3.5 Virtual Machine, Network, Hard Disk Creation Part 5

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course
Time
5 hours 8 minutes
Difficulty
Beginner
Video Transcription
00:01
All right.
00:02
So
00:03
carrying on synthetic versus emulated network adapters,
00:07
so
00:08
emulated what simulated
00:11
this is It's basically it's a software component that implements
00:17
unified,
00:18
least common denominator set of instructions
00:23
on the universal toe. All devices of that time,
00:26
um so
00:28
also, judge s. So you could have two virtual switches in this scenario if needed. Absolutely. You could
00:35
if they were external, you wouldn't be able to cook both of them into the same physical adapter
00:41
because of just the way they connect up. You can share them if you could have to adapt is connecting into a virtual switch. But if you connect them both to, like, say, there's one adapter nya to external networks,
00:53
things going to stop going a bit haywire on the network. So
00:57
you can, in some scenarios, but not necessarily a ll the time it would depend
01:03
because of the flexibility. Let me just roll this back a little bit because of the flexibility off
01:07
the way virtual switches work.
01:10
There are ways where you can it will allow you to build a network,
01:15
but it won't necessarily work because what you're asking it to build is perfectly logical. But when you then start connecting wires together. It's almost like if you had to physical switches and you thought you know what? I'm gonna plug this switch into this switch. Now, that's a perfectly normal thing to do. Connect two switches together,
01:34
but I'm gonna say right. Well, this the other end of this switch on the uplink. I'm gonna connect this switch back to that switch. You're gonna create a loop.
01:41
Now, you can certainly do that.
01:42
But why would you want to? Do you see what I mean? You would just use that one link,
01:47
so it allows a lot of flexibility. But you can also be too flexible and create scenarios where you don't want situations to occur as well. So it's just a case of being aware of those Basically,
02:00
yes. So synthetic roses emulated network adapters. So, um,
02:06
what it does so, as I said, this uses the least common denominator set of instructions like the way it gives date around talks to things,
02:14
huh?
02:15
This guarantees are pretty much going to all but guarantees that it will be usable by almost any operating system. Even those that hyper V doesn't directly support
02:24
s. So that's that's the benefit of happening
02:27
a emulated network adapter. Now these devices can be seen even in a minimalist pre boot execution environment. Now
02:37
those of you who might have heard of pre brew execution will know it is pixie
02:42
on. This is why you would use an emulated network adapter if you want to do things like build machines were using a Windows deployment server or something along those lines.
02:53
Um, so Daniel has asked, How can you connect a virtual switch to a physical Nick?
03:00
Um,
03:00
so,
03:01
as I said so what you would do is you would have the physical nick in the host, and that's literally what an external
03:08
switches external virtual switch. It allows that virtual switch to pick up a physical network
03:15
on connect to the hardware and use it. That's literally an external network. So you would use an external network to connect to a physical nick
03:23
effectively so spanning tree protocol that Eddie said, is a little bit more than what we might discuss in the foundation course
03:30
you're on the right lines. They're ready, of course, and it is clear that you've you've done this before, so it's good. But yes, that you would use an external network in this environment to actually
03:43
connected to the physical nick, and then it would be able to access the rest of the network effectively.
03:49
So going back to this simulated so drawback to this the drawbacks of simulated network conductor. The software component is a complete representation of a hardware device,
04:00
which means that includes the need for things like I are cues and interrupt request
04:05
on a memory input output operation
04:08
now within the virtual machine.
04:10
All the translation occurs in the virtual CPU,
04:14
and once the virtual CPU has converted the V EMS communication
04:18
into that meant for the device, it's passed over to the construct that Hyper V has,
04:24
and Hyper V then performs the same exact function to interact with the real hardware.
04:29
All of this happens in reverse as the device sends data back to the drivers and applications within the virtual machine.
04:35
So it means that there's a lot of resource usage to send data backwards and forwards through an emulated network adapter.
04:46
So, yeah, it's massively expensive for computation, which means it's going to slow down that GM on you. You can very quickly notice these types of things when you boot a generation one versus a generation to machine, we discuss these. In previous episodes, Jen one tends to have emulated. Gentoo tends to have synthetic.
05:04
Andi would use one over the other in certain situations.
05:09
But it is, as I mentioned, a complete representation of the hardware.
05:13
Um,
05:13
and it needs its own basic i R Q and memory. I owe operations,
05:17
and this is basically how it would lay out if you saw it in an environment. So it's
05:24
you got the virtual machine at the bottom,
05:26
passing data backwards and forwards between hyper V that then speaks to the driver. The driver speaks to what's called the hardware obstruction layer
05:34
on. Then that goes through to the CPU.
05:38
The CPU deals with the memory passing stuff in and out on. Then that goes over to the device, and that device sends out to the network. And then you have the entire reverse process coming all the way back in, which could be
05:49
really tedious and massively memory intensive and computational. E really expensive to do.
05:55
Tom asks. Can you go over fail over networking? We go over it a little bit. Tom. It's a little more than what we would deal with in a fundamentals course. This'd is very much a case of going over kind of the basics to understand virtualization. If you've been with us from the beginning,
06:12
then we've covered multiple six segments in areas.
06:15
But there is a little touches on it throughout the course. But going into it, I mean, I could I could make a series on its own about fail over networking.
06:25
It would take up that much time. So I do apologize. Hopefully, in the future course we can cover a bit more. I have been asked to attend to other courses in the future where I'm going into more detail on this, including things like Windows Server, which would have fail over built into it and that kind of things. They're clustering, networking like that as well.
06:45
But for the moment, we need to focus on the fundamental side of it.
06:47
I do apologize, Tom, but
06:49
I would love to in the future. Definitely
06:54
so.
06:55
Synthetic, so synthetic hardware is different from emulate. Hardware in the hyper V does not create a software construct to masquerade as a physical device
07:06
now, instead, it uses a similar technique to the Windows Hardware Obstruction Layover. How
07:13
on presents interface that functions more closely to the driver model. The guests still needs to send instructions through its virtual CPU, but it it's able to use the driver model to pass these communications directly into the hyper V through the what's called the V M bus on the V M bus driver.
07:30
And the drivers that dependent on it
07:32
need to be loaded in order for the guest to be able to use that synthetic hardware at all.
07:39
Um so
07:41
the drawbacks of it s So this is why synthetic and scuzzy devices, which is just an interface for attaching devices, cannot be used prior to window start up. So
07:54
if you do that, if you have a synthetic network adapter, you're not gonna be able to do things like pixie, which is the pre boom execute environment
08:03
s so you can't do when those deployments service's or anything along those lines where you're pushing out images of machines to the network and saying, Please install this for me that won't work with a synthetic. You need to emulate it on that
08:16
And so yet no pixie and This is kind of how it would look over all s o. The virtual machine has an app working with a driver which passes up to hyper V and then moves across and basically allows it to be a lot less
08:33
interfaces directly with the driver rather than needing the VM to do everything. So the APC unjust? Go, guys, I've got this information. I need to get it out. The driver goes yet I'm here, Potter over. I'll deal with Robert and in the virtual machine just carries on doing what it needs to do. This means that it's doing a lot less work,
08:52
which means that the virtual machine doesn't end up being
08:54
computational. E really resource intensive.
08:56
If you do run Jen one versus Jen to machines side by side. Jen one uses emulated Gentoo uses synthetic
09:03
and you can really tell the difference, like booting them up. If you hit, start both of them at same time. The speed difference is phenomenal. The only difference being is that emulated is the only one that can do environments on a network where it's before the operating system is loaded.
09:20
Um,
09:22
yeah. So
09:22
carrying on from there
Up Next