Virtualization Setup (part 2)

Video Activity

This module discusses Random Access Memory (RAM); which offers quick access to information. In addition, this module also covers Network Interface Cards (NICS), which offer access to the Local Area Network (LAN). This module also covers virtual machines: Virtual disks Virtual NICS Virtual switches Memory Storage Visualization Guest Tools Provisioni...

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 28 minutes
Video Description

This module discusses Random Access Memory (RAM); which offers quick access to information. In addition, this module also covers Network Interface Cards (NICS), which offer access to the Local Area Network (LAN). This module also covers virtual machines:

  1. Virtual disks
  2. Virtual NICS
  3. Virtual switches
  4. Memory
  5. Storage Visualization
  6. Guest Tools
  7. Provisioning
Video Transcription
The next thing we have is memory with memories, also called RAM or random access memory. The purpose behind Ram is I have a quick access of data.
When have you executed program? Say, for instance, Firefox. That program isn't being run from your hard drive. That program is being
mood from the hard drive to your round, so that a way you can use it and use it faster. Round
typically round performs at around 17 gigs per second,
whereas hard drives can perform up to six gigs for second. So executing from RAM, it's far better than X Compete. Executing from your hard drive, your CPU is the one that does this transfer
with the EMS.
Your round is actually utilized to the VM if you have four. VM was running at the exact same time, and each of'em is utilizing four gigs of Ram. You're utilizing 16 gigs of your round to those volumes on Lee, so that means that your computer will not be able to use those 16 gigs.
If all you have is eight gigs around,
you will not be able to give every beyond what they need, so therefore you would have to cut back and give each me L'm a gig or gig and 1/2 of ramp. I like to think of round as your desktop space. The more ram you have, the more desk thought space you have. So the more area you have to work with your neck, your neck is what you used to access. The Web
network interface card is a typically a R J 45 cable as plugged into the back of your computer. That goes to the switch a router. The faster the nick allows you to transfer information quicker, and whenever talking about routers, you have a wireless nick. So therefore, you have an antenna inside of your laptop
or inside of
you have a wireless cart attached to your PC,
and that is how you how you are able to access the land. Next, we want to talk about virtual machines. We'll talk about the desk, the next the switches, and we're also gonna talk about memory storage, guest holes and provisioning when talking about virtual she disk. It's actually a file, and it's going to be a V H D. And that V a steep
is a file on your computer that you're Veum uses
to operate from. It treats it as if it's a hard drive when creating the virtual machine. That is, whenever you create the actual hard drive file. However, once you shut down that VM, you're able to
change that hard drive size to a size that you need. Typically, whenever I create a fresh VM with windows loaded onto it, I'll create the hard drive at about 20 gigs. And as I'm loading programs, I will expand that hard drive if needed. Virtual Knicks are used to access the land,
and for every instance of them that you have, you'll have a virtual nick. There are logical pieces of software on the VM that are treated as if their hardware, which you have a virtual nick established under computer. You will also see it inside of your next settings on the physical computer that you're using on the host, and I've stated
the virtual next
simulates an actual nick. Virtual Switches argues in the same sense as a regular switch, their virtual software
that are used
to rout packets as needed
with a virtual switch. Your sent it out to isolate traffic on the network.
There are two types of virtual. Switch an external and internal virtual switch. Your internal virtual switch will be used with the virtual she's that are on the host, whereas the external could be used with routing Additional traffic With memory s stated earlier. Your virtual machine can only use memory that is given to it.
There are exceptions that will cover later,
but whenever it comes to the yams,
once you allocate a set amount of memory to the M, it will use it for that whole instance after you shut that machine down. That is when that's whenever you're able to change the memory if needed. Which stores rationalization allows you to create a cluster, and each cluster has a nick,
and this allows you. This allows for multiple hosts or virtual machines to connect to that storage device. The cluster is grouped together as a pool of resource is for the network, and a lot of times this is associate ID as a sand, a storage area network guess holes gives the user a better virtual experience
when it comes to managing the V EMS.
This also allows you to modify the performance that you can tell of'em to use this much ram. But if a particular function or a particular feature happens, they know utilized twice as much or more round as needed.
There are two tops of provisioning. You have thin provisioning and thick provisioning.
Them provisioning uses on Lee what is needed, whereas thick provisioning uses all resource is that it provided most of time. Thin provisioning is used with a small computer
or a small PC, and these small devices can't perform as many functions as a large actual desktop can. But they allow the user to do what they need and be able to perform actions that are needed,
whereas the provisioning is a fixed size on a virtual machine, and then
these utilize all resource is they're pretty much set in stone.
And that's module. We covered hyper visors, virtuous house and vegetables. She's
my name is just laying on the side. Very IittIe hope you got something a lot
Up Next
CompTIA Cloud+

Our online Cloud+ training addresses the essential knowledge for implementing, managing and maintaining cloud technologies as securely as possible. It covers cloud concepts and models, virtualization, and infrastructure in the cloud.

Instructed By