ITSA2006 Server Virtualization Assignment Problem

Assignment Help Computer Networking
Reference no: EM132389006

ITSA2006 Server Virtualization Assignment - Victorian Institute of Technology, Australia

Practical Assignment - A virtualization infrastructure with Distributed Resource Scheduler - DRS and Hihg Availability - HA. Setup the VMware VCenter 6, VMWare ESXi 6 and perform tasks listed in the following section.

Reference Style - In this course, the Harvard reference style is prefered. Pelase familiarize yourself with the style. Your ability to use proper academic style will form part of the Assessment.

Tasks -

1. VMware ESXi

a. Deploy and Configure ESXi Host(s)

b. Use VSphere Client to manage the ESXi

2. Configure vNetwork Standard Switches

a. Plan and configure vSphere networking

b. Vmnics on a vSphere standard switch

c. Configure vmkernel ports for network services

d. Port groups on a vNetwork standard switch

3. VMWare VCentre

a. Deploy and Configure VCentre

b. Configure DataCenter

c. Add ESXi Host and enable locked down mode

d. Roles and Permissions

e. Assign restricted permissions to accounts

f. Establish vCenter Administrator Permissions

g. Create Custom Role to manage Virtual Machine (cannot delete the VMs)

4. Storage

a. Configure the iSCSI / Shared Storage

b. Configure LUNs and iSCSI Storage

c. Create a new, single volume VMFS that does not use all available space

d. Build a new VMFS volume on a SAN LUN

e. Partition and Format a LUN VMFS

f. Add a second LUN

g. Grow a VMFS

5. Create and Deploy Virtual Machines

a. Deploy Virtual machines

b. Hot Add a Virtual Disk

c. Hot Extend a Virtual Disk

d. Grow the VM System Drive

6. vCenter Alarms

a. Configure a VM Alarm

7. Virtual Machine Migration

a. Create a VMkernel Port for VMotion

b. Cold migrate a windows VM onto the Shared SAN LUN

c. Power on the VMs and verify that they are running on shared SAN storage

d. Add a second ESXi host to VMWare vCenter server

e. Hot migrate a VM from one ESXi host to the second host

f. Use VMWare Storage VMotion to migrate the storage of a hot VM onto a shared SAN LUN

8. VMWare Distributed Resource Scheduler

a. Create the DRS Cluster and configure rules

b. Add Hosts to the Cluster

c. Migrate VMs onto a Single ESXi Host to Unbalance the Cluster

9. VMWare High Availability (HA)

a. Configure HA Cluster

b. Prepare for A Host Failure

c. Simulate an ESXi Hosts Failure

10. Deploy and configure a VMWare feature / add on of your choice

11. Network and Infrastructure Doucmentation

a. Document ESXi Name, Network Settings

b. Document Virtual Network Infrasture

c. Document VCenter details

d. Document DRS and HA Configuration

e. Physical / Logical Network Diagram.

Reference no: EM132389006

Questions Cloud

GRA 41421 Data Management and Python Programming Assignment : GRA 41421 Data Management and Python Programming Assignment help and Solutions, BI Norwegian Business School, Norway-Create variables called total and average.
Explain impact new cryptographic security architecture : Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.
HTH-620 Practical Theology Assignment Problem : HTH-620 Practical Theology Assignment Help and Solution, Grand Canyon University Homework Help - Define theology and describe the various disciplines
Discussion about sustaining quality of life in the city : In this course, you explore and contribute readings to the dialogue about sustaining quality of life in the city. Each week, you read the assigned articles.
ITSA2006 Server Virtualization Assignment Problem : ITSA2006 Server Virtualization Assignment Help and Solution, Victorian Institute of Technology, Australia - Configure vNetwork Standard Switches
Approaches of the ethical egoist and the utilitarian : How would Kant's approach to this kind of example differ from the approaches of the ethical egoist and the utilitarian?
How andragogy only focuses solely on the individual : This chapter discusses how andragogy only focuses solely on the individual and is not an all-encompassing theory of learning. The chapter argues that one.
Create a personal core values statement : Create a personal core values statement. This statement should serve as a framework for the potential creation of both a vision and mission statement.
Auditing tools for windows systems : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.

Reviews

Write a Review

Computer Networking Questions & Answers

  Examine the major types of networks and hardware

Determine the network that you would implement and the hardware that you would need.

  Bull an application on computer a in network 1 is sending a

bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp

  Detail explanation of the designing the network

The report should have a detail explanation of the planning and designing of the network. It is recommended that bullet points are only included

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Discuss the reasons to choose the given countermeasures

Discuss the reasons to choose those countermeasures. In addition, discuss the benefits and limitations of each countermeasure.

  Question 1broadly sort and discuss the types of safekeeping

question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer

  One-way to solidify the concepts of clientserver computing

one-way to solidify the concepts of clientserver computing and interprocess communication is to develop the

  Discuss the type of local area network topology and protocol

Discuss the type of local area network topology and protocol that you would recommend. Show also the connection that provides Internet access.

  Network utilization between office and hospital mainframe

Discussion of network utilization between office and hospital mainframe and Decreased turn time for test results

  Examine the major disadvantages of cloud computing

Many organizations have now adopted or begun to offer cloud computing. Examine advantages and disadvantages of cloud computing for two selected organizations.

  How does a transparent switch work

What is the primary disadvantage? How does a transparent switch work? What is the purpose of a virtual LAN?

  Security in wireless networks is a key issue

Security in wireless networks is a key issue. WPA, WEP, RADIUS, and TKIP are key encryption technologies used to make the wireless LANs secure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd