Verified Document

Virtualization Virtual Networks The Creation Term Paper

Three different types of basic switches can be built and utilized in a Hyper-V virtual network: internal, external and private switches (Virtuatopia, 2012). An external switch at the top layer of a Hyper-V virtual network and controls access to/routes transmissions in and out of the virtual network, maintaining communication between the virtual network and the external physical network (Virtuatopia, 2012). Once inside the network, an internal switch works much like a standard virtual switch, replicating the actions and functionality of a physical switch in a traditional network and controlling/routing transmissions from terminal to terminal within the virtual network and especially between the parent partition and child partitions (Virtuatopia, 2012). A private switch creates links and controls between child partitions within the virtual network, but do not provide a route to the parent partition or the external switch and thus are more contained (Virtuatopia, 2012). Hyper-V's switch schema offers a greater ability to partition elements in the network, with switches designed for this specific purpose (Virtuatopia, 2012). All of the switches work in similar ways, but the different controls and connections they provide are directly related to the functionality of the virtual network.

Hyper-V and Windows Server 2008

Understanding virtual networks and environments and actually putting them to use are two different things, and while in theory a great number of virtual machines could be set up on any one piece of computing hardware there is ultimately a limit in the usefulness of each of these virtual environments related to the speed and capacity of the hardware. At the same time, it is estimated that most servers typically utilize only approximately ten percent of their hardware capacity, largely as a result of the partitioning needs of many user requirements...

With Hyper-V, which is a part of the Windows Server 2008 operating system, partitioning can be achieved through the creation of multiple virtual machines or environments on a single server, each running as a virtual server fully partitioned form the others (Petri, 2009). Given the 10% figure above, it could be assumed that each server could handle ten guests, however cutting this almost half in to six will provide much greater reliability and in certain settings this number should be reduced further to allow for increased traffic from each guest (Petri, 2009).
As the setting described requires the ability to support 25 guests, there will need to be a total of five servers which would yield a total of 30 partitions -- enough to allow for some overflow or expanions. After acquiring the servers, creating the partutions and the full network is relatively straightforward. The virtual networks can be created using the existing Hyper-V application in the Windows Server 2008 OS, and external networking to user terminals completes the package.

References

Fratto, M. (2011). Virtualization. Accessed 9 October 2012. http://www.quora.com/Virtualization/How-does-virtual-environment-work

Petri, D. (2009). Implementing Hyper-V in Windows Server 2008. Accessed 9 October 2012. http://www.petri.co.il/implementing-hyper-vision-hyperv-windows-server-2008.htm

Virtuatopia. (2009). Understanding and Configuring Hyper-V Virtual Networks. Accessed 9 October 2012. http://www.virtuatopia.com/index.php/Understanding_and_Configuring_Hyper-V_Virtual_Networks

VMware. (n.d.). VMware Virtual Networking Concepts. Accessed 9 October 2012. http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf

Sources used in this document:
References

Fratto, M. (2011). Virtualization. Accessed 9 October 2012. http://www.quora.com/Virtualization/How-does-virtual-environment-work

Petri, D. (2009). Implementing Hyper-V in Windows Server 2008. Accessed 9 October 2012. http://www.petri.co.il/implementing-hyper-vision-hyperv-windows-server-2008.htm

Virtuatopia. (2009). Understanding and Configuring Hyper-V Virtual Networks. Accessed 9 October 2012. http://www.virtuatopia.com/index.php/Understanding_and_Configuring_Hyper-V_Virtual_Networks

VMware. (n.d.). VMware Virtual Networking Concepts. Accessed 9 October 2012. http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Principles of Green Computing and Environmental Protection
Words: 4864 Length: 16 Document Type: Essay

Green computing is a term used to refer to the proper handling and disposal of computer parts. It is a term that has come of late with the need to have a clean environment devoid of unnecessary pollution on the environment. It is known fact that computers are made of non-biodegradable material, which is mainly plastic in nature. Disposal of used computers can cause environmental degradation if not well done.

Input/Output Devices Will You Be Using in
Words: 2506 Length: 9 Document Type: Essay

input/output devices will you be using in the next one to three years as "computing" devices? Which features/components/form factors will be prominent? Why? Which features/components/form factors will be important to you? Why? Which applications will you be using on these devices? How may these devices change your life in terms of benefits and risks? (Two pages) A survey of experts identified five major themes that will carry forward through the next

New Generation Technology CRM at
Words: 2581 Length: 8 Document Type: Research Proposal

Figure 2: Dell Inc. Marketing and Manufacturing Process Integration Based on analysis of Sources: (Kapuscinski, Zhang, Carbonneau, Moore, Reeves, 2004) (Gunasekaran, Ngai, 2009) (Bilek, 2010) Discussion of Current Business Issues Today Dell suffers from not having enough insight into the most critical customer relationships necessary to grow its emerging virtualization and Cloud computing businesses, as the company's approach to managing by technology instead of customers created a very myopic mindset. The transition from being

Delphi Study Influence of Environmental Sustainability Initiatives...
Words: 17687 Length: 60 Document Type: Literature Review

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

Cloud Computing
Words: 3424 Length: 10 Document Type: Essay

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now