StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Virtual Servers - Research Paper Example

Cite this document
Summary
"Network Virtual Servers" paper provides a comparative examination of the Hyper-V and VMware hypervisors. The paper states that each system has its own strengths and weaknesses; however, Hyper-V software has tactical strengths that outweigh VMware’s. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Network Virtual Servers
Read Text Preview

Extract of sample "Network Virtual Servers"

Task: Network Virtual Servers Introduction Various hypervisors are available in the market with each system presenting unique features. As such, selecting an appropriate hypervisor for the desired purpose is a strenuous task. Of late two hypervisors, the Microsoft Hyper-V and VMware have outshined others in the market. However, the contemporary concern seeks to understand which software provides a better package. This scrip, hence, addresses this challenge by providing a comparative examination of the Hyper-V and VMware. An Overview In the earlier years, Microsoft has unveiled various host-staged virtualization systems; the company ventured into the hypervisor market in 2010 with the release of the Hyper-V. Similarly, VMware supplies numerous virtualization systems that are mainly host based. In the hypervisor market, the developer mainly offers two somewhat similar softwares, the ESX and ESXi (Finn & Lownds 23). The ESX is the company’s customary release and it entails the hypervisor and a developed management operation while ESXi is the firm’s latest release, and it is a hypervisor-only version. Integration structure Both the Hyper-V and ESXi do not demand an OS accompaniment since they connect directly on the hardware; however, their integration structure varies. The VMware has a direct driver structure where the application’s lines install on hardware, hence, linking the hardware and virtual gadgets servicing the server. As such, the structure incorporates the hardware drivers in the hypervisor. Similarly, the Hyper-V installs on the hardware but a structured application that propels the Window Server, directs all functions and hardware’s access. Considering this connection structure, the Hyper-V system is regarded to have an indirect driver structure (Finn & Lownds 134). Ease of management The simpler the structure of a hypervisor, the easer is its management. Management entails adopting and structuring hardware, installing virtual accompaniments, configuring the network among others. Software that incorporates and adjusts to these demands comfortably is easier to manage. The Hyper-V and the VMware incorporate and associateswith these structures in varying ways. The Hyper-V control entirely depends on a root partition plan done through a central Hyper-V manager. This plan is somewhat similar to other Microsoft management applications and demands little skills to launch. This tool, hence, controls basic virtual functions associated with the hardware. Importantly, an operator can control some hardware setups in the root partition using ordinary OS tools. Indeed, the tool is manageable remotely from a Vista system (Finn & Lownds 35). Notably, the Hyper-V manager system is capable of managing all virtual servers in the system concurrently and in an efficient manner. Tactically, using basic Microsoft devices provides the Hyper-V software with high degrees of flexibilities, hence, easing its management. The ESXi management is principally dependent on remote tools. The VI client and the Remote Command Line Interface (RCLI) are the two methods commonly used while configuring an ESXi host. The VI client is best suited for graphical configuration while remote line connection is ideal for line-based and scripted authentication. The VI client is a simpler version structured for the armature users while experienced users can adopt the other model, which is somewhat complex but fast and flexible (Finn & Lownds 12). The VI client may connect through a virtual center or direct to the ESXi host. Similarly, one can use command prompts from a remote computer to direct commands to a specific ESXi host or to the virtual station, which conducts commands. Importantly, an individual running the VI client or RCLI through a virtual station should first obtain permission from the concerned center, and one connecting directly to ESXi system, must have necessary credentials for executing desired commands (Finn & Lownds 56). Being a compressed version, the ESXi model lacks some basic management features. For instance, the software is not compatible with a Service Console plan and instead, it depends entirely on RCLI or VI Client systems as indentified. As such, managing an ESXi model is comparatively strenuous. Features The two systems present varying features with each scheme having an assortment of both strong and weak attributes. The subsequent is basic features of the Hyper-V and ESXi software. Hyper-V software comes with an assortment of Microsoft’s Server Management Suite Enterprise (SMSE) supplies, which enhances administration of the virtualization sections, model’s central system and hardware (Finn & Lownds 124). However, VMware software does not support most of such applications, and although the developer has attempted to develop own VMware protective and monitoring devices, the available package does not match the one provided by the SMSE. Additionally, the Hyper-V package works with all Windows 2008 platforms and avails a free Hyper-V Server. ESXi offers a free version of the software, but one must purchase a license before using advanced features provided by the model (Finn & Lownds 20). Importantly, the developer sells package according to CPU bases, such that there is a basic tax for the CPU’s. In contrast, the Microsoft’s free version is a reward product that includes the driver model, Hyper-V role and virtual elements only. Of worth, one can use the advanced application availed by the software without obtaining additional licenses. Scalability and operation requirements Hyper-V provides a system which is flexible than the ESXi because of its design. Initially, a Hyper-V is structured on Window’s platform. As such, the system blends well with common IT infrastructures and other devices (Finn & Lownds 25). Notably, the system borrows most of its attributes from the Window’s 2008 platform; hence, one can comfortably embrace the system since most people are familiar with windows. This varies with the ISXi system which operates on an entirely different model. Most of the feature presented by the VMware appear novel to the users, and since people are not familiar with its commands, operating the model becomes challenging (Finn & Lownds 38). Occasionally, Hyper-V system can run with fewer virtual devices than ESXi. This is apparent since one can run the program in any hardware structured to support Windows. This promotes the scalability of the scheme since the model can easily adapt to adjustments. Notably, the VMware system has a stiff structure that demands numerous configurations. This presents that VMware will always run in limited products an aspect that undermines the scalability of the system. Importantly, Microsoft commands the market in terms of provision of virtualization tools. As such, the Hyper-V has numerous operating tools that are lacking in the VMware. Presence of these tools promotes the compatibility of the system (Finn & Lownds 150). An important development accessed by Microsoft is the adoption of Intel’s 6-core processor that allows one to operate up to 24 cores. However, Microsoft is compatible with a few Linux distributions, hence, VMware provides a better solution since it accommodates larger number of platforms. Accessibility In terms of availability and mobility, VMware provides a superb structure. The model offers various packages such as the V-motion and the High Availability (HA) plan which promote their accessibility. Hyper-V avails a Quick Migration (QM) plan that functions similarly like V-Motion, facilitating movements of VM among the host Servers (Finn & Lownds 47). However, the Hyper-V’s system demands a downtime period where the system suspends and restarts the VM. In contrast, the V-motion performs the function without a downtime and at a faster rate. Moreover, the Microsoft provides a HA model, but its system depends on the MS clustering, hence, not efficient as one provided by the VMware system. Conclusion As indentified, each system has its own strengths and weaknesses; however, Hyper-V software has tactical strengths that outweigh VMware’s. A model appealing to me would be the one that has high scalability degrees, demands less expertise to operate and one that requires lesser upgrading costs. As such, the Hyper-V system seems to be best adapted under these considerations. These variables are essential since they mainly affect the adoption and efficiency of software. Apparently, changes ought to emerge since technology is every dynamic hence a system capable of adjusting to such changes and at a sustainable cost is effective. An idea of structuring the application on Window’s platforms appears rational since such a model can easily adjust to future advancements. Indeed, since the Hyper-V systems uses common Window’s drives, the cost of upgrading the system would be lesser; hence, Hyper-V emerges as an ideal system. Works Cited Finn, Aidan, and Patrick Lownds. Mastering Hyper-V Deployment. Indianapolis, Ind: Wiley, 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network virtual servers Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1599348-network-virtual-servers
(Network Virtual Servers Research Paper Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1599348-network-virtual-servers.
“Network Virtual Servers Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1599348-network-virtual-servers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Virtual Servers

Networks and System Administration

This term paper "Networks and System Administration" provided a description of the computer network implemented and management for Target Company.... Strategies on network scalability are essential to certain disaster recovery and business continuity, these policies are incorporated in the design to cater to the future growth of the company.... This implies that the implementation and the configuration of a computer network depend on the needs of that particular organization (Bagad 2009)....
16 Pages (4000 words) Term Paper

Annual Potential Loss Application Attack Threat

These enhancements will add even more layers of security to the basic proposed network architecture with greater concern for security.... It is widely accepted that the more layers of protection the more security, in this kind of network architecture.... Actually, network firewalls have no capacity what so ever to protect against custom web applications (Eschenauer and Gligor, 1)....
10 Pages (2500 words) Case Study

The Most Common Software-Defined Networks

An in-depth on how SDN is implemented is that the system is incorporated in underutilized servers that information technology organizations already operate and own.... Use this demonstration using a number of servers that are to listen to the same multicast address while the switch is being programmed to allow a single server to give air play to a single client in the case of video servers.... This is transparent to the end host in that clients and video servers are unaware of the switch managing or controlling the traffic (Anderson, c, et al, 2009 Remote Control SDN)....
4 Pages (1000 words) Essay

Virtual Network Design: DHCP Server

The paper 'virtual Network Design: DHCP Server' seeks to evaluate virtual network, which is a system that composed of virtual machines that are usually configured to manage or process external or internal network resources.... The author explains that connecting a network adapter to a physical computer requires a virtual machine to be connected or linked to a virtual network to which the physical adapter is connected....
4 Pages (1000 words) Term Paper

Fault tolerance and system/network survivability

This report considers a range of security issues involving survivability of distributed network systems and fault-tolerance of computer networks.... The security of these computer network systems are required to be established to support the new development of a Computer Forensic division called SCORP Forensics.... As part of its survivable systems initiative, it is compulsory to help foster a survivability network system and develop technologies to analyze and design survivability concepts [3, 10, 11]....
13 Pages (3250 words) Essay

Virtual Private Network

One of the technologies available in protecting the information systems environment is via the deployment of a virtual private network or VPN.... ??A virtual private network (VPN) is a private communications network often used by companies or organizations, to communicate confidentially over a public network.... Some of the threats or attacks faced by a network environment include: denial-of-service attacks, address spoofing, session hijacking, sniffers, compromise key attacks, data modifications, iddle, replay attacks, brute force, password guessers and dictionary attacks, and social attacks (Fortenberry, 2001)....
5 Pages (1250 words) Essay

Internet Protocol Internetworking - Reasons for Using VLAN in XUM

The virtual local area network is from the departments available in XUM.... The manager sets the range of virtual local area networks that can communicate via the trunk link (Ahmad, 2002).... The local area network segments do not limit it.... It also aids in isolating network problems and speed up the process of troubleshooting such a network.... It concerns ensuring that the wide-area network at Houston is in a position of accommodating the traffic in the entire network....
6 Pages (1500 words) Case Study

Server Virtualization

Dividing the functionality into clients and servers allows each to be specialized.... According to the research paper, modifying an existing service is an onerous task, oftentimes involving modifications to the clients and servers.... The solution is to modify the service outside of the domain of the clients or the servers (Hoopes et al, 2009).... A third entity, called a server virtualizer, is interposed between the clients and the servers....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us