Combo Offer 35% Off + 10% Extra OFF on WhatsApp

Manage Its Virtual Servers Assignment Sample

  • Plagiarism & Error Free Assignments By Subject Experts
  • Affordable prices and discounts for students
  • On-time delivery before the expected deadline

No AI Generated Content

72000+ Projects Delivered

500+ Experts

Enjoy Upto 35% off
- +
1 Page
35% Off
AU$ 11.83
Estimated Cost
AU$ 7.69
Securing Higher Grades Costing Your Pocket? Book Your Assignment At The Lowest Price Now!
X

Virtual Machine Manager (VMM) and its Role in Managing Virtual Servers

Get Free Samples Written by our Top-Notch Subject Expert Writers known for providing the Best Assignment Help Services in Australia.

VMM also called (Virtual Machine Manager) is a part of the “System Center Suite”, that is used to configure, transport and manage traditional datacenter which helps the user or students and provides a good management experience for all over the premises and provides services which include capabilities of VMM (Datacenter, Virtualization host, Networking, Storage and Library resources) which the VMM needs to run the virtual server like “DHCP server, File server, SQL server, Database server and the Web server” which provide network virtualization, including support to manage and create network gateways and virtual network, which user or students can isolate their network with their own IP address for security and privacy.

Discussion

VMM is parted into different functions as follows:

Data Center: It is used to manage and configure the data center components in a single fabric of the VMM. Datacenter components include network components, “virtualization servers, and storage resources” that create and deploy services and virtual machines to private clouds.

Virtualization hosts: VMM adds provision and manages “VMware and Hyper-V” in virtualization hosts and clusters.

Networking: Network resources that add to the VMM fabric, in the network's sites which are defined by the IP subnets, Logical switches, Virtual LANs (VLANs), MAC pools, and IP addresses. VMM provides and supports the creation of a Virtual Network and getaways in which users secure and private their network by isolating their network to their own IP address (Pradana and Budiman, 2019). By using their getaways user connect virtual networks to the VMs through the physical networks in different locations on the same site.

Storage: VMM can allocate, discover, classify, Provision, remote storage, and assign local. Block Storage support in VMM (fiber channel, storage area network (SANs) .

Library resources: The VMM fabric is retained in the library of “non-file-based and file-based” resources which use to deploy and create services and VMs into virtualization hosts. Non-file-based sources include profiles and templates which are used to create for VMs. File- base sources include ISO images, scripts, and Virtual hard disk. Library resources can be accessed through library sharing.

DHCP Server: It is a network server that automatically assigns and provides default getaways IP addresses and other network protocols to the user's devices. It provides standard protocols to respond to broadcast queries by users (Mukherjee, 2019). A DHCP severe send required network protocols and parameters for the users or clients for better communication in the network, DHCP server is usually provided a unique IP address to the user/client. These servers support both DHCP for IPv6 and IPv4 at the same time, DHCP server virtually supports both protocols and also same time manages the interface for IPv6 and IPV4, In DHCP servers valid TCP/IP protocols provide parameters to the client on this network, in DHCP server a valid and unique IP address is needed for the subnet is required for connection.

File Server: this server is often used in the respiratory program and is accessible to multiple network users, this is also used in backing up any server. This server is based among clients as well as local mass or storage devices (Akashi, and Tong, 2019). It is considered to be a central server in the computer network which enables the clients to stay connected and access the server’s capacity. It encompasses the hardware as well as the software to implement the server. Given that they received corresponding authorizations, the users can access, read, delete files, open folders, and change on the file server and even upload files on the server.

SQL Server: The “Relational Database Management System” which is developed and also marketed by the Microsoft. The SQL Server is a standard computer programming language made to interact with the database (Nevarez, 2021). The server is linked to Transact-SQL, Microsoft implementation of the SQL which adds a group of programming constructs. This server works particularly in a Windows environment and has two components- a database engine, and an SQL OS, Data analysis in SQL servers provides reports to the virtualization for data, ML services which had appeared in this technology used of SQL servers in 2016 which later renamed as R Services.

Database Engine- In the main component of SQL is a Database engine. This engine comprises the relational engine which processes the queries and stores or manages the database indexes, files, pages, etc. Database objects like views, triggers, stores, and procedures are created and then executed in the database engine.

SQLOS-The SQLOS provides numerous OS and services such as Input/Output management as well as memory. Its other services include synchronization services, and exception and handling

Web Server: This server uses HTPP (“Hypertext Transfer Protocol”) and many other protocols to communicate with the client's request that is made in the WWW. Its main job is to show the website's content by storing, delivering webpages, and processing webpages to the users. Besides HTPP, the web server that supports SMTP “(Simple Mail Transfer Protocol) and FTP (File Transfer Protocol)” which are used in emails, and also in transferring files and storage (Potter et al. 2018). The server's hardware is linked or connected to the internet which allows the data to exchange with other devices, whereas the software takes over the user's accesses files. Some examples are-

  • Exchanging emails
  • Request for downloading the FTP (“File Transfer Protocol”) files
  • Building as well as publishing webpages

Recommendations for hardware profile

  1. DHCP Server: “SCVMM 2012 R2” console with possible RAM and HDD
  2. File server: “System Centre 2012 R2 Virtual Machine Manager with feasible RAM and HDD”
  3. SQL Server and Database server: “SQL Server 2016 on VMM 2016.”
  4. Web Server: “System Centre 2012 R2 Machine Manager with feasible RAM and HDD”

Reasons for choosing specific hardware profiles

A

B

C

1

Feature

Stand-

VM

2

Capacity to import an existing “stand-alone” hardware profile

N/A

;

Yes

3

Capacity to store a “stand-alone” hardware profile from the wizard

Yes

Yes

4

CPU Setting

Yes

Yes

5

Memory Setting

Yes

Yes

6

Virtual floppy disc (built-in)

Yes

Yes

7

Virtual IDE tool (built-in)

Yes

Yes

8

Network adapter

Yes

Yes

9

Virtual DVD attached to an IDE bus

No

Yes

10

;

Operating VHD attached to an IDE bus

No

Yes

11

Virtual SCSI adapters

Yes

Yes

12

Existing VHD affixed in SCSI bus

No

Yes

13

New VHD affixed in SCSI bus

No

Yes

14

Virtual DVD disc affixed to SCSI bus

No

No

15

Relative priority of VM to access user CPU

Yes

Yes

Conclusion

In the conclusion part the uses of VMM that manage the virtual servers through different servers like DHCP servers, SQL server, File server, and Web server through which is helpful for the collages which are very important in today's technological and advance world, Viirtulazition is to enable different technology for a cloud server to an organization which helps the organization to advance in every possible way from modern education to suitable envirnment for students and teachers through the help of VMs and simulate the difficulties jobs are done easy, which includes the security and privilege inside the organization Through the help of VMM.

References

Journal

  • Pradana, D.A. and Budiman, A.S., The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack. IJID (International Journal on Informatics for Development), 10(1), pp.38-46.
  • Akashi, S. and Tong, Y., 2019. Classification of DHCP spoofing and effectiveness of DHCP Snooping. In Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication, edited by Wen-Bing Horng and Yong Yue (Vol. 233, p. 238).
  • Mukherjee, S., 2019. Popular SQL server database encryption choices. arXiv preprint arXiv:1901.03179.
  • Nevarez, B., 2021. SQL Server on Linux. In High Performance SQL Server (pp. 67-78). Apress, Berkeley, CA.
  • Potter, S.C., Luciani, A., Eddy, S.R., Park, Y., Lopez, R. and Finn, R.D., 2018. HMMER web server: 2018 update. Nucleic acids research, 46(W1), pp.W200-W204.
Recently Download Samples by Customers
Get best price for your work

offer valid for limited time only*

© Copyright 2024 | New Assignment Help | All rights reserved