Virtual Machine Configuration
VerifiedAdded on 2022/11/27
|7
|991
|236
AI Summary
This document discusses the configuration of virtual machines for various purposes such as domain controllers, web servers, application servers, database servers, firewalls, routers, switches, and VoIP infrastructure. It also provides a plan for virtual technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: VIRTUAL MACHINE CONFIGURATION
VIRTUAL MACHINE CONFIGURATION
Name of the Student
Name of the University
Author Note
VIRTUAL MACHINE CONFIGURATION
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
VIRTUAL MACHINE CONFIGURATION 1
Table of Contents
Virtual Machine:........................................................................................................................2
Virtual machine configuration:..................................................................................................2
Domain controllers with a Single Forest Single Domain Active Directory model:..............2
Microsoft Exchange server:...................................................................................................2
Web servers:...........................................................................................................................3
Application servers:...............................................................................................................3
Database Servers:...................................................................................................................3
Firewalls:................................................................................................................................4
Routers:..................................................................................................................................4
Switches:................................................................................................................................4
VoIP infrastructure:................................................................................................................5
Conclusion:................................................................................................................................5
References:.................................................................................................................................6
Table of Contents
Virtual Machine:........................................................................................................................2
Virtual machine configuration:..................................................................................................2
Domain controllers with a Single Forest Single Domain Active Directory model:..............2
Microsoft Exchange server:...................................................................................................2
Web servers:...........................................................................................................................3
Application servers:...............................................................................................................3
Database Servers:...................................................................................................................3
Firewalls:................................................................................................................................4
Routers:..................................................................................................................................4
Switches:................................................................................................................................4
VoIP infrastructure:................................................................................................................5
Conclusion:................................................................................................................................5
References:.................................................................................................................................6
2VIRTUAL MACHINE CONFIGURATION
Virtual Machine:
A virtual machine is creating a computer within another computer that can behave as
the actual computer. This runs within a window, such as any other programme. The purpose
of this paper is to develop a plan for virtual technology (Felter et al., 2015). Multiple virtual
machines can simultaneously run on a single computer. Each of the virtual machines can
provide the virtual hardware of their own.
Virtual machine configuration:
Domain controllers with a Single Forest Single Domain Active Directory model:
For configuring virtual machine Hyper-V server is needed for virtualizing the domain
controllers. For using and installing the Hyper-V role, the following things needs to be
having.
An x64 processor: The Hyper-V is having the availability in 64 bit versions of the
Windows server 2008 or later.
Hardware Data Execution Protection (DEP): The DEP has to be enabled and
available. The user has to enable Intel XD bit or AMD NX bit.
Hardware-assisted virtualization: This feature having the availability in the
processor which include an option for virtualization such as Intel VT or AMD-V.
Microsoft Exchange server:
The Exchange Server 2013, Exchange Server 2019 and Exchange Server 2016 can be
deployed in an environment that is virtualized (Tarasov et al., 2013). There are several terms
that are used such as Cold boot, Planned migration and Saved state.
Web servers:
Any of the web servers can run within the virtual machine.
Virtual Machine:
A virtual machine is creating a computer within another computer that can behave as
the actual computer. This runs within a window, such as any other programme. The purpose
of this paper is to develop a plan for virtual technology (Felter et al., 2015). Multiple virtual
machines can simultaneously run on a single computer. Each of the virtual machines can
provide the virtual hardware of their own.
Virtual machine configuration:
Domain controllers with a Single Forest Single Domain Active Directory model:
For configuring virtual machine Hyper-V server is needed for virtualizing the domain
controllers. For using and installing the Hyper-V role, the following things needs to be
having.
An x64 processor: The Hyper-V is having the availability in 64 bit versions of the
Windows server 2008 or later.
Hardware Data Execution Protection (DEP): The DEP has to be enabled and
available. The user has to enable Intel XD bit or AMD NX bit.
Hardware-assisted virtualization: This feature having the availability in the
processor which include an option for virtualization such as Intel VT or AMD-V.
Microsoft Exchange server:
The Exchange Server 2013, Exchange Server 2019 and Exchange Server 2016 can be
deployed in an environment that is virtualized (Tarasov et al., 2013). There are several terms
that are used such as Cold boot, Planned migration and Saved state.
Web servers:
Any of the web servers can run within the virtual machine.
3VIRTUAL MACHINE CONFIGURATION
Microsoft Service Fabric Cluster
Microsoft windows server
Ubuntu Server
Fedora
Cloud boost
Logentries
Red hat enterprise Linux
Yellowfin for Azure
Chef Server 12
Hortonworks Data perform standard.
Application servers:
There are so many application servers for virtualization.
Hyper-V
VMware ESXi
Oracle VM server for x86
Microsoft App-V
VMware vSphere.
From the above list, VMware is the most popular software that is used for virtualization.
Database Servers:
The organized collection of the information and data is known as a database. This is
important really to organise data as well as different database models (Pfaff & Davie, 2013).
Oracle RDBMS
IBM DB2
Microsoft SQL Server
Microsoft Service Fabric Cluster
Microsoft windows server
Ubuntu Server
Fedora
Cloud boost
Logentries
Red hat enterprise Linux
Yellowfin for Azure
Chef Server 12
Hortonworks Data perform standard.
Application servers:
There are so many application servers for virtualization.
Hyper-V
VMware ESXi
Oracle VM server for x86
Microsoft App-V
VMware vSphere.
From the above list, VMware is the most popular software that is used for virtualization.
Database Servers:
The organized collection of the information and data is known as a database. This is
important really to organise data as well as different database models (Pfaff & Davie, 2013).
Oracle RDBMS
IBM DB2
Microsoft SQL Server
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4VIRTUAL MACHINE CONFIGURATION
SAP Sybase ASE
Teradata
ADABAS
MySQL
FileMaker
Firewalls:
A firewall appliance is the combination of the software that is related to the firewall
as well as an operating system which has been built purposely for running a firewall on a
virtual machine (Balmer et al., 2014).
Check Point
Fort iGATE
Palo Alto Networks
WatchGuard
Sophos
Cisco Asa Firepower.
Routers:
Cisco 2000 Series Connected Grid
Cisco 1100 Series Industrial Integrated Services
Cisco 1000 Series Connected Grid
Switches:
Cisco Catalyst 9400 Series
Cisco Catalyst 9600 Series
Cisco Catalyst 3560-CX Series
SAP Sybase ASE
Teradata
ADABAS
MySQL
FileMaker
Firewalls:
A firewall appliance is the combination of the software that is related to the firewall
as well as an operating system which has been built purposely for running a firewall on a
virtual machine (Balmer et al., 2014).
Check Point
Fort iGATE
Palo Alto Networks
WatchGuard
Sophos
Cisco Asa Firepower.
Routers:
Cisco 2000 Series Connected Grid
Cisco 1100 Series Industrial Integrated Services
Cisco 1000 Series Connected Grid
Switches:
Cisco Catalyst 9400 Series
Cisco Catalyst 9600 Series
Cisco Catalyst 3560-CX Series
5VIRTUAL MACHINE CONFIGURATION
VoIP infrastructure:
Such as the traditional applications, the VoIP is having zero tolerance for the latency
and packet loss or lapses in service quality. The MIXvoip company developed the concept of
super nodes cluster (SNC) and super node (SN) for the enrichment of the features for the
telephone exchanges (Gritzalis et al., 2013). The popular most private branch exchange
(PBX) is Asterisk, it includes all the components that are necessary for building scalable
phone systems.
Conclusion:
Thus it can be concluded from the above report that the emulation engine of the
virtual machine which is also known as the hypervisor. It is having the ability to handle the
virtual hardware that also includes memory, CPU, network interface, hard drive etc. The
virtual hardware devices are provided by the hypervisor map to the actual hardware on a
physical machine.
VoIP infrastructure:
Such as the traditional applications, the VoIP is having zero tolerance for the latency
and packet loss or lapses in service quality. The MIXvoip company developed the concept of
super nodes cluster (SNC) and super node (SN) for the enrichment of the features for the
telephone exchanges (Gritzalis et al., 2013). The popular most private branch exchange
(PBX) is Asterisk, it includes all the components that are necessary for building scalable
phone systems.
Conclusion:
Thus it can be concluded from the above report that the emulation engine of the
virtual machine which is also known as the hypervisor. It is having the ability to handle the
virtual hardware that also includes memory, CPU, network interface, hard drive etc. The
virtual hardware devices are provided by the hypervisor map to the actual hardware on a
physical machine.
6VIRTUAL MACHINE CONFIGURATION
References:
Balmer, M. L., Slack, E., De Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., ... &
Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between
the host and its gut commensal microbiota. Science translational medicine, 6(237),
237ra66-237ra66.
Felter, W., Ferreira, A., Rajamony, R., & Rubio, J. (2015, March). An updated performance
comparison of virtual machines and linux containers. In 2015 IEEE international
symposium on performance analysis of systems and software (ISPASS) (pp. 171-172).
IEEE.
Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., & Mentis, A. (2013,
July). The Sphinx enigma in critical VoIP infrastructures: Human or botnet?. In IISA
2013(pp. 1-6). IEEE.
Pfaff, B., & Davie, B. (2013). The open vSwitch database management protocol (No. RFC
7047).
Tarasov, V., Hildebrand, D., Kuenning, G., & Zadok, E. (2013). Virtual Machine Workloads:
The Case for New {NAS} Benchmarks. In Presented as part of the 11th {USENIX}
Conference on File and Storage Technologies ({FAST} 13)(pp. 307-320).
References:
Balmer, M. L., Slack, E., De Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., ... &
Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between
the host and its gut commensal microbiota. Science translational medicine, 6(237),
237ra66-237ra66.
Felter, W., Ferreira, A., Rajamony, R., & Rubio, J. (2015, March). An updated performance
comparison of virtual machines and linux containers. In 2015 IEEE international
symposium on performance analysis of systems and software (ISPASS) (pp. 171-172).
IEEE.
Gritzalis, D., Soupionis, Y., Katos, V., Psaroudakis, I., Katsaros, P., & Mentis, A. (2013,
July). The Sphinx enigma in critical VoIP infrastructures: Human or botnet?. In IISA
2013(pp. 1-6). IEEE.
Pfaff, B., & Davie, B. (2013). The open vSwitch database management protocol (No. RFC
7047).
Tarasov, V., Hildebrand, D., Kuenning, G., & Zadok, E. (2013). Virtual Machine Workloads:
The Case for New {NAS} Benchmarks. In Presented as part of the 11th {USENIX}
Conference on File and Storage Technologies ({FAST} 13)(pp. 307-320).
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.