SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Principles of Virtualization
Unit - 8
Practical Implementation of Virtual Machine
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
ā€¢ Create Virtual Machines
ā€¢ Create Hyper-v virtual networking
ā€¢ Use virtual Machine Snapshots
ā€¢ Monitor the performance of a Hyper-v server
ā€¢ Citrix XENDesktop fundamentals
ADAD 2
Create Virtual
Machines
ADAD 3
Introduction ā€“ Virtual Machine
ā€¢ A virtual machine (VM) is an operating system or
application environment that is installed on
software ā€“ which imitates dedicated hardware.
ā€¢ The end user has the same experience on a virtual
machine as they would have on dedicated
hardware.
ā€¢ Specialized software ā€“ called a hypervisor ā€“
emulates the PC client or server's CPU,
memory, hard disk, network and other hardware
resources completely, enabling virtual machines to
share the resources.
ADAD 4
Creating Virtual Machines
ā€¢ Thus, a virtual machine is like a physical computer that runs on an
operating system and application.
ā€¢ But instead of physical hardware, it uses virtual hardware
resources.
ā€¢ Every virtual machine has virtual devices such as virtual CPU,
memory, network interface, hard drive and so on, that provides
the same functionality as physical hardware.
ā€¢ These virtual hardware resources are actually mapped to the
physical hardware of the ESXI where the virtual machine is
running.
ā€¢ For example, a virtual machineā€™s virtual RAM is mapped to the
memory address of RAM on the physical host. When you create a
virtual machine in vSphere, a set of files is created. Virtual
machinesā€™ virtual hardware characters are determined by these
files.
ADAD 5
Contdā€¦
Creating Virtual Machines - A virtual machine consists
of several files that are stored on a storage device
ADAD 6
Contdā€¦
Creating Virtual Machines - A virtual machine consists
of several files that are stored on a storage device
ADAD 7
ā€¢ VMX File:
ā€¢ It is the primary file of the virtual machine. All the
configuration information of the virtual machine is
stored in this file. When you create a virtual machine
you will provide some details like virtual machine name,
OS type etc. All these information are stored in this file.
ā€¢ VMDK File:
ā€¢ Virtual disk descriptor will store all the virtual drive
information such as the size of the disk, virtual drive
adapter type and drive sectors. It will provide this
information to the virtual machine and by using this
information the virtual machine will decide where to
write the contents.
Contdā€¦
Creating Virtual Machines - A virtual machine consists
of several files that are stored on a storage device
ADAD 8
ā€¢ NVRAM File:
ā€¢ Like a physical machine, the virtual machine also has
BIOS. This file will store the BIOS information.
ā€¢ Flat. VMDK File:
ā€¢ Whatever stored in the virtual machineā€™s hard disk is
contained in this file. This file is created when a virtual
hard drive is added to the virtual machine. The size of
this file will be equal to the size of the virtual machineā€™s
hard drive size.
Contdā€¦
Creating Virtual Machines
ADAD 9
ā€¢ To create a virtual machine on the ESXi host, log in
to the host using vSphere Client by providing hostā€™s
IP address and login credential.
ā€¢ Launch Create VM Wizard.
ā€¢ In the navigation bar of vSphere Client, click Home and
click the Inventory icon.
ā€¢ Right-click the ESXi host in the inventory and select New
Virtual Machine.
ā€¢ The New virtual Machine wizard will be launched and in
the configuration, there will be two options:
ā€¢ Typical
ā€¢ Custom
Contdā€¦
Creating Virtual Machines
ADAD 10
ā€¢ Choose Typical.
ā€¢ Specify the Virtual Machine Name:
ā€¢ Specify a name for the VM instance in the ā€œName and
Locationā€ section. Virtual machines will be identified
with this name, so give a unique name to each VM.
ā€¢ Choose the Datastore
ā€¢ Here you will specify where you want to store the virtual
machine files. Datastore is the storage available in the
ESXi, for example, hard drive in the ESXi is a datastore.
The vsphere client will display all the datastore available
on the ESXi server. In this example, there is only one
datastore available. Name of the datastore is datastore1.
Contdā€¦
Creating Virtual Machines
ADAD 11
ā€¢ After choosing the guest OS, select the version of
the guest OS. For example, if you want to install
Windows XP choose Microsoft Windows as the
guest OS and Windows XP as the version.
ā€¢ In this step, we are only choosing the guest OS
which we are going to install. It will not install guest
OS. We have to do it after creating the VM.
ā€¢ Create a Disk for VM
ā€¢ In this step, we have to specify the size of virtual
machineā€™s virtual disk size.
Contdā€¦
Creating Virtual Machines
ADAD 12
ā€¢ Create a Disk for VM
ā€¢ In this step, we have to specify the size of virtual machineā€™s
virtual disk size.
ā€¢ When creating a virtual disk, these virtual disk types are
available.
ā€¢ Thick Provision Lazy Zeroed
ā€¢ In this type, the space required for the virtual disk is allocated
when the virtual disk is created. For example, if the virtual
disk size is 20GB, it is immediately allocated from the physical
disk. But the old contents of the disk are not erased.
Whenever the virtual machine wants to write something, it is
immediately written to the disk so this type of disk provides
better performance.
Contdā€¦
Creating Virtual Machines
ADAD 13
ā€¢ Thick Provision Eager Zeroed
ā€¢ In this type, the space required for the virtual disk is allocated
when the virtual disk is created. In contrast to the lazy zero
format, the data remaining on the physical device is erased
and filed with zero when the virtual disk is created.
Whenever the virtual machine wants to write something, it is
immediately written to the disk so this type of disk provides
better performance.
ā€¢ Thin Provision
ā€¢ Use this format to save storage space. When vSphere creates
a thin provisioned disk, it only writes a small amount of
metadata to the datastore. It does not allocate or zero out of
any disk space.
Contdā€¦
Creating Virtual Machines
ADAD 14
ā€¢ VM ā€“ Ready to Install
ā€¢ The wizard will display the summary of the options that you have
selected in the previous step in the ā€œReady to Completeā€ section.
ā€¢ This is an example for VM creation using typical
configuration.
ā€¢ In the custom configuration, it will ask for the following
additional information like a number of CPU and CPU cores
Memory size and SCSI controller type.
ā€¢ In both typical and custom configuration, you can change
the value of these settings, after the virtual machine is
created.
ā€¢ We have created the virtual machine successfully but we
have not installed the guest OS. Attach the guest OS source
image to the VM and install the OS.
Hyper-V Role
ADAD 15
Hyper-V Role
ā€¢ Hyper V is the type 1 hypervisor from Microsoft ā€“
hyper V role enables us to create a virtualized
server environment in your windows server, where
you can create and manage multiple virtual
machines.
ā€¢ If you install this hyper V role in your windows
server, you will get hyper V manager in the start
menu, using this hyper V manager you can install a
virtual machine and manage the virtual
environment.
ADAD 16
Contdā€¦
Hyper-V Role
1. Server Manager Dashboard:
ā€¢ To install hyper V role on the Windows server, open the
Server Manager.
ā€¢ Click Add roles and features on the server manager
wizard.
2. Installation Type:
ā€¢ There are two options available ā€œRole-based or feature-
based installationā€, or ā€œRemote Desktop Services
Installationā€.
ā€¢ Choose the Role-based or feature-based installation.
ADAD 17
Contdā€¦
Hyper-V Role
3. Select the Server:
ā€¢ Choose select the server and click Next button.
ā€¢ This option will be useful when you have more than one
Windows server in your environment, you can also install roles
and features from the local server to a remote server.
4. Select Hyper V role:
ā€¢ Choose Hyper V role and click Next button.
ā€¢ Click add features for additional features required for
the hyper V role.
ā€¢ Next, it will display the introduction about the hyper V
role, click next.
ADAD 18
Contdā€¦
Hyper-V Role
5. Virtual Switches:
ā€¢ Select the network adapter to be used by the virtual switches
that are required for virtual machine communication.
6. Default Stores:
ā€¢ Select the default location to store the virtual hard disk files
and location to store the virtual machine configuration files.
7. Conformation:
ā€¢ Here you can view the summary of your installation and click
next to continue. Then it will add the Hyper V role in the
windows server.
ā€¢ After the installation completes, restart the server
ADAD 19
Contdā€¦
Hyper-V Role
8. Hyper V Manager:
ā€¢ Once the system reboots, you can view the hyper V
manager in the start menu. Using this hyper V manager,
we can perform all the virtual machine tasks like
creating new VM.
ADAD 20
Manage and Control
Access
ADAD 21
Introduction
ā€¢ Now-a-days all the organizations are moving towards
virtualization because of its advantages. One of the
major advantages of virtualization is snapshot.
ā€¢ For example, if you want to test some software in your
physical machine, you have to setup the hardware,
install OS and run the software. You can go quickly to
any of the previous states by using the snapshot
feature.
ā€¢ A virtual network provides networking for a virtual
machine. The concept of virtual networking is similar to
physical networking. But here we use software switch
and the virtual machineā€™s virtual network adapter will
be connected to this software switch.
ADAD 22
Hyper-V virtual Networking
ā€¢ In the next diagram there are three virtual
machines VM1, VM2, VM3 in the hyper V server
and there are two virtual switches, one is internal
and another is an external switch.
ā€¢ Each virtual machine has one or more virtual
network adapter and these virtual network
adapters are connected to the virtual switch. These
virtual switches provide connectivity to all virtual
machines.
ADAD 23
Contdā€¦
Hyper-V virtual Networking
ADAD 24
Contdā€¦
Hyper-V virtual Networking
ADAD 25
ā€¢ Now all the three virtual machines can
communicate among themselves because they are
all connected to the same switch.
ā€¢ VM1 has two virtual network adapters.
ā€¢ One is connected to the internal switch and
ā€¢ another network adapter is connected to the external
switch.
ā€¢ The external switch is connected to a physical
network adapter which allows the communication
between the physical network and VM1.
Contdā€¦
Hyper-V virtual Networking
ADAD 26
ā€¢ But VM2 and VM3 cannot communicate with the physical network
because they are connected to the internal switch and there is no
physical adapter connected to the external switch.
ā€¢ The physical network adapter is the hyper-V serverā€™s (windows2008
server) physical network adapter.
ā€¢ In case, if the virtual machine needs to communicate with the outside
world, then it should be connected to an external switch which has a
physical network adapter connected to it.
ā€¢ This is the basic idea of virtual networking.
ā€¢ In the physical network, the network adapter is connected to physical
switch ports to enable communication. Similarly, in the virtual machine,
the virtual network adapter is connected to a virtual switch. In a virtual
switch, a port will be created when we connect the two virtual
machines. If we disconnect a virtual machine the port is also deleted
automatically. That is virtual switch ports are added or removed
automatically.
Contdā€¦
Hyper-V virtual Networking
ADAD 27
ā€¢ Hyper-V Virtual Network Types
ā€¢ We can create multiple virtual networks in the hyper-V.
There are three types of virtual network in hyper-V.
ā€¢ External Virtual Network
ā€¢ This type of virtual network allows the communication
of virtual machine with the external world through the
physical network adapter attached to it. So when you
create an external virtual adapter you must associate a
physical network adapter to it.
ā€¢ A physical network adapter can be attached to only one
external virtual network. If you create multiple external
virtual networks you need multiple physical adapters.
Contdā€¦
Hyper-V virtual Networking
ADAD 28
ā€¢ Internal Virtual Network
ā€¢ This type of virtual network allows communication
among the virtual machines running on the same
physical server (host) and also with the host. For
example, in a windows 2008 Hyper V host if you have
created two virtual machines VM1 and VM2. Now if you
connect the VM1 and VM2 to internal network switch
they can communicate with each other and also with
the windows 2008 hyper V host.
ā€¢ Private Virtual Network
ā€¢ This type is similar to the internal virtual network with
the only difference that the host cannot communicate
with the virtual machine.
Contdā€¦
Hyper-V virtual Networking
ADAD 29
ā€¢ Creating hyper-V virtual network
ā€¢ We can create and manage a hyper-V virtual network using
the virtual network manager. Now we will discuss how to
create a hyper V virtual network.
ā€¢ To create a virtual network:
ā€¢ First, launch the hyper V manager. To launch hyper V manager go
to Windows Server 2008 Start menu -> Programs ->
Administrative Tools -> Hyper-V Manager.
ā€¢ In the Hyper-V manager wizard, you can see the Actions panel.
ā€¢ Select Virtual Network Manager in the Actions panel.
ā€¢ Once the virtual network manager is loaded it will show the dialog
box.
ā€¢ Select which type of virtual network you are going to create. For
example, select External and click Add.
Contdā€¦
Hyper-V virtual Networking
ADAD 30
ā€¢ Give a name to this virtual network. You have selected
external, so it has to be bounded to the physical
network adapter.
ā€¢ choose the adapter from the drop down.
ā€¢ Select the adapter which you want to connect to this
virtual network. Then click OK.
ā€¢ Next, it will show a warning window, click Yes to save
changes.
ā€¢ Now we have successfully created the external virtual
network. Similarly, you can create internal and private
virtual network.
Contdā€¦
Hyper-V virtual Networking
ADAD 31
ā€¢ Assigning Virtual Machines to Virtual Networks
ā€¢ If a virtual machine needs to communicate with other
machines it should be connected to the virtual network using
the virtual network adapter.
ā€¢ A virtual machine can have one or more network adapter. But
a virtual network adapter can be connected to only one
virtual network.
ā€¢ If you want to connect your VM to the virtual network, go to
hyper-V manager console and right click your virtual machine
and select settings. Here you can see all the hardware devices
attached to your VM.
ā€¢ Select the network adapter in the right-side pane. You can
associate this to one of the available virtual network using the
drop-down menu under Network.
ā€¢
Virtual Machine
Snapshot
ADAD 32
Virtual Machine Snapshot
ADAD 33
ā€¢ Snapshot is a feature which allows us to preserve or capture the
current state of a virtual machine.
ā€¢ Once the snapshot is taken you can return to that particular
state of the virtual machine at any time.
ā€¢ For example, you can install some software or test some software
on the running VM. But you are not sure whether the virtual
machine will work or not after these operations. Now you can
take a snapshot of the running virtual machine and you can
proceed with the software installation or testing. After
performing these operations, if something is messed up you can
return to the snapshot without any interruption.
ā€¢ In short, snapshot simply captures the state of the virtual machine
at a particular point of time; you can go back to this state at any
time and resume your work. Snapshots are very useful in test and
development environment.
Contdā€¦
Virtual Machine Snapshot
ADAD 34
ā€¢ Creating a Snapshot
ā€¢ It is very simple to create a snapshot in Hyper-V. To create a
snapshot, open the Hyper-V Manager. Right-click the virtual
machine that we want to take the snapshot and select the
Snapshot command in the menu. Then the snapshot will be
created.
ā€¢ What Happened when you create a Snapshot
ā€¢ As discussed in the previous chapter virtual machine is a set
of files. In hyper-V the configuration of the virtual machine is
stored in the.xml file and virtual hard disk contents are stored
in .VHD file. These files contain the operating system, user
data and application data. The processor state is stored in
.VSV file and memory contents are stored in the .bin file.
ā€¢ If you change the configuration of the virtual machine such as
increasing the RAM size or attaching a network adapter, the
configuration file is updated.
Contdā€¦
Virtual Machine Snapshot
ADAD 35
ā€¢ The virtual machineā€™s .VHD file is equivalent to the physical
machineā€™s hard drive. In the physical machine, changes such
as saving some data, running application will be stored on
the hard drive. Similarly, when you are working with the
virtual machine the changes are stored in the .VHD file.
ā€¢ When you take a snapshot of the virtual machine, the
hyper-V pause the virtual machine and create a new
automatic virtual hard disk (AVHD) file. This is called as a
differencing file. A differencing disk stores changes, or
differences, that would otherwise be written to the original
virtual hard disk. As the VM continues to change, the
differencing disk grows in size. The differencing disk is
attached to the virtual machine and the VM is resumed.
Hyper-V also captures the processor state, memory
contents of the VM and creates a new copy of configuration
file. These files are stored in a separate folder.
Contdā€¦
Virtual Machine Snapshot
ADAD 36
ā€¢ The processor and memory states are captured only when
taking the snapshot of a running virtual machine. If you take
the snapshot of powered off machine then hyper-V need
not capture these data.
ā€¢ After taking the snapshot the .VHD is detached from the
virtual machine and the differencing file that is the .AVHD is
attached to the VM. So after taking a snapshot the changes
you are making in the virtual machine such as saving data is
stored in the new .AVHD file. The initial hard drive file that is
the .VHD is not modified. So you can easily go back to the
snapshot state because the contents stored in the .VHD files
are intact.
ā€¢ A new .AVHD file is created and attached to the VM for each
snapshot taken.
Contdā€¦
Virtual Machine Snapshot
ADAD 37
ā€¢ The snapshot cannot be used as a backup because
when you take the snapshot it is not copying the
contents of .VHD into the .AVHD. The new file only
stores the changes made in the operating system,
user data and application data when the VM is
running after taking the snapshot.
ā€¢ In short, when you take a snapshot the active
.AVHD file which is currently attached to the VM is
detached and new .AVHD is attached to the VM.
The old AVHD file will be the parent of new AVHD
file. The new AVHD file updates the changes to the
VM until another snapshot is taken.
Contdā€¦
Virtual Machine Snapshot
ADAD 38
ā€¢ Viewing the Snapshot
ā€¢ After taking the snapshot you can see the virtual machineā€™s
snapshot details under the Snapshots section in the hyper-V
console. The snapshots are stored in parent-child hierarchy
tree structure. In the image, you can notice that under the
snapshot there is a child called ā€˜Nowā€™, which represents the
currently running VM after taking the snapshot.
ā€¢ Whenever you want to make some major changes in VM, you
can take additional snapshots. For example, if you want to
test multiple applications in the same virtual machine, install
the application first, test it and take a snapshot. Then install
the second one and take one more snapshot.
Contdā€¦
Virtual Machine Snapshot
ADAD 39
ā€¢ Reverting to the previous snapshot
ā€¢ After making changes to the VM if something is messed up and you
want to go back to the previous state, you can use the revert
option. Revert option will restore the virtual machine to the state
when the last snapshot was taken.
ā€¢ When you use this revert option the virtual machine is stopped and
the current differencing disk file (.AVHD) is deleted so all the
changes that are done after taking the snapshot will be deleted.
Then the data saved in the snapshot is loaded into the virtual
machine and new AVHD is created. Finally, the VM is restarted and
saved processor state and memory state files (.VSV and .bin) are
also loaded.
ā€¢ If you take the snapshot when the virtual machine is powered off
then the snapshot will not contain the .VSV and .BIN file.
ā€¢ If you revert to that snapshot the virtual machine will be in the
powered off state because the processor and memory status is not
available.
Contdā€¦
Virtual Machine Snapshot
ADAD 40
ā€¢ Apply Option
ā€¢ By using the revert option we can only go back to the last snapshot state. If
there are three snapshots and you want to go back to the first or second
snapshot, then we have to use this Apply option. If you want to use this Apply
option, select the snapshot to which you want to go back then right click it.
ā€¢ Deleting Snapshot
ā€¢ If you do not need any snapshot or snapshot sub tree in the future, you can
delete it. When you delete a single snapshot it will delete the configuration file,
processor state and memory state files associated with that snapshot
immediately. If the AVHD file does not contain any child AVHD then it is also
deleted. That is the AVHD associated with the snapshot should not be a parent
of any AVHD. If it contains only one child, the child AVHD is merged with the
parent AVHD when the virtual machine is powered off.
ā€¢ If it has more than one child then this AVHD is retained until only one remains
and then it is merged with the parent AVHD when the virtual machine is
powered off.
ā€¢ In the same way, you can delete the entire snapshot sub tree.
Contdā€¦
Virtual Machine Snapshot
ADAD 41
ā€¢ Renaming the Snapshot
ā€¢ The snapshots will be listed in the snapshot pane. You
can notice that the snapshot name is the virtual
machine name followed by date and time.
ā€¢ In real time you will have many virtual machines and you
will take many snapshots. By looking at a particular
snapshot time you cannot identify the reason of the
snapshot and what is stored in the snapshot. So for the
easy identification, we can rename the snapshots.
ā€¢ If you want to rename the snapshot select the snapshot,
right-click and select Rename from the menu and give a
new name which specifies the purpose of the snapshot.
Performance of a
Hyper-V Server
ADAD 42
Performance of Hyper V Server
ADAD 43
ā€¢ Monitoring and keeping track of hypervisor performance is
one of the major jobs of the administrator. The
administrator can use the available performance monitoring
tools.
ā€¢ But we have to use the appropriate tools to get the correct
result. For example, we have to inbuilt performance
monitoring tools in the Hyper-V - Task manager and
Performance Monitor.
ā€¢ The Task Manager is a simple tool. It is not virtualization
aware so we cannot view the resource utilization by a virtual
machine against the total system resources. Suppose if we
are using it on the virtual machine we cannot only view the
resource utilization percentage of allocated virtual resources
because the task manager doesnā€™t know that it is a virtual
machine.
Contdā€¦
Performance of Hyper V Server
ADAD 44
ā€¢ The Hyper-V provides a series of unique counters in
the Performance Monitor. Since the hyper-V
provides virtualization specific counters, the
administrators are able to analyse resource
utilization at the host level and virtual machine
levels. For example, the Hyper-V counter called
ā€œHyper-V Hypervisor Logical Processor (_Total)%
Total Run Timeā€ will report the total processor time
spent in running both the host and guest machines.
Contdā€¦
Performance of Hyper V Server
ADAD 45
ā€¢ Things to be monitored on hyper-V
ā€¢ In a hypervisor environment, we need to monitor both the host
resources and the guest resources. Availability of enough host
resources will result in better performance of the virtual machine that
is running on the top of the hypervisor. If there is the contention for
resources all the virtual machines compete for the resources, which
lead to performance degradation. So we need to monitor regularly to
ensure that resources are properly utilized.
ā€¢ We need to monitor the guest machine also. Even if the host has
enough resources without proper allocation of virtual machines will
affect the virtual machine performance.
ā€¢ The important things to be monitored for the smooth running of the
system are overall health of the system, memory utilization and
availability, processor utilization, network bandwidth utilization and
performance and storage performance. All these have to be monitored
for both host and guest.
ā€¢ There are many performance counters available in performance
monitor tool to monitor these resources. We will discuss the major
counters to monitor.
Contdā€¦
Performance of Hyper V Server - The top level performance
counters to monitor are:
ADAD 46
ā€¢ Overall health of Hypervisor and Virtual Machine
ā€¢ To check the overall health there are two counters, the
first one isā€ Hyper-V Virtual Machine Health Summaryā€.
It has only two options, Health Ok and Health critical.
ā€¢ Another counter to check overall health is ā€œHyper-V
Hypervisor. Using this we can identify many things like
how many logical processors are identified by machine,
the number of virtual machines currently running, a
total number of pages and a number of virtual
processors.
Contdā€¦
Performance of Hyper V Server - The top level performance
counters to monitor are:
ADAD 47
ā€¢ Processor:
ā€¢ From the Hyper-V Hypervisor counter we got an idea of
a number of logical processors and number of virtual
processors now we need to monitor the performance of
these processors.
ā€¢ The first counter Hyper-V Hypervisor Logical Processor is
used to monitor how much of the physical processor is
used.
ā€¢ The Hyper-V Hypervisor Root Virtual Processorā€ is used
to monitor how much CPU, the root is using.
ā€¢ The ā€œHyper-V Hypervisor Virtual Processorā€ is used to
monitor how much CPU the guest is using.
Contdā€¦
Performance of Hyper V Server - The top level performance
counters to monitor are:
ADAD 48
ā€¢ Memory
ā€¢ Using the network counters we can monitor the overall performance of the
Network.
ā€¢ The ā€œNetwork Interfaceā€ counter is used to monitor the network performance
of the physical device. Using this we can monitor, Total Bytes/sec, Bit/sec,
offloaded connections, Packet receive errors, packet outbound error.
ā€¢ Next one isā€ Hyper-V Virtual Switchā€. As the name indicates, it is used to
monitor the virtual switch. It is necessary to monitor the virtual switch because
all the virtual machineā€™s traffics are handled by the virtual switch. Suppose if
you have configured internal virtual network the traffic will exist only in the
virtual switch. Using these counter, we can monitor the virtual switchā€™s
Bytes/sec and Packets / sec.
ā€¢ Next counter is ā€œHyper-V Virtual Network Adapterā€. It is used to monitor the
virtual network adapter of a VM. Using this we can identify how traffic is
entering into a particular VM and how much traffic it is generating. We can get
the details of each virtual network adapter by using this and also we can see
which VM is generating more traffic. Using this counter we can monitor
Bytes/sec and Packets / sec details of a virtual network adapter.
Contdā€¦
Performance of Hyper V Server - The top level performance
counters to monitor are:
ADAD 49
ā€¢ Storage:
ā€¢ With the use of the storage counters we can monitor the
overall disk performance of the entire system and disk
performance of each VM.
ā€¢ The counter ā€œPhysical Diskā€ gives an idea about overall
storage performance of the system. Using this we can
monitor Current Disk Queue Length, Disk Bytes/sec, Disk
Transfers / sec. Current Disk Queue Length gives one an
idea of how busy the drives are.
Citrix XenDesktop
Fundamentals
ADAD 50
Citrix XenDesktop Fundamentals
ADAD 51
ā€¢ Citrix XenDesktop is a Desktop Virtualization product
suite from Citrix.
ā€¢ In XenDesktop, the administrator will publish the
desktop and application on the server so multiple users
can access these simultaneously. The application and
desktop will be running in the server not in the client
device so the user can access it from any device.
ā€¢ Using this XenDesktop a user can access their corporate
desktop and application from anywhere and from any
device. So the user can work from anywhere. The end
user device must be installed with Citrix Receiver.
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 52
ā€¢ The published apps and desktops are running in
virtual machines and centrally managed.
ā€¢ XenDesktop allows the employees to securely
access their corporate-issued virtual apps and
desktops from their personal computer or mobile
device. Users are using their own device so the
organization doesnā€™t require providing hardware to
the employees. Hence IT hardware cost is reduced.
The image 5.2.12 below shows the architecture and
the components of Citrix XenDesktop.
Contdā€¦
Citrix XenDesktop Fundamentals ā€“ How Citrix
XenDesktop Works
ADAD 53
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 54
ā€¢ Delivery Controller
ā€¢ Delivery controllerā€™s function is to distribute the hosted
application and desktops to the users.
ā€¢ Virtual Delivery Agent
ā€¢ The virtual delivery agent has to be installed on all the servers
which are hosting the application. It manages the
communication between the application and Citrix receiver. It
is used along with the delivery controller.
ā€¢ Citrix Receiver
ā€¢ Citrix Receiver is installed in the end user devices such as
desktops and laptops.
Citrix Store Front
ā€¢ Citrix Store Front authenticates the users when they access
the published application.
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 55
ā€¢ Citrix Studio
ā€¢ It is a console where the applications are published and
managed.
ā€¢ Citrix Director
ā€¢ It serves as a tool for monitoring and to troubleshoot
the Xen App and Xen Desktop environments.
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 56
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 57
ā€¢ In the Citrix studio, we have to publish our desktop and
application. Once it is published then it will be available
in the store Font. The store font provides self-service
access to the desktop and application because it shows
all the published application and desktops to the users
and it authenticates the users when they access their
published resources. Citrix receiver is installed in the
client devices and it provides access to published
resources from any device. Citrix director is a web
based tool for monitoring and troubleshooting.
ā€¢ Using HDX technology it delivers a high definition
graphical experience to users and the NetScaler
Gateway is responsible for load balancing.
ā€¢
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 58
ā€¢ Deploying App using Citrix XenApp
ā€¢ Before publishing App using XenApp, you need to install
and configure license server, Citrix XenApp server and
Web Interface.
ā€¢ The license server is the major component of the
XenApp.
ā€¢ XenApp is used to install and publish the application. All
the published applications will be available in the Web
Interface.
ā€¢ Here we will only discuss how to publish the application.
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 59
ā€¢ Publishing Applications using XenAppAppCenter
1. Open the Citrix AppCenter console.
2. Expand Citrix Resources >XenApp> [Farm Name].
3. Right-click Applications and select Publish application:
Click Next at the Welcome screen
4. Choose the application type that you are going to publish
then click Next.
5. Browse the application executable location.
6. Select which Servers/Worker Groups will run the application.
7. Select which Users/Groups will be allowed to access the
published application.
8. Configure the location of application shortcuts.
9. Check the Configure advanced application settings now check
box, then click Next.
Contdā€¦
Citrix XenDesktop Fundamentals
ADAD 60
ā€¢ Configure Advanced Application Settings
1. Continuing from the step above, select which
connections you will accept.
2. Associate file types with the application if needed.
3. Check Allow only one instance of the application for
each user, if required. Limit instances allowed to run
in server farm will ensure that youā€™re complying with
license restrictions.
4. Configure Client options.
5. These application appearance settings will only apply
if you are publishing on a Server Desktop.
6. The application will now show in Citrix AppCenter.
Thank You!
ADAD 61

Weitere Ƥhnliche Inhalte

Was ist angesagt?

Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba serverVeeral Bhateja
Ā 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITMd. Abdul Barek
Ā 
HDD Partition
HDD PartitionHDD Partition
HDD PartitionAMZAD KHAN
Ā 
Getting Started With Linux Administration
Getting Started With Linux AdministrationGetting Started With Linux Administration
Getting Started With Linux AdministrationEdureka!
Ā 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory StructureKevin OBrien
Ā 
Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions Ahmed El-Arabawy
Ā 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
Ā 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating Systemsubhsikha
Ā 
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...Linux Training For Beginners | Linux Administration Tutorial | Introduction T...
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...Edureka!
Ā 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
Ā 
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Chinthaka Deshapriya (RHCA)
Ā 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
Ā 
Linux commands
Linux commands Linux commands
Linux commands debashis rout
Ā 
Server Management
Server ManagementServer Management
Server ManagementDell World
Ā 

Was ist angesagt? (20)

Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
Ā 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Ā 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Ā 
HDD Partition
HDD PartitionHDD Partition
HDD Partition
Ā 
An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
Ā 
Windows 2019
Windows 2019Windows 2019
Windows 2019
Ā 
Getting Started With Linux Administration
Getting Started With Linux AdministrationGetting Started With Linux Administration
Getting Started With Linux Administration
Ā 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
Ā 
Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions
Ā 
step by step to install the ubuntu
step by step to install the ubuntustep by step to install the ubuntu
step by step to install the ubuntu
Ā 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
Ā 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
Ā 
Batch FIles
Batch FIlesBatch FIles
Batch FIles
Ā 
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...Linux Training For Beginners | Linux Administration Tutorial | Introduction T...
Linux Training For Beginners | Linux Administration Tutorial | Introduction T...
Ā 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
Ā 
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Ā 
System Administration
System AdministrationSystem Administration
System Administration
Ā 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
Ā 
Linux commands
Linux commands Linux commands
Linux commands
Ā 
Server Management
Server ManagementServer Management
Server Management
Ā 

Ƅhnlich wie Practical Implementation of Virtual Machine

Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual BoxLahiru Danushka
Ā 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Rubal Sagwal
Ā 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Rubal Sagwal
Ā 
Microsoft Windows Server 2012 R2 Hyper V server overview
Microsoft Windows Server 2012 R2 Hyper V server overviewMicrosoft Windows Server 2012 R2 Hyper V server overview
Microsoft Windows Server 2012 R2 Hyper V server overviewaboobakar sanjar
Ā 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare WorkstationHitesh Gupta
Ā 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesRubal Sagwal
Ā 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1Davide Pelosi
Ā 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationMuhammadRizkyFaza
Ā 
Azure Virtual Machines cloud computing in btech cse
Azure Virtual Machines cloud computing in btech cseAzure Virtual Machines cloud computing in btech cse
Azure Virtual Machines cloud computing in btech csemdanasiul
Ā 
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2John Heaton
Ā 
running windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorialrunning windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorialę·ę© č””
Ā 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper vHameda Hurmat
Ā 
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"Lagendary Sheeva
Ā 
WindowsAzureSDK1.7
WindowsAzureSDK1.7WindowsAzureSDK1.7
WindowsAzureSDK1.7Saravanan G
Ā 
WindowsAzureIAAS
WindowsAzureIAASWindowsAzureIAAS
WindowsAzureIAASSaravanan G
Ā 
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13gameaxt
Ā 
module 13 implementing server virtualization with hyper-v.pptx
module 13 implementing server virtualization with hyper-v.pptxmodule 13 implementing server virtualization with hyper-v.pptx
module 13 implementing server virtualization with hyper-v.pptxshnider101
Ā 
websphere commerce server admin configuration
websphere commerce server admin configuration websphere commerce server admin configuration
websphere commerce server admin configuration Laxmi Kanth Kshatriya
Ā 
Native VHD Boot: A Walkthrough of Common Scenarios
Native VHD Boot: A Walkthrough of Common ScenariosNative VHD Boot: A Walkthrough of Common Scenarios
Native VHD Boot: A Walkthrough of Common Scenariosdegarden
Ā 
vmware interview Q and a
vmware interview Q and avmware interview Q and a
vmware interview Q and arajasekar1712
Ā 

Ƅhnlich wie Practical Implementation of Virtual Machine (20)

Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
Ā 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Ā 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
Ā 
Microsoft Windows Server 2012 R2 Hyper V server overview
Microsoft Windows Server 2012 R2 Hyper V server overviewMicrosoft Windows Server 2012 R2 Hyper V server overview
Microsoft Windows Server 2012 R2 Hyper V server overview
Ā 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
Ā 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Ā 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1
Ā 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Ā 
Azure Virtual Machines cloud computing in btech cse
Azure Virtual Machines cloud computing in btech cseAzure Virtual Machines cloud computing in btech cse
Azure Virtual Machines cloud computing in btech cse
Ā 
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2
Virtualization VM VirtualBox + Oracle Enterprise Linux With Oracle 11GR2
Ā 
running windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorialrunning windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorial
Ā 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
Ā 
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Ā 
WindowsAzureSDK1.7
WindowsAzureSDK1.7WindowsAzureSDK1.7
WindowsAzureSDK1.7
Ā 
WindowsAzureIAAS
WindowsAzureIAASWindowsAzureIAAS
WindowsAzureIAAS
Ā 
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13
Ā 
module 13 implementing server virtualization with hyper-v.pptx
module 13 implementing server virtualization with hyper-v.pptxmodule 13 implementing server virtualization with hyper-v.pptx
module 13 implementing server virtualization with hyper-v.pptx
Ā 
websphere commerce server admin configuration
websphere commerce server admin configuration websphere commerce server admin configuration
websphere commerce server admin configuration
Ā 
Native VHD Boot: A Walkthrough of Common Scenarios
Native VHD Boot: A Walkthrough of Common ScenariosNative VHD Boot: A Walkthrough of Common Scenarios
Native VHD Boot: A Walkthrough of Common Scenarios
Ā 
vmware interview Q and a
vmware interview Q and avmware interview Q and a
vmware interview Q and a
Ā 

Mehr von Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityRubal Sagwal
Ā 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
Ā 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
Ā 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSRubal Sagwal
Ā 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Rubal Sagwal
Ā 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureRubal Sagwal
Ā 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applicationsRubal Sagwal
Ā 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
Ā 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Rubal Sagwal
Ā 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualizationRubal Sagwal
Ā 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
Ā 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
Ā 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerRubal Sagwal
Ā 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
Ā 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Rubal Sagwal
Ā 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
Ā 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
Ā 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission MediaRubal Sagwal
Ā 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
Ā 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social NetworkRubal Sagwal
Ā 

Mehr von Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Ā 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Ā 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
Ā 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
Ā 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
Ā 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Ā 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
Ā 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Ā 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
Ā 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
Ā 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Ā 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Ā 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
Ā 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Ā 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Ā 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Ā 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
Ā 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission Media
Ā 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Ā 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social Network
Ā 

KĆ¼rzlich hochgeladen

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
Ā 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĆŗjo
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
Ā 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
Ā 
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
Ā 

KĆ¼rzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Ā 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Ā 
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Ā 

Practical Implementation of Virtual Machine

  • 1. Principles of Virtualization Unit - 8 Practical Implementation of Virtual Machine Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents ā€¢ Create Virtual Machines ā€¢ Create Hyper-v virtual networking ā€¢ Use virtual Machine Snapshots ā€¢ Monitor the performance of a Hyper-v server ā€¢ Citrix XENDesktop fundamentals ADAD 2
  • 4. Introduction ā€“ Virtual Machine ā€¢ A virtual machine (VM) is an operating system or application environment that is installed on software ā€“ which imitates dedicated hardware. ā€¢ The end user has the same experience on a virtual machine as they would have on dedicated hardware. ā€¢ Specialized software ā€“ called a hypervisor ā€“ emulates the PC client or server's CPU, memory, hard disk, network and other hardware resources completely, enabling virtual machines to share the resources. ADAD 4
  • 5. Creating Virtual Machines ā€¢ Thus, a virtual machine is like a physical computer that runs on an operating system and application. ā€¢ But instead of physical hardware, it uses virtual hardware resources. ā€¢ Every virtual machine has virtual devices such as virtual CPU, memory, network interface, hard drive and so on, that provides the same functionality as physical hardware. ā€¢ These virtual hardware resources are actually mapped to the physical hardware of the ESXI where the virtual machine is running. ā€¢ For example, a virtual machineā€™s virtual RAM is mapped to the memory address of RAM on the physical host. When you create a virtual machine in vSphere, a set of files is created. Virtual machinesā€™ virtual hardware characters are determined by these files. ADAD 5
  • 6. Contdā€¦ Creating Virtual Machines - A virtual machine consists of several files that are stored on a storage device ADAD 6
  • 7. Contdā€¦ Creating Virtual Machines - A virtual machine consists of several files that are stored on a storage device ADAD 7 ā€¢ VMX File: ā€¢ It is the primary file of the virtual machine. All the configuration information of the virtual machine is stored in this file. When you create a virtual machine you will provide some details like virtual machine name, OS type etc. All these information are stored in this file. ā€¢ VMDK File: ā€¢ Virtual disk descriptor will store all the virtual drive information such as the size of the disk, virtual drive adapter type and drive sectors. It will provide this information to the virtual machine and by using this information the virtual machine will decide where to write the contents.
  • 8. Contdā€¦ Creating Virtual Machines - A virtual machine consists of several files that are stored on a storage device ADAD 8 ā€¢ NVRAM File: ā€¢ Like a physical machine, the virtual machine also has BIOS. This file will store the BIOS information. ā€¢ Flat. VMDK File: ā€¢ Whatever stored in the virtual machineā€™s hard disk is contained in this file. This file is created when a virtual hard drive is added to the virtual machine. The size of this file will be equal to the size of the virtual machineā€™s hard drive size.
  • 9. Contdā€¦ Creating Virtual Machines ADAD 9 ā€¢ To create a virtual machine on the ESXi host, log in to the host using vSphere Client by providing hostā€™s IP address and login credential. ā€¢ Launch Create VM Wizard. ā€¢ In the navigation bar of vSphere Client, click Home and click the Inventory icon. ā€¢ Right-click the ESXi host in the inventory and select New Virtual Machine. ā€¢ The New virtual Machine wizard will be launched and in the configuration, there will be two options: ā€¢ Typical ā€¢ Custom
  • 10. Contdā€¦ Creating Virtual Machines ADAD 10 ā€¢ Choose Typical. ā€¢ Specify the Virtual Machine Name: ā€¢ Specify a name for the VM instance in the ā€œName and Locationā€ section. Virtual machines will be identified with this name, so give a unique name to each VM. ā€¢ Choose the Datastore ā€¢ Here you will specify where you want to store the virtual machine files. Datastore is the storage available in the ESXi, for example, hard drive in the ESXi is a datastore. The vsphere client will display all the datastore available on the ESXi server. In this example, there is only one datastore available. Name of the datastore is datastore1.
  • 11. Contdā€¦ Creating Virtual Machines ADAD 11 ā€¢ After choosing the guest OS, select the version of the guest OS. For example, if you want to install Windows XP choose Microsoft Windows as the guest OS and Windows XP as the version. ā€¢ In this step, we are only choosing the guest OS which we are going to install. It will not install guest OS. We have to do it after creating the VM. ā€¢ Create a Disk for VM ā€¢ In this step, we have to specify the size of virtual machineā€™s virtual disk size.
  • 12. Contdā€¦ Creating Virtual Machines ADAD 12 ā€¢ Create a Disk for VM ā€¢ In this step, we have to specify the size of virtual machineā€™s virtual disk size. ā€¢ When creating a virtual disk, these virtual disk types are available. ā€¢ Thick Provision Lazy Zeroed ā€¢ In this type, the space required for the virtual disk is allocated when the virtual disk is created. For example, if the virtual disk size is 20GB, it is immediately allocated from the physical disk. But the old contents of the disk are not erased. Whenever the virtual machine wants to write something, it is immediately written to the disk so this type of disk provides better performance.
  • 13. Contdā€¦ Creating Virtual Machines ADAD 13 ā€¢ Thick Provision Eager Zeroed ā€¢ In this type, the space required for the virtual disk is allocated when the virtual disk is created. In contrast to the lazy zero format, the data remaining on the physical device is erased and filed with zero when the virtual disk is created. Whenever the virtual machine wants to write something, it is immediately written to the disk so this type of disk provides better performance. ā€¢ Thin Provision ā€¢ Use this format to save storage space. When vSphere creates a thin provisioned disk, it only writes a small amount of metadata to the datastore. It does not allocate or zero out of any disk space.
  • 14. Contdā€¦ Creating Virtual Machines ADAD 14 ā€¢ VM ā€“ Ready to Install ā€¢ The wizard will display the summary of the options that you have selected in the previous step in the ā€œReady to Completeā€ section. ā€¢ This is an example for VM creation using typical configuration. ā€¢ In the custom configuration, it will ask for the following additional information like a number of CPU and CPU cores Memory size and SCSI controller type. ā€¢ In both typical and custom configuration, you can change the value of these settings, after the virtual machine is created. ā€¢ We have created the virtual machine successfully but we have not installed the guest OS. Attach the guest OS source image to the VM and install the OS.
  • 16. Hyper-V Role ā€¢ Hyper V is the type 1 hypervisor from Microsoft ā€“ hyper V role enables us to create a virtualized server environment in your windows server, where you can create and manage multiple virtual machines. ā€¢ If you install this hyper V role in your windows server, you will get hyper V manager in the start menu, using this hyper V manager you can install a virtual machine and manage the virtual environment. ADAD 16
  • 17. Contdā€¦ Hyper-V Role 1. Server Manager Dashboard: ā€¢ To install hyper V role on the Windows server, open the Server Manager. ā€¢ Click Add roles and features on the server manager wizard. 2. Installation Type: ā€¢ There are two options available ā€œRole-based or feature- based installationā€, or ā€œRemote Desktop Services Installationā€. ā€¢ Choose the Role-based or feature-based installation. ADAD 17
  • 18. Contdā€¦ Hyper-V Role 3. Select the Server: ā€¢ Choose select the server and click Next button. ā€¢ This option will be useful when you have more than one Windows server in your environment, you can also install roles and features from the local server to a remote server. 4. Select Hyper V role: ā€¢ Choose Hyper V role and click Next button. ā€¢ Click add features for additional features required for the hyper V role. ā€¢ Next, it will display the introduction about the hyper V role, click next. ADAD 18
  • 19. Contdā€¦ Hyper-V Role 5. Virtual Switches: ā€¢ Select the network adapter to be used by the virtual switches that are required for virtual machine communication. 6. Default Stores: ā€¢ Select the default location to store the virtual hard disk files and location to store the virtual machine configuration files. 7. Conformation: ā€¢ Here you can view the summary of your installation and click next to continue. Then it will add the Hyper V role in the windows server. ā€¢ After the installation completes, restart the server ADAD 19
  • 20. Contdā€¦ Hyper-V Role 8. Hyper V Manager: ā€¢ Once the system reboots, you can view the hyper V manager in the start menu. Using this hyper V manager, we can perform all the virtual machine tasks like creating new VM. ADAD 20
  • 22. Introduction ā€¢ Now-a-days all the organizations are moving towards virtualization because of its advantages. One of the major advantages of virtualization is snapshot. ā€¢ For example, if you want to test some software in your physical machine, you have to setup the hardware, install OS and run the software. You can go quickly to any of the previous states by using the snapshot feature. ā€¢ A virtual network provides networking for a virtual machine. The concept of virtual networking is similar to physical networking. But here we use software switch and the virtual machineā€™s virtual network adapter will be connected to this software switch. ADAD 22
  • 23. Hyper-V virtual Networking ā€¢ In the next diagram there are three virtual machines VM1, VM2, VM3 in the hyper V server and there are two virtual switches, one is internal and another is an external switch. ā€¢ Each virtual machine has one or more virtual network adapter and these virtual network adapters are connected to the virtual switch. These virtual switches provide connectivity to all virtual machines. ADAD 23
  • 25. Contdā€¦ Hyper-V virtual Networking ADAD 25 ā€¢ Now all the three virtual machines can communicate among themselves because they are all connected to the same switch. ā€¢ VM1 has two virtual network adapters. ā€¢ One is connected to the internal switch and ā€¢ another network adapter is connected to the external switch. ā€¢ The external switch is connected to a physical network adapter which allows the communication between the physical network and VM1.
  • 26. Contdā€¦ Hyper-V virtual Networking ADAD 26 ā€¢ But VM2 and VM3 cannot communicate with the physical network because they are connected to the internal switch and there is no physical adapter connected to the external switch. ā€¢ The physical network adapter is the hyper-V serverā€™s (windows2008 server) physical network adapter. ā€¢ In case, if the virtual machine needs to communicate with the outside world, then it should be connected to an external switch which has a physical network adapter connected to it. ā€¢ This is the basic idea of virtual networking. ā€¢ In the physical network, the network adapter is connected to physical switch ports to enable communication. Similarly, in the virtual machine, the virtual network adapter is connected to a virtual switch. In a virtual switch, a port will be created when we connect the two virtual machines. If we disconnect a virtual machine the port is also deleted automatically. That is virtual switch ports are added or removed automatically.
  • 27. Contdā€¦ Hyper-V virtual Networking ADAD 27 ā€¢ Hyper-V Virtual Network Types ā€¢ We can create multiple virtual networks in the hyper-V. There are three types of virtual network in hyper-V. ā€¢ External Virtual Network ā€¢ This type of virtual network allows the communication of virtual machine with the external world through the physical network adapter attached to it. So when you create an external virtual adapter you must associate a physical network adapter to it. ā€¢ A physical network adapter can be attached to only one external virtual network. If you create multiple external virtual networks you need multiple physical adapters.
  • 28. Contdā€¦ Hyper-V virtual Networking ADAD 28 ā€¢ Internal Virtual Network ā€¢ This type of virtual network allows communication among the virtual machines running on the same physical server (host) and also with the host. For example, in a windows 2008 Hyper V host if you have created two virtual machines VM1 and VM2. Now if you connect the VM1 and VM2 to internal network switch they can communicate with each other and also with the windows 2008 hyper V host. ā€¢ Private Virtual Network ā€¢ This type is similar to the internal virtual network with the only difference that the host cannot communicate with the virtual machine.
  • 29. Contdā€¦ Hyper-V virtual Networking ADAD 29 ā€¢ Creating hyper-V virtual network ā€¢ We can create and manage a hyper-V virtual network using the virtual network manager. Now we will discuss how to create a hyper V virtual network. ā€¢ To create a virtual network: ā€¢ First, launch the hyper V manager. To launch hyper V manager go to Windows Server 2008 Start menu -> Programs -> Administrative Tools -> Hyper-V Manager. ā€¢ In the Hyper-V manager wizard, you can see the Actions panel. ā€¢ Select Virtual Network Manager in the Actions panel. ā€¢ Once the virtual network manager is loaded it will show the dialog box. ā€¢ Select which type of virtual network you are going to create. For example, select External and click Add.
  • 30. Contdā€¦ Hyper-V virtual Networking ADAD 30 ā€¢ Give a name to this virtual network. You have selected external, so it has to be bounded to the physical network adapter. ā€¢ choose the adapter from the drop down. ā€¢ Select the adapter which you want to connect to this virtual network. Then click OK. ā€¢ Next, it will show a warning window, click Yes to save changes. ā€¢ Now we have successfully created the external virtual network. Similarly, you can create internal and private virtual network.
  • 31. Contdā€¦ Hyper-V virtual Networking ADAD 31 ā€¢ Assigning Virtual Machines to Virtual Networks ā€¢ If a virtual machine needs to communicate with other machines it should be connected to the virtual network using the virtual network adapter. ā€¢ A virtual machine can have one or more network adapter. But a virtual network adapter can be connected to only one virtual network. ā€¢ If you want to connect your VM to the virtual network, go to hyper-V manager console and right click your virtual machine and select settings. Here you can see all the hardware devices attached to your VM. ā€¢ Select the network adapter in the right-side pane. You can associate this to one of the available virtual network using the drop-down menu under Network. ā€¢
  • 33. Virtual Machine Snapshot ADAD 33 ā€¢ Snapshot is a feature which allows us to preserve or capture the current state of a virtual machine. ā€¢ Once the snapshot is taken you can return to that particular state of the virtual machine at any time. ā€¢ For example, you can install some software or test some software on the running VM. But you are not sure whether the virtual machine will work or not after these operations. Now you can take a snapshot of the running virtual machine and you can proceed with the software installation or testing. After performing these operations, if something is messed up you can return to the snapshot without any interruption. ā€¢ In short, snapshot simply captures the state of the virtual machine at a particular point of time; you can go back to this state at any time and resume your work. Snapshots are very useful in test and development environment.
  • 34. Contdā€¦ Virtual Machine Snapshot ADAD 34 ā€¢ Creating a Snapshot ā€¢ It is very simple to create a snapshot in Hyper-V. To create a snapshot, open the Hyper-V Manager. Right-click the virtual machine that we want to take the snapshot and select the Snapshot command in the menu. Then the snapshot will be created. ā€¢ What Happened when you create a Snapshot ā€¢ As discussed in the previous chapter virtual machine is a set of files. In hyper-V the configuration of the virtual machine is stored in the.xml file and virtual hard disk contents are stored in .VHD file. These files contain the operating system, user data and application data. The processor state is stored in .VSV file and memory contents are stored in the .bin file. ā€¢ If you change the configuration of the virtual machine such as increasing the RAM size or attaching a network adapter, the configuration file is updated.
  • 35. Contdā€¦ Virtual Machine Snapshot ADAD 35 ā€¢ The virtual machineā€™s .VHD file is equivalent to the physical machineā€™s hard drive. In the physical machine, changes such as saving some data, running application will be stored on the hard drive. Similarly, when you are working with the virtual machine the changes are stored in the .VHD file. ā€¢ When you take a snapshot of the virtual machine, the hyper-V pause the virtual machine and create a new automatic virtual hard disk (AVHD) file. This is called as a differencing file. A differencing disk stores changes, or differences, that would otherwise be written to the original virtual hard disk. As the VM continues to change, the differencing disk grows in size. The differencing disk is attached to the virtual machine and the VM is resumed. Hyper-V also captures the processor state, memory contents of the VM and creates a new copy of configuration file. These files are stored in a separate folder.
  • 36. Contdā€¦ Virtual Machine Snapshot ADAD 36 ā€¢ The processor and memory states are captured only when taking the snapshot of a running virtual machine. If you take the snapshot of powered off machine then hyper-V need not capture these data. ā€¢ After taking the snapshot the .VHD is detached from the virtual machine and the differencing file that is the .AVHD is attached to the VM. So after taking a snapshot the changes you are making in the virtual machine such as saving data is stored in the new .AVHD file. The initial hard drive file that is the .VHD is not modified. So you can easily go back to the snapshot state because the contents stored in the .VHD files are intact. ā€¢ A new .AVHD file is created and attached to the VM for each snapshot taken.
  • 37. Contdā€¦ Virtual Machine Snapshot ADAD 37 ā€¢ The snapshot cannot be used as a backup because when you take the snapshot it is not copying the contents of .VHD into the .AVHD. The new file only stores the changes made in the operating system, user data and application data when the VM is running after taking the snapshot. ā€¢ In short, when you take a snapshot the active .AVHD file which is currently attached to the VM is detached and new .AVHD is attached to the VM. The old AVHD file will be the parent of new AVHD file. The new AVHD file updates the changes to the VM until another snapshot is taken.
  • 38. Contdā€¦ Virtual Machine Snapshot ADAD 38 ā€¢ Viewing the Snapshot ā€¢ After taking the snapshot you can see the virtual machineā€™s snapshot details under the Snapshots section in the hyper-V console. The snapshots are stored in parent-child hierarchy tree structure. In the image, you can notice that under the snapshot there is a child called ā€˜Nowā€™, which represents the currently running VM after taking the snapshot. ā€¢ Whenever you want to make some major changes in VM, you can take additional snapshots. For example, if you want to test multiple applications in the same virtual machine, install the application first, test it and take a snapshot. Then install the second one and take one more snapshot.
  • 39. Contdā€¦ Virtual Machine Snapshot ADAD 39 ā€¢ Reverting to the previous snapshot ā€¢ After making changes to the VM if something is messed up and you want to go back to the previous state, you can use the revert option. Revert option will restore the virtual machine to the state when the last snapshot was taken. ā€¢ When you use this revert option the virtual machine is stopped and the current differencing disk file (.AVHD) is deleted so all the changes that are done after taking the snapshot will be deleted. Then the data saved in the snapshot is loaded into the virtual machine and new AVHD is created. Finally, the VM is restarted and saved processor state and memory state files (.VSV and .bin) are also loaded. ā€¢ If you take the snapshot when the virtual machine is powered off then the snapshot will not contain the .VSV and .BIN file. ā€¢ If you revert to that snapshot the virtual machine will be in the powered off state because the processor and memory status is not available.
  • 40. Contdā€¦ Virtual Machine Snapshot ADAD 40 ā€¢ Apply Option ā€¢ By using the revert option we can only go back to the last snapshot state. If there are three snapshots and you want to go back to the first or second snapshot, then we have to use this Apply option. If you want to use this Apply option, select the snapshot to which you want to go back then right click it. ā€¢ Deleting Snapshot ā€¢ If you do not need any snapshot or snapshot sub tree in the future, you can delete it. When you delete a single snapshot it will delete the configuration file, processor state and memory state files associated with that snapshot immediately. If the AVHD file does not contain any child AVHD then it is also deleted. That is the AVHD associated with the snapshot should not be a parent of any AVHD. If it contains only one child, the child AVHD is merged with the parent AVHD when the virtual machine is powered off. ā€¢ If it has more than one child then this AVHD is retained until only one remains and then it is merged with the parent AVHD when the virtual machine is powered off. ā€¢ In the same way, you can delete the entire snapshot sub tree.
  • 41. Contdā€¦ Virtual Machine Snapshot ADAD 41 ā€¢ Renaming the Snapshot ā€¢ The snapshots will be listed in the snapshot pane. You can notice that the snapshot name is the virtual machine name followed by date and time. ā€¢ In real time you will have many virtual machines and you will take many snapshots. By looking at a particular snapshot time you cannot identify the reason of the snapshot and what is stored in the snapshot. So for the easy identification, we can rename the snapshots. ā€¢ If you want to rename the snapshot select the snapshot, right-click and select Rename from the menu and give a new name which specifies the purpose of the snapshot.
  • 42. Performance of a Hyper-V Server ADAD 42
  • 43. Performance of Hyper V Server ADAD 43 ā€¢ Monitoring and keeping track of hypervisor performance is one of the major jobs of the administrator. The administrator can use the available performance monitoring tools. ā€¢ But we have to use the appropriate tools to get the correct result. For example, we have to inbuilt performance monitoring tools in the Hyper-V - Task manager and Performance Monitor. ā€¢ The Task Manager is a simple tool. It is not virtualization aware so we cannot view the resource utilization by a virtual machine against the total system resources. Suppose if we are using it on the virtual machine we cannot only view the resource utilization percentage of allocated virtual resources because the task manager doesnā€™t know that it is a virtual machine.
  • 44. Contdā€¦ Performance of Hyper V Server ADAD 44 ā€¢ The Hyper-V provides a series of unique counters in the Performance Monitor. Since the hyper-V provides virtualization specific counters, the administrators are able to analyse resource utilization at the host level and virtual machine levels. For example, the Hyper-V counter called ā€œHyper-V Hypervisor Logical Processor (_Total)% Total Run Timeā€ will report the total processor time spent in running both the host and guest machines.
  • 45. Contdā€¦ Performance of Hyper V Server ADAD 45 ā€¢ Things to be monitored on hyper-V ā€¢ In a hypervisor environment, we need to monitor both the host resources and the guest resources. Availability of enough host resources will result in better performance of the virtual machine that is running on the top of the hypervisor. If there is the contention for resources all the virtual machines compete for the resources, which lead to performance degradation. So we need to monitor regularly to ensure that resources are properly utilized. ā€¢ We need to monitor the guest machine also. Even if the host has enough resources without proper allocation of virtual machines will affect the virtual machine performance. ā€¢ The important things to be monitored for the smooth running of the system are overall health of the system, memory utilization and availability, processor utilization, network bandwidth utilization and performance and storage performance. All these have to be monitored for both host and guest. ā€¢ There are many performance counters available in performance monitor tool to monitor these resources. We will discuss the major counters to monitor.
  • 46. Contdā€¦ Performance of Hyper V Server - The top level performance counters to monitor are: ADAD 46 ā€¢ Overall health of Hypervisor and Virtual Machine ā€¢ To check the overall health there are two counters, the first one isā€ Hyper-V Virtual Machine Health Summaryā€. It has only two options, Health Ok and Health critical. ā€¢ Another counter to check overall health is ā€œHyper-V Hypervisor. Using this we can identify many things like how many logical processors are identified by machine, the number of virtual machines currently running, a total number of pages and a number of virtual processors.
  • 47. Contdā€¦ Performance of Hyper V Server - The top level performance counters to monitor are: ADAD 47 ā€¢ Processor: ā€¢ From the Hyper-V Hypervisor counter we got an idea of a number of logical processors and number of virtual processors now we need to monitor the performance of these processors. ā€¢ The first counter Hyper-V Hypervisor Logical Processor is used to monitor how much of the physical processor is used. ā€¢ The Hyper-V Hypervisor Root Virtual Processorā€ is used to monitor how much CPU, the root is using. ā€¢ The ā€œHyper-V Hypervisor Virtual Processorā€ is used to monitor how much CPU the guest is using.
  • 48. Contdā€¦ Performance of Hyper V Server - The top level performance counters to monitor are: ADAD 48 ā€¢ Memory ā€¢ Using the network counters we can monitor the overall performance of the Network. ā€¢ The ā€œNetwork Interfaceā€ counter is used to monitor the network performance of the physical device. Using this we can monitor, Total Bytes/sec, Bit/sec, offloaded connections, Packet receive errors, packet outbound error. ā€¢ Next one isā€ Hyper-V Virtual Switchā€. As the name indicates, it is used to monitor the virtual switch. It is necessary to monitor the virtual switch because all the virtual machineā€™s traffics are handled by the virtual switch. Suppose if you have configured internal virtual network the traffic will exist only in the virtual switch. Using these counter, we can monitor the virtual switchā€™s Bytes/sec and Packets / sec. ā€¢ Next counter is ā€œHyper-V Virtual Network Adapterā€. It is used to monitor the virtual network adapter of a VM. Using this we can identify how traffic is entering into a particular VM and how much traffic it is generating. We can get the details of each virtual network adapter by using this and also we can see which VM is generating more traffic. Using this counter we can monitor Bytes/sec and Packets / sec details of a virtual network adapter.
  • 49. Contdā€¦ Performance of Hyper V Server - The top level performance counters to monitor are: ADAD 49 ā€¢ Storage: ā€¢ With the use of the storage counters we can monitor the overall disk performance of the entire system and disk performance of each VM. ā€¢ The counter ā€œPhysical Diskā€ gives an idea about overall storage performance of the system. Using this we can monitor Current Disk Queue Length, Disk Bytes/sec, Disk Transfers / sec. Current Disk Queue Length gives one an idea of how busy the drives are.
  • 51. Citrix XenDesktop Fundamentals ADAD 51 ā€¢ Citrix XenDesktop is a Desktop Virtualization product suite from Citrix. ā€¢ In XenDesktop, the administrator will publish the desktop and application on the server so multiple users can access these simultaneously. The application and desktop will be running in the server not in the client device so the user can access it from any device. ā€¢ Using this XenDesktop a user can access their corporate desktop and application from anywhere and from any device. So the user can work from anywhere. The end user device must be installed with Citrix Receiver.
  • 52. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 52 ā€¢ The published apps and desktops are running in virtual machines and centrally managed. ā€¢ XenDesktop allows the employees to securely access their corporate-issued virtual apps and desktops from their personal computer or mobile device. Users are using their own device so the organization doesnā€™t require providing hardware to the employees. Hence IT hardware cost is reduced. The image 5.2.12 below shows the architecture and the components of Citrix XenDesktop.
  • 53. Contdā€¦ Citrix XenDesktop Fundamentals ā€“ How Citrix XenDesktop Works ADAD 53
  • 54. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 54 ā€¢ Delivery Controller ā€¢ Delivery controllerā€™s function is to distribute the hosted application and desktops to the users. ā€¢ Virtual Delivery Agent ā€¢ The virtual delivery agent has to be installed on all the servers which are hosting the application. It manages the communication between the application and Citrix receiver. It is used along with the delivery controller. ā€¢ Citrix Receiver ā€¢ Citrix Receiver is installed in the end user devices such as desktops and laptops. Citrix Store Front ā€¢ Citrix Store Front authenticates the users when they access the published application.
  • 55. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 55 ā€¢ Citrix Studio ā€¢ It is a console where the applications are published and managed. ā€¢ Citrix Director ā€¢ It serves as a tool for monitoring and to troubleshoot the Xen App and Xen Desktop environments.
  • 57. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 57 ā€¢ In the Citrix studio, we have to publish our desktop and application. Once it is published then it will be available in the store Font. The store font provides self-service access to the desktop and application because it shows all the published application and desktops to the users and it authenticates the users when they access their published resources. Citrix receiver is installed in the client devices and it provides access to published resources from any device. Citrix director is a web based tool for monitoring and troubleshooting. ā€¢ Using HDX technology it delivers a high definition graphical experience to users and the NetScaler Gateway is responsible for load balancing. ā€¢
  • 58. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 58 ā€¢ Deploying App using Citrix XenApp ā€¢ Before publishing App using XenApp, you need to install and configure license server, Citrix XenApp server and Web Interface. ā€¢ The license server is the major component of the XenApp. ā€¢ XenApp is used to install and publish the application. All the published applications will be available in the Web Interface. ā€¢ Here we will only discuss how to publish the application.
  • 59. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 59 ā€¢ Publishing Applications using XenAppAppCenter 1. Open the Citrix AppCenter console. 2. Expand Citrix Resources >XenApp> [Farm Name]. 3. Right-click Applications and select Publish application: Click Next at the Welcome screen 4. Choose the application type that you are going to publish then click Next. 5. Browse the application executable location. 6. Select which Servers/Worker Groups will run the application. 7. Select which Users/Groups will be allowed to access the published application. 8. Configure the location of application shortcuts. 9. Check the Configure advanced application settings now check box, then click Next.
  • 60. Contdā€¦ Citrix XenDesktop Fundamentals ADAD 60 ā€¢ Configure Advanced Application Settings 1. Continuing from the step above, select which connections you will accept. 2. Associate file types with the application if needed. 3. Check Allow only one instance of the application for each user, if required. Limit instances allowed to run in server farm will ensure that youā€™re complying with license restrictions. 4. Configure Client options. 5. These application appearance settings will only apply if you are publishing on a Server Desktop. 6. The application will now show in Citrix AppCenter.