implementation Success Criteria And Best Practice
Bpm Implementation   Success Criteria And Best PracticeBpm Implementation   Success Criteria And Best Practice
Bpm Implementation Success Criteria And Best Practice
 
The Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael HanleyThe Mobile Ecosystem_Michael Hanley
The Mobile Ecosystem_Michael Hanley
 
Data warehouse design
Data warehouse designData warehouse design
Data warehouse design
 
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOS
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
 
Notes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And ModernisationNotes On Software Development, Platform And Modernisation
Notes On Software Development, Platform And Modernisation
 
Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...Structured Approach To It Business System Availability And Continuity Plannin...
Structured Approach To It Business System Availability And Continuity Plannin...
 
Economics of Utility Computing
Economics of Utility ComputingEconomics of Utility Computing
Economics of Utility Computing
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment Overview
 
Data Warehouse Design & Dimensional Modeling
Data Warehouse Design & Dimensional ModelingData Warehouse Design & Dimensional Modeling
Data Warehouse Design & Dimensional Modeling
 
Notes On Single View Of The Customer
Notes On Single View Of The CustomerNotes On Single View Of The Customer
Notes On Single View Of The Customer
 

Ähnlich wie An Introduction To Server Virtualisation

Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-VMark Wilson
 
Virtualization Landscape
Virtualization LandscapeVirtualization Landscape
Virtualization Landscapejpnaye
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)rajsandhu1989
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationnone
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With VirtualizationBill Kalarness
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminologyZeno Idzerda
 
V terminology guide
V terminology guideV terminology guide
V terminology guideRizi Butt
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 

Ähnlich wie An Introduction To Server Virtualisation (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 
Parth virt
Parth virtParth virt
Parth virt
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Virtualization Landscape
Virtualization LandscapeVirtualization Landscape
Virtualization Landscape
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
DeltaV Virtualization
DeltaV VirtualizationDeltaV Virtualization
DeltaV Virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With Virtualization
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminology
 
V terminology guide
V terminology guideV terminology guide
V terminology guide
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
Virtualization
VirtualizationVirtualization
Virtualization
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 

Mehr von Alan McSweeney

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfAlan McSweeney
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Alan McSweeney
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataAlan McSweeney
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 

Mehr von Alan McSweeney (20)

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdf
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation Solutions
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual Charts
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In Data
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

An Introduction To Server Virtualisation

  • 1. An Introduction to Server Virtualisation Alan McSweeney
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Type 1 VMM IBM CP/CMS VMware ESX Windows Virtualisation (2008) Xen Virtual Iron Hardware VMM Guest VM Guest VM Guest VM
  • 12. Type 2 VMM VMware Server Hardware VMM Guest VM Guest VM Guest VM Host OS
  • 13. Hybrid VMM MS Virtual Server MS Virtual PC Hardware VMM Host VM Guest VM Guest VM
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. What’s in a Virtual Machine?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Usage Scenarios for Virtualization Consolidation Workload Mobility Business Continuity Management Development and Test
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 40.
  • 41. Automatic availability for all applications X VMWARE HA
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Clustering in Virtual Server 2005 R2 SP1 Host to Host Cluster storage SAN or iSCSI connection Guest to Guest Cluster storage iSCSI connection
  • 47.
  • 48.
  • 50. Centralized Management: Reports Full set of reports, integration with MOM database Actions one click away in context sensitive Actions Pane
  • 51. Self Service Portal Ability to control owned virtual machines Thumbnails of all owned virtual machines
  • 52. Self-Service Portal Provisioning User selects from list of templates Administrator has associated with that user
  • 53. Self-Service Portal Provisioning New virtual machine ready for use, Terminal Services connection information automatically emailed to user.
  • 54. Virtual Server 2005 vs Windows Server Virtualization   Virtual Server 2005 R2 Windows Server Virtualization 32-bit VMs? Yes Yes 64-bit VMs? No Yes Multi-processor VMs? No Yes, up to 8 processor VMs VM memory support? 3.6 GB per VM More than 32 GB per VM Hot add memory/processors? No Yes Hot add storage/networking? No Yes Can be managed by System Center Virtual Machine Manager? Yes Yes Microsoft Cluster support? Yes Yes Scriptable / Extensible? Yes, COM Yes, WMI Number of running VMs? 64 More than 64. As many as hardware will allow. User interface Web Interface MMC 3.0 Interface
  • 55.
  • 57. XenSource Products N/A N/A Mid-2007 Shared storage N/A N/A Mid-2007 Live Migration Red Hat EL 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 5.0; SUSE SLES 9.2, 9.3, 10.1; Debian Sarge N/A (Windows guests support only) Red Hat EL 3.6, 3.7, 3.8, 4.1, 4.2, 4.3, 4.4, 5.0; SUSE SLES 9.2, 9.3, 10.1; Debian Sarge Linux guest support Windows Server 2003; Windows XP; Windows 2000 Server Windows Server 2003; Windows XP; Windows 2000 Server Windows Server 2003; Windows XP; Windows 2000 Server Windows guest support Developers, testers, support, IT enthusiasts Windows IT professionals Enterprise IT, system integrators User Profile
  • 58.
  • 59. Virtual Iron Components Operating systems that are fully virtualised on a physical server Varies Guest operating systems Controls virtual servers through an agent in the service partition Commercial Virtualisation Manager Second software loaded when physical server boots. Manages virtual server creation and configuration and all I/O. GPL Service Partition First software loaded when physical server boots. Manages all hardware resources GPL Hypervisor Function License Component
  • 60.
  • 61.
  • 63. Supported Configurations Up to 16 Virtual disks per virtual server Up to 5 Virtual NIC adapters per virtual server Up to 5 Virtual servers per physical server CPU Up to 96GB RAM per Physical Server Up to 8 Processors per virtual Server 100s per virtual data centre Virtualised Nodes Intel Xeon with Intel VT AMD Opteron with AMD-V Processors 32 and 64-bit Red Hat Enterprise Linux 4 32 and 64-bit SUSE Linux Enterprise Server 9 32-bit Windows XP 32-bit Windows 2003 Operating systems Support Feature
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 74.
  • 76.
  • 78. VMware Virtual Desktop Infrastructure
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.

Hinweis der Redaktion

  1. CP-40 was the first operating system that implemented complete virtualization, i.e. it provided a virtual machine environment supporting all aspects of its target computer system (a S/360-40), such that other S/360 operating systems could be installed, tested, and used as if on a stand-alone machine. CP-40 supported fourteen simultaneous virtual machines. Each virtual machine ran in "problem state" – privileged instructions such as I/O operations caused exceptions, which were then caught by the control program and simulated. Similarly, references to virtual memory locations not present in main memory cause page faults, which again were handled by control program rather than reflected to the virtual machine. Further details on this implementation are found in CP/CMS (architecture). The basic architecture and user interface of CP-40 were carried forward into CP-67/CMS, which evolved to become IBM's current VM product line.
  2. NTVDM stands for "NT Virtual DOS Machine". WOW stands for "Windows on Windows". They are both names for the same Win16 subsystem that runs under Windows NT, 2000, and XP. The Win16 subsystem is an emulated DOS subsystem that runs under NT-based Windows operating systems. It allows 16-bit applications to run as if they were being executed on a DOS computer, with that computer's multitasking and segmented memory model. The subsystem is preemptively multitasked, so that 16-bit DOS and Windows applications cannot crash the operating system. Within the subsystem, however, applications behave exactly as they do on a DOS/Win 3.x computer, so 16-bit applications within a Win16 subsystem can crash one another or the Win16 subsystem. When a DOS program running inside a VDM needs to access a peripheral, Windows will either allow this directly (rarely), or will present the DOS program with a Virtual Device Driver (VxD in short) which emulates the hardware using operating system functions.
  3. Traditionally, every application requires its own server. Vendors are often unhappy to share physical servers and operating systems. This leads to a situation whereby a new server is bought for every new application being deployed. The practical result of this is that the application becomes closely coupled with the hardware leading to underutilisation of resources and increased cost of ownership.
  4. In the virtualised model, a thin virtualisation layer, or hypervisor, is introduced which abstracts the physical hardware layer and presents a standardised subset of hardware to the virtual machines running on the system. Virtual machines are isolated from each other and run as processes on the host system. We have now broken the dependancies between applications and physical hardware and provided a safe and supportable mechanism for running multiple applications on a single hardware platform, thus optimising utilisation levels and reducing ownership costs.
  5. Most servers operate and very low levels of CPU utilisation, typically around 10%. However, a CPU efficiency will remain constant up to about 85% utilisation. Any unused CPU cycles between 10% and 85% should be exploited. One way of doing this is to time divide CPU cycles across multiple workloads, in this case by running multiple virtual machines on a single CPU.
  6. When purchasing new hardware for applications, organisations will often overprovision, that is, they will purchase more memory and CPU resources than will actually be used by the application. In a typical situation, the vast majority of servers in an organisation will use less than 10% of CPU resources during normal business hours. As idle hardware is a cost both in terms of acquisition and power consumption, our aim should be to drive up utilisation levels
  7. Server virtualisation helps us to realise the concept of a “virtual infrastructure”. We no longer think of providing extra resources, be they storage, network, memory or CPU resources, to a single application. Resources now become part of a pool that virtual machines can draw upon, using as much or as little of each resource as they each need. Available resources can be taken from the pool and returned to the pool as required. This leads to a more efficient use of the IT infrastructure.
  8. a hypervisor (or virtual machine monitor ) is a virtualization platform that allows multiple operating systems to run on a host computer at the same time. The term usually refers to an implementation using full virtualization. The term hypervisor apparently originated in IBM's CP-370 reimplementation of CP-67 for the System/370, released in 1972 as VM/370.
  9. Type 1 hypervisor (or Type 1 virtual machine monitor ) is software that runs directly on a given hardware platform (as an operating system control program ). A "guest" operating system thus runs at the second level above the hardware. The classic type 1 hypervisor was CP/CMS, developed at IBM in the 1960s, ancestor of IBM's current z/VM. More recent examples are Xen, VMware's ESX Server, and Sun's Hypervisor (released in 2005).
  10. Type 2 hypervisor (or Type 2 virtual machine monitor ) is software that runs within an operating system environment. A "guest" operating system thus runs at the third level above the hardware. Examples include VMware Server and Microsoft Virtual Server.
  11. Microsoft Virtual Server and Virtual PC are referred to by Microsoft as “hybrid VMMs”. They are clearly not Type 1, as they rely on a hosting operating system for much of their functionality. However, neither are they Type 2, as they run their virtual machines directly on the hardware whenever possible. In a hybrid VMM architecture, a small hypervisor kernel, sometimes referred to as as a µ-hypervisor , controls CPU and memory resources, but I/O resources are programmed by device drivers that run in a deprivileged service OS . While a hybrid VMM architecture offers the promise of retaining the best characteristics of Type 1 and Type 2 VMMs, it does introduce new challenges, including new performance overheads, due to frequent privilege-level transitions between guest OS and service OS through the µ-hypervisor,
  12. Here, the virtual machine does not necessarily simulate hardware, but instead (or in addition) offers a special API that can only be used by modifying the "guest" OS. This system call to the hypervisor is called a "hypercall" in Xen, Par r allels Workstation and Enomalism; it is implemented via a DIAG ("diagnose") hardware instruction in IBM's CMS under V r M (which was the origin of the term hypervisor ). Examples include Win4Lin 9x, Sun's Logical Domains, and z/VM.
  13. Full virtualization , is a virtualization technique used to implement a certain kind of virtual machine environment: one that provides a complete simulation of the underlying hardware. The result is a system in which all software capable of execution on the raw hardware can be run in the virtual machine. In particular, this includes all operating systems. Binary translation is the emulation of one instruction set by another through translation of code. Sequences of instructions are translated from the source to the target instruction set.
  14. Intel VT is available on most Pentium 4 6x2, Pentium D 9x0, Xeon 3xxx/5xxx/7xxx [1], Core Duo (excluding T2300E) and Core 2 Duo processors (excluding the T5200, T5500, E4x00). AMD processors using Socket AM2, Socket S1, and Socket F include AMD Virtualization support. In May 2006, AMD introduced such versions of the Athlon 64, Turion 64, and 64-bit Sempron processors. AMD Virtualization is also supported by release two (x2xx series) of the Opteron processors.
  15. As industry standard servers evolve, more systems meet the criteria for native virtualisation. At time of writing, the servers listed above all reached the minimum specifications required.
  16. A virtual machine should contain all the essential hardware elements as found in a physical machine, but represented by virtual rather than real devices. Standard components will include: 1 or more network cards 1 or more storage controllers 1 or more virtual CPUs Virtual memory A mouse A keyboard Floppy and CD/DVD drives In special cases, a virtual machine can also be given access to the following physical devices on the host machine: Parallel ports Serial ports Sound cards
  17. At its most basic, a virtual machine will consist of a virtual BIOS (Basic I/O System). The BIOS will load from a file rather than from a BIOS chip but will have all the functionality found in a normal BIOS and is usually based on an actual commercially available BIOS, such as the PheonixBIOS chip. The BIOS can be used to control the boot order of the virtual machine by allowing you to specify whether to boot from the virtual hard disk, a CD-ROM or even over the network via PXE.
  18. Most virtualisation platforms allow you to define complex networking infrastructures within the virtualisation layer. Virtual switches can be created which provide network connectivity between virtual machines and also to external physical networks. This is usually achieved by linking the virtual machines to the virtual switches by means of virtual NICs. These NICs have all the features of physical NICs, such as MAC addresses and bound IP addresses. Virtual switches can then be connected to the physical network via uplink connections to the physical NICs on the host. These physical NICs normall operate as simple bridges and do not have associated IP addresses.
  19. By combining internal and external virtual switches, more complex network environments can be created within the virtualisation layer. In the example above, two back-end systems provide database and application functionality to a web front-end server. The back-end systems cannot be accessed directly by users and are thus protected by the firewall functionality of the web server.
  20. Virtual machines will see their allocated disk storage as storage devices attached to a storage adapter. In actuality, the storage devices will be monolithic files stored on a central file system. In the case of VMware, these will be VMDK files stored on a VMFS volume. Microsoft Virtual Server uses VDF files stored on an NTFS volume. The virtual machine will use these virtual disks as it needs. On a virtual machine running Windows Server 2003, they could be formated as NTFS and used for standard file storage. On a virtual machine running Linux, they could be formatted as ext3 file systems or used as swap devices, for instance. Physically, most standard storage systems are supported, such as direct attached SCSI, storage area networks, iSCSI and network attached storage.
  21. On the host platform, one must consider how the operating system on the host is to be licensed and how the virtualisation software is to be licensed. In the case of Type 1 VMMs such as VMware ESX and Xen, where the virtualisation layer runs directly on the physical hardware, there are no associated host operating system licensing considerations. However, the virtualisation technology itself will generally be licensed on a per CPU socket basis. In the case of Type 2 VMMs, where the virtualisation software runs as an application within an operating system environment, there may be a licensing requirement for the host OS. There may or may not be a licensing requirement for the virtualisation technology itself. For instance, VMware Server, which runs on Windows or Linux, is available as a free download. Microsoft Virtualisation, a hybrid VMM that will be part of the Longhorn release of Windows Server, will be a free add-on. On the guest, operating system licensing is generally the same as it is on physical servers. An exception is when running Microsoft Virtual Server. When the host OS is Windows 2003 R2 Enterprise Edition, you will be licensed for the host OS and 4 virtual machines running Windows 2003 R2 Enterprise Edition. If the host OS is Windows 2003 R2 DataCenter, you will be licensed for the host OS and an unlimited number of virtual machines running any version of Windows 2003 R2. Guest applications may be licensed on a per CPU basis. In some cases, this may be restricted to the number of virtual CPUs presented to the virtual machine. In other cases, the software vendor may insist on licensing based on the number of physical CPUs in the host server.
  22. Careful consideration must be given to application support issues when considering deployment of a virtual server solution. In some cases, although the application may run correctly and efficiently on a virtual machine, the software vendor may not be prepared to support such a deployment. Microsoft Virtual Server support policy: http://support.microsoft.com/kb/897613 Support policy for Microsoft software running in non-Microsoft hardware virtualization software: http://support.microsoft.com/kb/897615/ The following Windows Server System software is not supported within a Microsoft Virtual Server environment: Microsoft Speech Server Microsoft ISA Server 2000 Microsoft SharePoint Portal Server SharePoint Portal Server is currently not supported running within Virtual Server. Support for SharePoint Portal Server within Virtual Server is expected in a future release. Microsoft Identity Integration Server 2003 Microsoft Identity Integration Feature Pack Note Microsoft ISA Server 2006 is supported within a Microsoft Virtual Server 2005 R2 environment.
  23. There are many reasons why we may choose to deploy servers as virtual machines. We will examine each in turn.
  24. Gartner defines 3 types with progressively greater operational savings, return on investment and end user benefits Logical implement common processes and enable standard systems management procedures across the server applications. Physical Co-location of multiple platforms at fewer locations i.e. reduction in the number of data centres without altering the number of actual servers. Rational implementing multiple applications on fewer, more powerful platforms.
  25. Perhaps the most obvious use of virtualisation is to consolidate existing server workloads onto fewer, more powerful systems. Often the first candidates selected for consolidation are those that could be categorised as infrastructure applications. These will include Active Directory domain controllers, DHCP servers, DNS servers, and file and print servers. These are often identified as having very low utilisation workloads. However, many datacenter workloads can also be good candidates for virtualisation. Another group of systems often targeted for virtualisations are those that run legacy operating systems such as Windows NT 4 Server. As the range of available hardware systems that can run these operating systems diminishes, it makes sense to move them to a platform that will ensure easy recoverability in the event of a hardware failure. The ability of most virtualisation platforms to partition CPU and memory resources means that virtual machines can be limited in the amount of these resources that they can use, ensuring that multiple workloads can be run side by side without any one application monopolising available computing power.
  26. Many organisations find traditional business continuity and disaster recovery strategies difficult to implement. Bare metal restore tools often require that systems are recovered onto identical hardware and require a one-to-one correspondence between production and BC/DR systems. Virtualisation techniques can assist by making it easier to create and maintain “virtual” versions of existing production systems that can be restored rapidly onto any system supported by the preferred virtualisation platform. “Physical-to-Virtual” (P2V) techniques can be used to create these virtual machines which can then be either maintained or archived for later restore. Virtualisation can also make OS and application patching less risky. Copies of production virtual machines can be made or snapshots taken prior to patching. This makes it easier to roll back in the event of issues resulting from the patching process. Virtual networking makes it simple to isolate virtual machines which may be required to prevent malicious code such as viruses, adware and trojan horses from infecting other systems.
  27. The concept of the dynamic datacenter envisages the ability to move virtual machines based on the changing requirements of individual workloads. Depending on the capabilities of the virtualisation platform in question, this could be either an automated process or a manual task. A typical scenario would be where an application requires an increased share of the computing resources available on a server. Other virtual machines running on the same server could be dynamically migrated to other systems, thus freeing up resources for use by the more demanding application.
  28. Rapid provisioning of virtual machines Provide multiple VMs for testing quickly Use save state to start up quickly Maintain libraries of test systems Create arbitrary test scenarios Recreate reported issues Avoid use of production network Use snapshots to rollback to known state Wider test range for niche scenarios Provision multiple VMs with variations Simulate Complex environments
  29. Virtual machines are, in essence, represented by a collection of files. These will typically consist consist of files representing: Virtual hardware configuration Virtual BIOS settings Virtual disks Other aspects such as snapshots, saved states, etc. This means that virtual servers can be treated in a similar way to other types of files. Provisioning a new virtual server can now be as easy as copying a set of template files. Migrating a server to a new location, such as a DR site, can be as easy as a file backup and restore or a network copy. We can clone or copy entire servers using file management techniques, save versions of virtual machines as they change and develop, and keep archives of servers for restore purposes. Using software and hardware based replication techniques, we can also create remote mirrors of running virtual machines for DR purposes.
  30. Shared storage, in the form of fiber channel-based storage area networks (SAN), network attached storage (NAS) or iSCSI, plays a crucial role in the maintenance of a highly available virtual infrastructure. The file representing a virtual machine will be ideally located entirely in a central location that is accessible by a number of systems operating as a cluster. This allows us to move virtual machines as running processes from one physical host to another without having to move the files themselves. Many shared storage solutions also include snapshot, clone and replication technologies that can be leveraged by the virtual infrastructure.
  31. Live migration is the process of moving virtual machines from one host to another without interrupting processing or user connectivity. This is accomplished through a combination of centralised shared storage and high speed copying of memory contents. Because the virtual machines files are centrally stored and accessible by every host taking part in the live migration, there is no need to move files at any time. Only the memory contents of the virtual machine are moved. This is usually accomplished by having a dedicated gigabit Ethernet link between the physical hosts. Virtual machine memory contents are copied across this link from one host to another. When all memory contents have been copied, updates to the memory are temporarily suspended while the running process representing the virtual machine is stopped on one host and restarted on another. Live migration can be used to achieve zero downtime maintenance of the host servers and to dynamically balance resource utilisation across the infrastructure.
  32. The debate as to whether it is better to scale up or to scale out when designing a virtualisation infrastructure continues. While both approaches have advantages and disadvantages, it is generally agreed that scaling out is the best overall approach as it is the most cost effective solution while providing better utilisation levels.
  33. Most of the leading virtualisation platforms provide all of the features outlined above. As new solutions appear on the market, they should be carefully evaluated before being implemented.
  34. For most people, VMware Workstation was their first experience of i386-based virtualisation. It is an example of a Type 2 VMM in that it runs as an application on a host operating system. The product is aimed at those wishing to run multiple operating systems on a single desktop PC and will run on either Windows or Linux. This could be for software test and development or for training purposes. Supported guest operating systems include Windows, Linux, NetWare and Solaris.
  35. VMware Server is VMware’s free virtualisation platform. Again, it is a Type 2 VMM and uses much of the same code as VMware Workstation. The product runs on any x86 hardware so there is no necessity to refer to any hardware compatibility list when installing it. VMware Server is intended as a “step up” product, allowing users to experience virtualisation before moving on to Type 2 hypervisor products.
  36. VMware Infrastructure 3 represents VMware’s flagship virtualisation product and consists of two distinct elements: A Type 1 VMM platform called VMware ESX 3, and a a management application, VMware VirtualCenter 2. 4-way virtual SMP is provided for multi-threaded applications and up to 16GB of RAM can be provided to any individual virtual machine. Live migration is implemented via a licensed feature called VMotion. Also individually licensed are: VMware HA, a high availability technology that provides failover for virtual machines in the event of a hardware failure of a cluster node VMware Distributed Resource Scheduling which can be used to ensure uniform utilisation of resources across the infrastructure VMware Consolidated Backup, a technology that leverages the SAN infrastructure to provide high speed virtual machine backups
  37. VMware Infrastructure 3 provides the ability to add additional processing resources to a cluster with zero downtime and without disrupting any business processes. Additional servers can be introduced and workloads can then be redistributed via live migrations of virtual machines.
  38. The DRS feature improves resource allocation across all hosts in a VMware cluster. DRS collects resource usage information for all hosts and virtual machines in the cluster and generates recommendations for virtual machine placement. These recommendations can be applied automatically. Depending on the configured DRS automation level, DRS displays or applies the following recommendations: Initial placement . When you first power on a virtual machine in the cluster, DRS either places the virtual machine or makes a recommendation. Load balancing . At runtime, DRS tries to improve resource utilization across the luster either by performing automatic migrations of virtual machines (VMotion), or by providing recommendations for virtual machine migrations.
  39. In a VMware HA solution, a set of ESX Server hosts is combined into a cluster with a shared pool of resources. VirtualCenter monitors all hosts in the cluster. If one of the hosts fails, VirtualCenter immediately responds by restarting each associated virtual machine on a different host. VMware HA fully integrated with DRS. If a host has failed and virtual machines have been restarted on other hosts, DRS can provide migration recommendations or migrate virtual machines for balanced resource allocation. If one or both of the source and target hosts of a migration fail, HA can help recover from that failure.
  40. VMware Consolidated Backup (VCB) provides a fast and efficient method of backing up virtual machines by leveraging high speed fiber channel SAN data transfer and the virtual machine snapshot technology of VMware ESX. A Windows Server 2003 proxy server is attached to the SAN used by the VMware servers and is presented with the LUNs used by VMware to store virtual machine files. A VCB pre-backup script runs on the proxy which creates a snapshot of the virtual machine to be backed up and mounts it on the proxy. A third-party backup tool can then be used to move the data to disk and/or tape storage.
  41. Microsoft has been providing virtualisation products since 2004 when it released Virtual PC. This was soon followed by Microsoft Virtual Server. Traditionally, Microsoft virtualistaion solutions have been managed via a web interface. However, this will change with the introduction of Virtual Machine Manager which functions as an MMC snapin. The next generation of Microsoft virtualisation will be called Windows Virtualization and is scheduled to be released within 18 months of the release of the next version of Windows Server, codenamed “Longhorn”
  42. Virtual PC is a product aimed at desktop virtualisation, and as such is not considered a suitable product for production environments. However since it shares the same disk format as Virtual Server, it can be used as a development platform for virtual machines which will eventually run on Microsoft Virtual Server.
  43. Support for Multiple CPUs 4 with Standard 32 with Enterprise Guest limited to single CPU Support for Intel VT and AMD Virtualization New processor designs from AMD and Intel specifically built with virtualisation in mind providing enhanced performance Will not speed up Windows guests (as long as VM additions are installed) but will improve performance for non-Windows guests Will improve install times for Windows
  44. Microsoft Virtual Server 2005 supports clustering both at the guest and the host level. Virtual Machine Clustering Guests can failover to another guest on the same machine Uses shared SCSI on guests Virtual Host Clustering Can cluster host server enabling planned or unplanned moves to another server Requires use of havm.vbs script (available from Microsoft)
  45. Windows Server virtualization is a hypervisor-based technology that is a part of Windows Server “Longhorn”. Windows hypervisor is a thin layer of software running directly on the hardware which works in conjunction with an optimized instance of Windows Server “Longhorn” that allows multiple operating system instances to run on a physical server simultaneously. It leverages the powerful enhancements of processors provides customers with a scalable, reliable, secure and highly available virtualization platform.
  46. System Centre Virtual Machine Manager, an MCC snapin for managing Microsoft virtual environments, is currently in Beta - release is set for October 2007. Its key features will be: Managing and planning deployment of virtual servers. Works with both Virtual Server and Windows Virtualisation. Monitors existing physical servers to identify candidates for virtualisation. Manages load on virtual host servers. Identification of migration candidates is based on an analysis of both peaks and averages. The selection parameters are user definable. Performs physical to virtual migrations Uses VSS to copy data across Process can be either wizard based or scripted through PowerShell Supports Windows 2000 and Windows 2003 Servers
  47. Systems Centre Virtual Machine Manager will feature a full set of preconfigured reports that integrate fully with the Systems Center database.
  48. Virtual infrastructure is commonly used in test and development environments where there is consistent provisioning and teardown of virtual machines for testing purposes. With Virtual Machine Manager, administrators can selectively extend self-provisioning capabilities to user groups and be able to define quotas. The automated provisioning tool will manage the virtual machines through their lifecycles including teardowns. It will a llows self service provisioning of virtual servers using a website and a central library of templates. The administrator defines what templates are available to the user.
  49. The forthcoming Windows Server Virtualisation will aim to build on the functionality of Virtual Server 2005. Key improvements will include: Support for 64bit OS’s Virtual SMP for guests Hot add of memory Hot add of processors Hot add of storage Hot add of networking Transition from web-based management to a MMC snap-in.
  50. Xen is an open-source hypervisor solution released under the GNU licensing scheme. It is a solution that installs on bare metal and so requires no host operating system. Several products have started appearing on the market based on the Xen paravirtualisation code and many vendors are including Xen in their OS offerings including Novell, Red Hat and Solaris. The forthcoming Windows Server Virtualisation will share the same core architectural design as Xen.
  51. XenSource offers a solution based on the Xen paravirtualisation approach. Whereas with hardware emulation based products, such as VMware, each virtual machine is presented with an emulated hardware layer that offers the guest operating system the illusion of a standard server with well-known hardware devices, in XenSource products, guests interface with the hypervisor via an efficient, low-level API, known as the hypercall API, rather than through hardware emulation. This allows the hypervisor and operating system to co-operate to optimally virtualize the underlying hardware and schedule guest CPU and I/O, resulting in tremendous performance, security and portability advantages.
  52. XenSource offer a range of products aimed at different levels of usage. XenSource does not offer support for older versions of Windows, such as NT 4. Live Migration and Shared Storage support is promised for mid-2007.
  53. The Xen open source hypervisor provides the foundation for Virtual Iron. It leverages the hardware-assisted virtualization capabilities built into the latest micro-processors to create an abstraction layer between physical hardware and virtual resources. Virtual Iron supports 32-bit Windows and 32 and 64-bit Linux operating systems, up to 8 CPUs per guest operating system, 32 CPUs per physical server, 96 GB memory, and multiple network and storage adaptors.
  54. Virtual Iron’s Virtualization Manager provides a central place to control and automate virtual resources. It is a Java application with a client-server architecture and a high performance distributed object oriented database. The user interface uses a transactional job-based model to provide fault tolerant workflows with rollback. The While the hypervisor and service partition components of Virtual Iron are covered under the GNU public license, the Virtualisation Manager is the commercial property of Virtual Iron and provides much of the advanced features of the product.
  55. Virtualization Manager’s built-in policy engine and event monitor allow users to customize the environment to optimize application performance, ensure availability, and simplify resource management. A remote virtual desktop provides graphical console, keyboard and mouse without client or server-side additions. Virtualization Manager provides the following capabilities: Physical infrastructure: Physical hardware discovery, bare metal provisioning, configuration, control, and monitoring Virtual Infrastructure: Virtual environment creation and hierarchy, visual status dashboards, access controls Virtual Servers: Create, Manage, Stop, Start, Migrate, LiveMigrate Policy-based Automation: LiveCapacity, LiveRecovery, LiveMaintenance, Rules Engine, Statistics, Event Monitor, Custom policies Reports: Resource utilization, System events
  56. LiveMigration – moves a running virtual server from one physical server without pausing or impacting running applications. LiveCapacity – monitors virtual server CPU utilisation or other application needs to determine when a workload needs additional capacity. When a user-defined threshold is met, the virtual server is LiveMigrated to a physical server that has the necessary resources. LiveRecovery – monitors the status of physical resources and moves virtual servers to maintain uptime in the event of a hardware failure. LiveMaintenance – moves virtual servers to alternative locations without downtime when a physical server is taken offline for maintenance.
  57. The Virtual Iron Platform requires a set of x86 servers linked via a standard Ethernet network.Virtualization Manager is installed on one server that is networked to the other servers. Operating system images, including installed enterprise applications, are stored in a network accessible location using NAS or SAN to be deployed on virtual servers. Alternatively, deployment applications can be used to install an operating system directly onto a virtual server. The Virtual Iron Virtualization Manager automatically inventories the physical infrastructure and presents it through the management user interface.When an administrator creates and configures virtual servers, the Virtualization Manager reserves the physical resources, configures the virtual server resources, deploys the operating system, and starts the virtual server.
  58. Again, as with XenSource. Older versions of the Windows operating system are not supported by Virtual Iron. Virtual Iron is only supported on systems with the newer range of Intel and AMD processors that include virtualisation extensions.
  59. Virtuozzo is an operating system level server virtualization solution. Virtuozzo creates isolated partitions or virtual environments (VEs) on a single physical server and OS instance to utilize hardware, software, data center and management efforts with maximum efficiency. The Virtuozzo low-overhead, efficient architecture maximizes server resources. Virtuozzo adds a portable layer to existing operating systems which adds a dynamic partition or Virtual Environment (VE) that resides on a common OS. The single thin Virtuozzo layer introduces only a small percentage of overhead and allows up to 100s of VEs to run on a physical server.
  60. Parallels Workstation is the first desktop virtualization solution to include a lightweight hypervisor that directly controls some of the host computer’s hardware resources. It has strong OS support for guest virtual machines, including: The entire Windows family - 3.1, 3.11, 95, 98, Me, 2000, XP and 2003 Linux distributions from popular distributors like Red Hat, SuSE, Mandriva, Debian and Fedora Core FreeBSD “ Legacy” operating systems like OS/2, eComStation and MS-DOS. Parallels Workstation also supports next-generation CPUs built on Intel’s VT architecture, and will support AMD Pacifica architecture when it is released to the general public.
  61. The HP Virtual Server Environment encompasses a number of fully integrated, complementary components that enhance the functionality and flexibility of a server environment. Control starts with HP Systems Insight Manager (SIM), a unified infrastructure management platform that provides common fault, configuration, performance, and asset management across all HP Integrity, HP 9000, and HP ProLiant servers and HP StorageWorks storage. The VSE management tools plug into SIM for a central point of administration for consistency and enhanced efficiency. Next is ongoing management and configuration. P Integrity Essentials Virtualization Manager is the first comprehensive, easy-to-use virtualization management tool. It allows you to instantly see the relationship between physical and virtual resources and easily perform configuration management tasks for all your VSE resources. Finally, server resources can be directed to the highest business priorities via intelligent policy engines that monitor service levels in real time and automatically adjust server resource allocation when needed. To help increase flexibility and systems administration efficiency, the HP VSE supports all operating systems that run on the HP Integrity server platform: HP-UX 11i, Microsoft® Windows® Server 2003, Linux, and OpenVMS. To allow you to choose the operating system that best meets your business needs, many of the components of the HP VSE, such as HP Systems Insight Manager and HP Integrity Virtual Machines, were designed specifically for a multi-OS environment.
  62. Often, the most time consuming and difficult aspect of a server consolidation project will be the process of converting physical servers into virtual machines, often referred to as P2V. There are several commercial products available that can be used to accomplish this task. Converting servers can, in some cases, be performed while the server is “live” but will often require that applications are quiesced in order to maintain data consistency. Often, it is better to perform “cold” conversions. Some operating systems, moreover, will not support live transfers of data. The P2V process will usually consist of the following steps: Analysis of the source server to determine memory requirements, data capacities, etc. Creation of a target virtual machine Transfer of data from physical source to virtual target Transformation of the virtual machine to replace drivers, disable unwanted services, reset IP addresses, etc.
  63. VMware Converter is managed through a simple, task based user interface that enables users to convert VMware virtual machines or third-party virtual machines and disk image formats to VMware virtual machines in three easy steps: • Step 1: Specify the source physical server, virtual machine or third-party format to convert. • Step 2: Specify the destination format, virtual machine name, and location for the new virtual machine to be created. • Step 3: Create/Convert to destination virtual machine and configure it. VMware Converter achieves faster speed of conversions through the use of sector based copying ( vs file level copying in other products). VMware Converter first takes a snapshot of the source machine before migrating the data, resulting in fewer failed conversions and no downtime on the source server. VMware Converter communicates directly with the guest OS running on the source physical machine for hot cloning these machines without any downtime and as such has no direct hardware level dependencies.
  64. Platespin PowerConvert is marketed as an “Anywhere-to-Anywhere” conversion tool. The range of sources includes physical servers, virtual machines and system images. Targets can be physical servers, virtual machines or system images. So, as well performing traditional P2V-type operations, one can also perform physical-to-physical (P2P) operations for hardware upgrades, physical-to-image (P2I) and virtual-to-image (V2I) for DR purposes, and numerous other types of transformation.
  65. Platespin PowerConvert features a simple drag-and-drop interface that can be used to automatically create conversion jobs, which can then be edited as necessary.
  66. For customers wishing to convert Novell NetWare servers into virtual machines, there are no products that have been expressly designed to perform P2V operations. However, Portlock Storage Manager has been successfully used to copy entire volumes from a physical server to a virtual machine. The virtual machine can then be easily transformed to create a fully functional server.
  67. Before consolidating servers onto a virtualised platform, it is important to gather as much information as possible about the existing environment to assist with sizing and planning. For this reason, several products have been developed which will gather inventory and performance data and use these data to halp with what is known as capacity planning. Commonly, these products will report on which servers are good candidates for virtualisation and which should be excluded from the virtualisation process, and also help you to size the virtualised environment. What-if scenarios can usually be run to examine the effects of using different types of target hardware, or excluding or including different types of servers.
  68. The VMware Capacity Planner Data Collector is installed on a Windows system at the company site and uses WMI and registry calls to gather server information without requiring the use of agents. The VMware Capacity Planner Data Analyzer serves as the core analytical engine that performs all of the analysis required for intelligent capacity planning. The VMware Capacity Planner Dashboard is the front-end, Web-based user interface to the Information Warehouse and Data Analyzer. The Capacity Planner Dashboard delivers all the key capacity planning analysis and decision support to end-users in a secure and organized manner.
  69. In contrast to VMware Capacity Planner, Platespin PowerRecon collects and stores all data onsite and analyses it locally. Again data is gathered without the use of agents. PowerRecon can be used to create and save P2V jobs that can then be used by Platespin PowerConvert.
  70. VMware Lab Manager automates the setup, capture, storage and sharing of multi-machine software configurations. Development and test teams can access them on-demand through a self-service portal. Features include: Automatically and rapidly set up and tear down complex, multi-machine software configurations for use in development and test activities. Give every developer or test engineer the equivalent of their own fully-equipped data center with dedicated provisioning staff. Maintain a comprehensive library of customer and production system environments
  71. With VMware ACE, security administrators package an IT-managed PC within a secured virtual machine and deploy it to an unmanaged physical PC. Features Provision secured, IT-managed endpoints on unmanaged PCs Secure confidential data on endpoint PCs Run multiple secure PC environments on a single PC Dramatically lower the cost of business continuity
  72. Companies can host individual desktops inside virtual machines that are running in their data center. Users access these desktops remotely from a PC or a thin client using a remote display protocol. Since applications are managed centrally at the corporate data center, organizations gain better control over their desktops. Installations, upgrades, patches and backups can be done with more confidence without user intervention.
  73. Policy-Based Virtual Service Life Cycle Management Provisioning of Virtual Servers Disaster Recovery Virtual Servers backup/archiving Data centre daily operations automation Virtualised environments optimisation High availability of Virtual Servers Change management tracking Implement best practices and business policies
  74. Backing up and replicating virtual machines for the purposes of rapid recovery and DR has traditionally been a challenge. Vizioncore have produced two applications that solve these issues by leveraging the VMware software development kit (SDK) which is made public by VMware. esxRanger Professional creates backups of running virtual machines on VMware ESX servers by taking advantage of the ability to take point-in-time snapshots of virtual machines. Backups can occur over a LAN connection or, by leveraging VMware Consolidated Backup techniques, over a high speed SAN connection. esxRanger maintains a catalogue of backup images which can be rotated in the same way as standard backup media. esxReplicator creates replicas of running virtual machines on a secondary VMware ESX platform for the purposes of business continuity and disaster recovery. It uses the same snapshotting technology as used by esxRanger to achieve this.
  75. esXpress and Virtual Solution Box both provide online backups of virtual machines and are implemented as virtual appliances. That is to say, the application is downloaded and installed as a prebuilt, preconfigured virtual machine which is then customised as necessary by the end user.
  76. esxCharter is a Vizioncore product which allows you to view key performance metrics on a VMware ESX platform in an easy to use dashboard presentation. Key features include: Provides top-down multi-level view that easily allows administrators to identify bottlenecks or other problems. Provides both “real-time” and historical monitoring of hosts and virtual machines. Allows shares adjustment for both individual or groups of virtual machines. Offers threshold alerting. Supports VMware Infrastructure 3.
  77. For customers that have already deployed VMware ESX 2.x and wish to upgrade to VMware ESX 3.x, migrating virtual machines to the new platform can be very time consuming and difficult. esxMigrator allows users to perform the migration with the minimum amount of downtime while always maintaining a failback position.
  78. If you haven’t begun consolidating on virtualized servers, now is the time to explore your options. The benefits are proven, and virtualization is seeing exceptionally rapid adoption. Evaluate your applications for potential consolidation. Legacy applications running on older operating systems are a common first target, but virtualization and consolidation are moving rapidly toward the mid-tier and back-end of the datacenter. Understand the differences between various virtualization solutions. Cost, functionality and performance vary considerably and value will differ depending on your IT and business environment. Look closely at the licensing and support policies of your software vendors. Licensing and support policies are in flux with respect to both virtualization and multi-core processors, and both issues can strongly impact the ROI of a consolidation project. Start small. Virtualization and consolidation involve new products, technologies, usage models and IT procedures, so a small pilot deployment is recommended before consolidating on a broad scale.
  79. Work with business units to manage expectations. Business decision-makers may be reluctant to run their applications on shared physical servers until they understand the benefits and safeguards. Beware of “virtual sprawl.” Virtual servers are extremely easy to deploy and provision, but don’t abandon all constraint. Every new virtual server introduces new OS and application instances, which can increase licensing, patching and general management costs. Consider blades as a complementary consolidation strategy. Blade servers help to consolidate and optimize physical infrastructure, while virtualization software optimizes the use of those physical resources. The combination can be especially effective. Integrate server consolidation with a broader consolidation strategy. Consolidation of facilities, storage and data are equally important, and provide a solid foundation for application consolidation on virtual servers. Develop a framework for continuous consolidation: Products and technologies are changing rapidly. Success will require careful planning, a long-term strategy, and an approach that comprehends benefits, risks and costs.