This document discusses the configuration of virtual machines for various purposes such as domain controllers, web servers, application servers, database servers, firewalls, routers, switches, and VoIP infrastructure. It also provides a plan for virtual technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: VIRTUAL MACHINE CONFIGURATION VIRTUAL MACHINE CONFIGURATION Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
VIRTUAL MACHINE CONFIGURATION1 Table of Contents Virtual Machine:........................................................................................................................2 Virtual machine configuration:..................................................................................................2 Domain controllers with a Single Forest Single Domain Active Directory model:..............2 Microsoft Exchange server:...................................................................................................2 Web servers:...........................................................................................................................3 Application servers:...............................................................................................................3 Database Servers:...................................................................................................................3 Firewalls:................................................................................................................................4 Routers:..................................................................................................................................4 Switches:................................................................................................................................4 VoIP infrastructure:................................................................................................................5 Conclusion:................................................................................................................................5 References:.................................................................................................................................6
2VIRTUAL MACHINE CONFIGURATION Virtual Machine: A virtual machine is creating a computer within another computer that can behave as the actual computer. This runs within a window, such as any other programme. The purpose of this paper is to develop a plan for virtual technology (Felter et al., 2015). Multiple virtual machines can simultaneously run on a single computer. Each of the virtual machines can provide the virtual hardware of their own. Virtual machine configuration: Domain controllers with a Single Forest Single Domain Active Directory model: For configuring virtual machine Hyper-V server is needed for virtualizing the domain controllers.For using and installing the Hyper-V role, the following things needs to be having. An x64 processor:The Hyper-V is having the availability in 64 bit versions of the Windows server 2008 or later. HardwareData Execution Protection (DEP):The DEP has to be enabled and available. The user has to enable Intel XD bit or AMD NX bit. Hardware-assistedvirtualization:Thisfeaturehavingtheavailabilityinthe processor which include an option for virtualization such as Intel VT or AMD-V. Microsoft Exchange server: The Exchange Server 2013, Exchange Server 2019 and Exchange Server 2016 can be deployed in an environment that is virtualized (Tarasov et al., 2013). There are several terms that are used such as Cold boot, Planned migration and Saved state. Web servers: Any of the web servers can run within the virtual machine.
3VIRTUAL MACHINE CONFIGURATION Microsoft Service Fabric Cluster Microsoft windows server Ubuntu Server Fedora Cloud boost Logentries Red hat enterprise Linux Yellowfin for Azure Chef Server 12 Hortonworks Data perform standard. Application servers: There are so many application servers for virtualization. Hyper-V VMware ESXi Oracle VM server for x86 Microsoft App-V VMware vSphere. From the above list, VMware is the most popular software that is used for virtualization. Database Servers: The organized collection of the information and data is known as a database. This is important really to organise data as well as different database models (Pfaff & Davie, 2013). Oracle RDBMS IBM DB2 Microsoft SQL Server
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4VIRTUAL MACHINE CONFIGURATION SAP Sybase ASE Teradata ADABAS MySQL FileMaker Firewalls: A firewall appliance is the combination of the software that is related to the firewall as well as an operating system which has been built purposely for running a firewall on a virtual machine (Balmer et al., 2014). Check Point Fort iGATE Palo Alto Networks WatchGuard Sophos Cisco Asa Firepower. Routers: Cisco 2000 Series Connected Grid Cisco 1100 Series Industrial Integrated Services Cisco 1000 Series Connected Grid Switches: Cisco Catalyst 9400 Series Cisco Catalyst 9600 Series Cisco Catalyst 3560-CX Series
5VIRTUAL MACHINE CONFIGURATION VoIP infrastructure: Such as the traditional applications, the VoIP is having zero tolerance for the latency and packet loss or lapses in service quality. The MIXvoip company developed the concept of super nodes cluster (SNC) and super node (SN) for the enrichment of the features for the telephone exchanges (Gritzaliset al., 2013). The popular most private branch exchange (PBX) is Asterisk, it includes all the components that are necessary for building scalable phone systems. Conclusion: Thus it can be concluded from the above report that the emulation engine of the virtual machine which is also known as the hypervisor. It is having the ability to handle the virtual hardware that also includes memory, CPU, network interface, hard drive etc. The virtual hardware devices are provided by the hypervisor map to the actual hardware on a physical machine.
6VIRTUAL MACHINE CONFIGURATION References: Balmer, M. L., Slack, E., De Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., ... & Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between the host and its gut commensal microbiota.Science translational medicine,6(237), 237ra66-237ra66. Felter, W., Ferreira, A., Rajamony, R., & Rubio, J. (2015, March). An updated performance comparison of virtual machines and linux containers. In2015 IEEE international symposium on performance analysis of systems and software (ISPASS)(pp. 171-172). IEEE. Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., & Mentis, A. (2013, July). The Sphinx enigma in critical VoIP infrastructures: Human or botnet?. InIISA 2013(pp. 1-6). IEEE. Pfaff, B., & Davie, B. (2013).The open vSwitch database management protocol(No. RFC 7047). Tarasov, V., Hildebrand, D., Kuenning, G., & Zadok, E. (2013). Virtual Machine Workloads: The Case for New {NAS} Benchmarks. InPresented as part of the 11th {USENIX} Conference on File and Storage Technologies ({FAST} 13)(pp. 307-320).