Virtualization

by ;
Edition: CD
Format: Hardcover
Pub. Date: 2005-05-30
Publisher(s): Apress
List Price: $89.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$32.40
Online:60 Days access
Downloadable:60 Days
$43.20
Online:90 Days access
Downloadable:90 Days
$54.00
Online:120 Days access
Downloadable:120 Days
$64.80
Online:180 Days access
Downloadable:180 Days
$70.20
Online:1825 Days access
Downloadable:Lifetime Access
$107.99
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$70.20*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book did a great job explaining the different aspects of Virtualization. - Joe Topjian, Adminspotting.netCreating a virtual network allows you to maximize the use of your servers.Virtualization: From the Desktop to the Enterpriseis the first book of its kind to demonstrate how to manage all aspects of virtualization across an enterprise. (Other books focus only on singular aspects of virtualization, without delving into the interrelationships of the technologies.)This book promises to cover all aspects of virtualization, including virtual machines, virtual file systems, virtual storage solutions, and clustering, enabling you to understand which technologies are right for your particular environment. Furthermore, the book covers both Microsoft and Linux environments.

Table of Contents

About the Authors xvii
About the Technical Reviewer xix
Acknowledgments xxi
Introduction xxiii
Examining the Anatomy of a Virtual Machine
1(34)
Introducing VM Types
2(3)
Hardware Emulators
2(1)
Application Virtual Machines
3(1)
Mainframe Virtual Machine
3(1)
Operating System Virtual Machines
3(1)
Parallel Virtual Machines
3(2)
Deploying VMs
5(1)
Choosing VM Hardware
5(3)
Introducing Computer Components
8(3)
CPU
9(1)
RAM
9(1)
Hard Drive
10(1)
Introducing Virtual Disk Types: Microsoft and VMware
11(5)
Virtual Hard Disk and Virtual Disks
12(1)
Dynamically Expanding and Dynamic Disks
12(1)
Fixed and Preallocated Disks
13(1)
Linked and Physical Disks
13(1)
Undo and Undoable Disks
13(1)
Differencing Disks
14(1)
Persistent and Nonpersistent Independent Disks
14(1)
Append Disks
15(1)
Resizing Disks
15(1)
Introducing Networking
16(4)
VM Networking Protocols
17(1)
TCP/IP
17(1)
DHCP
17(1)
NAT
18(2)
Introducing Networking VMs
20(1)
Introducing Hardware
21(5)
Network Interface Card
22(1)
Switches
22(2)
Bios
24(1)
Generic SCSI
25(1)
I/O Devices
25(1)
Introducing VM Products
26(8)
Virtual PC
26(2)
VMware Workstation
28(1)
Microsoft Virtual Server 2005
29(2)
VMware GSX Server
31(1)
VMware ESX Server
32(1)
Virtual Infrastructure
33(1)
VMware VirtualCenter and VMotion
33(1)
VMware P2V Assistant
33(1)
Migrating Between VMs
34(1)
VMware ACE
34(1)
Summary
34(1)
Preparing a Virtual Machine Host
35(34)
Implementing Best Practices
35(1)
Evaluating Host Requirements
36(2)
Selecting a Motherboard
38(7)
CPU Speed and Quantity
40(1)
Controller Chipset
40(1)
Memory Requirements
41(1)
Bus Types
42(1)
Integrated Devices
43(1)
Board Form Factor
44(1)
Overall Quality
44(1)
Considering Your Network
45(8)
Public or Private VMs
45(2)
Availability and Performance
47(1)
Simplicity
48(1)
Mesh Networks
48(1)
Teaming and Load Balancing
49(1)
Network Adapter Teaming
49(2)
VM Networking Configurations
51(2)
Supporting Generic SCSI
53(3)
Windows Guests
53(2)
Linux Guests
55(1)
Considering Storage Options
56(11)
Physical Hard Drive Specifications
57(2)
Raid
59(2)
Host Disk Sizing
61(1)
Guest Disk Sizing
62(1)
Storage Area Networks
63(4)
Summary
67(2)
Installing VM Applications on Desktops
69(16)
Deploying VMs with Microsoft Virtual PC
69(2)
Installing VMware Workstation for Windows
71(3)
Installing VMware Workstation for Linux
74(4)
Installing the RPM
75(1)
Installing the TAR
76(2)
VM Host Tuning Tips
78(6)
Summary
84(1)
Deploying and Managing VMs on the Desktop
85(54)
Deploying VMs with VMware Workstation
85(7)
Installing VM Tools
92(9)
VMware Tools for Windows
93(2)
VMware Tools for Linux
95(1)
VMware Virtual Hardware Options for Windows and Linux
95(6)
Microsoft Virtual PC: Building a Windows VM
101(4)
Microsoft Virtual PC: Building a Linux VM
105(4)
Virtual PC Virtual Hardware Options
106(2)
Installing Virtual Machine Additions
108(1)
Managing VMs
109(19)
Backing Up and Modifying VM Configurations
109(6)
VMware *.vmx Configuration Files
115(2)
Virtual PC *.vmc Configuration Files
117(2)
Copying and Moving VMware Workstation Guest VMs
119(2)
VMware Universally Unique Identifiers
121(1)
Copying and Moving Virtual PC VMs to Other Hosts
121(2)
Running VMs As Services
123(5)
Introducing VM CLI Administration and Keyboard Shortcuts
128(6)
VMware Workstation CLI
129(2)
Virtual PC CLI Administration
131(3)
Monitoring and Configuring VM Performance
134(4)
VMware Performance Counters
135(2)
Virtual PC Performance Options
137(1)
Summary
138(1)
Installing and Deploying VMs on Enterprise Servers
139(34)
Installing Microsoft Virtual Server
140(3)
Installing VMware GSX Server for Windows
143(3)
Installing VMware GSX Server for Linux
146(4)
Installing the RPM
147(2)
Installing the TAR
149(1)
Installing the VMware Management Interface
150(2)
Working with the VMware Virtual Machine Console
152(1)
Changing GSX Server's Remote Console Port Number
153(1)
Installing VMware ESX Server
154(7)
Verifying ESX Server Configuration Information
161(1)
Viewing Configuration Files
161(2)
Using Linux Survival Commands
163(2)
Working with the Management Interface
165(1)
Understanding MUI and SSL
165(1)
Configuring the ESX Server Installation: Part One
166(4)
License Agreement
167(1)
Startup Profile
167(1)
Storage Configuration
167(1)
Swap File
168(1)
Network Configuration
168(1)
ESX Security
169(1)
Configuring the ESX Server Installation: Part Two
170(1)
Summary
171(2)
Deploying and Managing Production VMs on Enterprise Servers
173(50)
Deploying VMs with VMware GSX Server and ESX Server
173(5)
Building VMware GSX Server VMs
173(3)
Building VMware ESX Server VMs
176(1)
Mounting ISO Images
177(1)
Installing VM Tools for GSX Server and ESX Server VMs
178(2)
Using VMware Tools for Windows
178(1)
Using VMware Tools for Linux
179(1)
Configuring VMware GSX Server and ESX Server Virtual Hardware Options
180(13)
Hard Disk
181(1)
DVD/CD-ROM Drive
182(1)
Floppy Drive
182(1)
Ethernet Adapter
183(1)
Sound Adapter
183(1)
Configuring Legacy Devices
183(1)
Configuring Generic SCSI Devices
184(1)
Configuring a USB Controller
185(6)
Scripting ESX Server USB Connectivity
191(2)
Building Microsoft Virtual Server VMs
193(4)
General Properties
194(1)
Virtual Machine Additions
194(1)
Memory
195(1)
Hard Disks
195(1)
CD/DVD
195(1)
SCSI Adapters
196(1)
Network Adapters
196(1)
Scripts
196(1)
Floppy Drives
196(1)
COM Ports
197(1)
LPT Ports
197(1)
Managing Server-Class VMs
197(14)
Modifying VM Configurations: Renaming and Moving
197(3)
Using VMware Universally Unique Identifiers (UUIDs)
200(2)
Importing Workstation and GSX Server VMs into ESX Server
202(5)
Working with VMware GSX Server and ESX Server *.vmx Configuration Files
207(3)
Working with Virtual Server *.vmc Configuration Files
210(1)
Performing Command-Line Management
211(3)
VMware
211(2)
Microsoft
213(1)
Using the Windows System Preparation Tool
214(1)
Monitoring VM Performance
215(6)
Monitoring ESX Server Performance
215(4)
Monitoring VMware GSX Server Performance
219(1)
Monitoring Virtual Server Performance
220(1)
Performing Fault Monitoring and Fault Tolerance
221(1)
Summary
222(1)
Backing Up and Recovering Virtual Machines
223(40)
Performing Traditional Agent-Based Backups
224(6)
Running Backup Agents on VMs
224(6)
Running Backup Agents on the Host
230(1)
Performing Non-Agent-Based Backups
230(9)
Using Windows Backup
231(3)
Backing Up Linux File Systems
234(5)
Performing Flat-File Backups
239(20)
Running VMware Workstation Flat-File Backups
241(6)
Running VMware GSX Server Flat-File Backups
247(4)
Running Virtual PC 2004 Flat-File Backups
251(1)
Running Virtual Server 2005 Flat-File Backups
252(5)
Taking Online Snapshots
257(2)
Performing a Full System Recovery
259(2)
Restoring Online VM Backups
260(1)
Restoring Flat-File VM Backups
261(1)
Summary
261(2)
Using Virtual File Systems
263(46)
Introducing DFS
263(2)
Implementing Windows DFS
265(6)
Implementing Linux DFS
271(13)
Using Samba with Kerberos Authentication
284(1)
Adding Samba to Active Directory
285(1)
Setting Up Samba DFS Shares
286(2)
Introducing AFS
288(4)
Implementing AFS
292(10)
Installing AFS for Linux Systems
302(5)
Summary
307(2)
Implementing Failover Clusters
309(38)
Introducing Failover Clustering
310(5)
Defining Essential Terms
311(1)
Introducing Cluster Architecture
312(1)
Introducing N-tier Clustering
313(1)
Working with Failover Cluster Products
314(1)
Planning for Failover Clusters
315(5)
Choosing the Right Model
316(3)
Configuring Cluster Hardware
319(1)
Setting Up Microsoft Server Clusters
320(11)
Looking Under the Hood
320(3)
Planning Resource and Group Configuration
323(3)
Installing the Windows Server 2003 Cluster Service
326(2)
Using the Cluster Administrator
328(3)
Setting Up Linux Failover Clusters
331(14)
Setting Up the Red Hat Cluster Suite
331(2)
Using Linux-HA Clusters
333(12)
Summary
345(2)
Creating Load-Balanced Clusters
347(32)
Round-Robin DNS: The Beginning
349(2)
Planning for Load-Balanced Clusters
351(2)
Selecting Applications
351(1)
Verifying Licensing
351(1)
Analyzing Risks
352(1)
Estimating Server Capacity
352(1)
Building Windows Network Load-Balanced (NLB) Clusters
353(21)
Enabling the NLB Service
353(1)
Understanding Unicast and Multicast
354(2)
Understanding Convergence
356(1)
Setting Priority
357(1)
Setting Port Rules
358(1)
Understanding Remote Control
358(1)
Using the Network Load Balancing Manager
358(1)
Implementing Best Practices for NLB Cluster Implementations
359(1)
Configuring and Managing Windows NLB Clusters
360(14)
Building Linux Virtual Server (LVS) Clusters
374(3)
Understanding LVS Architecture
375(2)
Implementing LVS Implementation
377(1)
Summary
377(2)
Building Virtual Machine Clusters
379(34)
Building Microsoft VM Clusters
379(30)
Setting Up Windows Server Clusters
380(11)
Setting Up iSCSI Windows Server Clusters
391(13)
Installing the Windows Server 2003 Cluster Service
404(2)
Setting Up Windows NLB Clusters
406(3)
Building Linux VM Clusters
409(2)
Summary
411(2)
Introducing Storage Networking
413(22)
Introducing SCSI
414(7)
Speaking SCSI
414(1)
ID vs. LUN
415(1)
Using SCSI Buses
415(3)
Understanding Termination
418(3)
Introducing Fibre Channel
421(9)
Introducing Fibre Channel Cables
423(1)
Introducing Fibre Channel Hardware Devices
424(4)
Understanding Zoning
428(1)
Configuring Fibre Channel Hardware
429(1)
Extending the SAN with FCIP and iFCP
430(1)
Introducing iSCSI
430(2)
Understanding iSCSI Architecture
430(1)
Securing iSCSI
431(1)
Using SAN Backup and Recovery Techniques
432(2)
Performing LAN-Free Backups
432(1)
Performing Server-Free Backups
433(1)
Performing Serverless Backups
434(1)
Summary
434(1)
Virtualizing Storage
435(36)
Raid: The Root of Storage Virtualization
435(8)
Introducing Common Raid Levels
435(7)
Implementing Raid
442(1)
Introducing the SNIA Shared Storage Model
443(18)
Why a Model for Shared Storage?
444(1)
Benefits of the Model
445(1)
A Note on the Graphical Conventions Used in the Model
445(1)
The Classic Storage Model
446(1)
The SNIA Shared Storage Model
447(14)
Applying the SNIA Shared Storage Model
461(5)
Understanding Host-Based Architecture
461(2)
Understanding Storage-Based Architecture
463(1)
Understanding Network-Based Architecture
463(3)
Adding Fault Tolerance to the SAN
466(1)
Performing Backups
466(1)
Introducing Hierarchical Storage Management
466(1)
Using Virtual Tape Libraries
467(2)
Dividing Physical Libraries
468(1)
Writing to Magnetic Disk
468(1)
Summary
469(2)
Putting It All Together: The Virtualized Information System
471(24)
Reviewing the Elements of the Virtual IS
471(9)
Failover Cluster
472(1)
Load-Balanced Cluster
473(1)
Virtual Machine Host
474(2)
Storage Area Network
476(3)
Distributed File System
479(1)
Maintaining a Standby VM Server
480(14)
Setting Up the VM
482(1)
Maintaining a Standby Server with Scheduled Backups and Restores
483(1)
Maintaining a Standby Server with Shared Storage
483(2)
Maintaining a Standby Server with Disk Mirroring
485(4)
Automating Standby Server Startup
489(5)
Summary
494(1)
APPENDIX A Virtualization Product Roundup
495(32)
Global Namespace: The New Paradigm in Distributed Data Management
495(10)
The Problem: Network Data Management and Movement
496(1)
The Solution: Global Namespace
497(5)
StorageX Uses Global Namespace to Deliver a Complete Network Data Management Platform
502(1)
What Is Unique About the StorageX Global Namespace?
502(2)
Conclusion
504(1)
Server Consolidation and Beyond: Enhancing Virtual Machine Infrastructure Through Automation
505(14)
Evolution of Virtualization in the Data Center
506(1)
Enhancing Data Center Flexibility Through PlateSpin PowerP2V™
506(1)
Comparing Other Methods of Converting Between Physical and Virtual Machine Infrastructure with PlateSpin PowerP2V
507(3)
Replicating Entire Test Lab Environments Using Virtual Machines
510(1)
Using Virtual Machines As Hot Backup Servers for Planned and Unplanned Downtime
511(1)
Moving a Virtual Machine from One VM Host to Another (V2V)
512(1)
Production Server Virtualization
513(1)
Server Migrations Across Geographic Regions
514(1)
The Need for Continuous Resource Analysis and Rebalancing
514(1)
Dynamic Virtual Machine Portability: Using Virtual Machines to Prevent SLA Violations
515(1)
How Dynamic Virtual Machine Portability Can Enhance Business Service Management
516(3)
Conclusion
519(1)
Rocket Division Software
519(4)
iSCSI Target
519(2)
StarPort iSCSI Initiator, RAM Disk, and Virtual DVD Emulator
521(1)
Mission and Technologies
522(1)
Market Focus
523(1)
Network Instruments' Observer
523(4)
Too Much Traffic in the Kitchen
523(1)
Two Unique Networks Working Together
523(1)
Maximizing the Network
524(1)
Complete Network Control
524(1)
Capacity Analysis
524(1)
Proactive Management
525(1)
About Jack in the Box, Inc
525(1)
About Real-Time Expert
525(1)
About Advanced Single Probes, Advanced Multi-Probes, and Advanced Expert Probes
525(1)
About Network Trending
526(1)
About ``What-If'' Analysis
526(1)
About Network Instruments, LLC
526(1)
Index 527

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.