Provide a rough estimate of the number of physical machines

Assignment Help Computer Engineering
Reference no: EM133511238

Discussion Post

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

This Discussion Board assignment will have 3 parts that are all related to justifying virtualization to your management. They are as follows:

A. Download a virtual workstation. Showing management an actual demonstration is helpful in making a case for virtualization.
B. Read a story from an expert who has experience with virtualization.
C. Research and provide a written recommendation for virtualization. This will be shared with your classmates in a discussion.

Download a Virtual Workstation

To convince management that virtualization provides efficiencies for the corporation, you need to demonstrate what virtualization is. A very effective manner is to demonstrate how virtualization works, such as showing a host machine with a virtual machine using a different operating system.

For the first part of the Discussion Board assignment, you are to download the virtual workstation from this Web site.

The site may require you to sign in. The download is an evaluation copy. Provide a screen capture of the virtual workstation after installation

Story

A few years ago, I worked as a configuration manager for a geographic information systems (GIS) company that had offices in Denver, Calgary, Ottawa, Munich, Prague, and Jakarta. The company had five aircraft that were equipped with systems developed internally, including radar and acquisition software. The radar system was developed in Munich, software development was done in Calgary and Denver, and editing was done in Ottawa and Jakarta. We did not have a disaster recovery plan in place, and the development team stored their source code in a server in Calgary. As a configuration manager, I expressed concern that we did not have a way to recover from disaster, but there was never money to implement a proper disaster recovery plan.

A few months went by, and one day, we got a frantic call from the lead developer in Calgary. Their source control server crashed, and they needed a replacement quickly. We did not have a replacement server, so we had to order it from our preferred vendor. When the server came to the Denver office, it was configured with the proper patches for the operating system, and the server was shipped to Calgary. The Calgary office installed the source control application and restored the last known database image. By the time the server was ready for production, three weeks had passed. Meanwhile, the developers were making changes to code without saving it first. The merging of code took another week.

As it typically happens in industry, after a disaster, upper management finds funds to fix the issue. I got a modest $1,500 budget to do whatever I could to implement a disaster recovery plan for source code. I proposed to migrate the source code repository to Denver. I then purchased an old Xenon server for $1,000 and was able to obtain 64 gigabytes (GB) of random access memory (RAM) from our information technology (IT) team. They had a few memory chips laying around, unused. I purchased four 1 terabyte (TB) external drives for the machine and installed VMWare (we had a license that was no longer used). I created four virtual machines in that server, allocating 8 GB of RAM to each virtual machine, and 300GB of external space for each. One of the virtual machines was configured just like the Calgary server, using a Linux operating system. We changed the process so that the developers checked in their code in the virtual machine in Denver. Every night, the virtual machine environment was copied to Calgary and Ottawa. A host machine was created in servers in Calgary and Ottawa to serve as secondary servers in case the main server crashed. The disaster recovery plan was designed to be able to boot up a virtual machine in any of the three locations (Denver, Calgary, or Ottawa) in case of a problem affecting the server in these offices. We ran a test and were able to restore functionality after 20 minutes of losing a server in an office. The other virtual machines in Denver were used to create the application build, to test the installation, and to create automation test scripts. The project was a success, and we were able to demonstrate how we could improve our process with limited funds.

Moral

Demonstrating how virtual machines can provide flexibility and disaster recovery capabilities will change the executive team's initial resistance to migrate to a virtual environment.

Discussion

Investigate the library and Internet for information about virtual technologies for data center virtualization, data management, and virtual storage.

Complete the following for this discussion:

1. Based on your research, provide a recommendation for a proposed target platform for a typical host machine, including the number of central processing units (CPUs), the amount of memory, the number of network interface cards, and the amount of local storage required.

2. Based on your research of reported virtualization metrics, provide a rough estimate of the number of physical machines that can be virtualized in a host machine for a typical data center environment

3. Justify your selection by identifying the problems that these methods will solve and the benefits that will be achieved by using these methods.

Reference no: EM133511238

Questions Cloud

Describe details of the coso internal control framework : Describe details of the COSO internal control framework and processes in relation to Sarbanes-Oxley Act (SOX) compliance.
What steps have you taken to continue to develop : What steps have you taken to continue to develop your problem space? What recommendations you would make to your peers regarding thinking through the problem
Write an application that inputs from the user : Write an application that inputs from the user the radius of a circle as an integer and prints the circle's diameter, circumference and area.
Explain your selected topic and why you find it interesting : identify and explain your selected topic and why you find it interesting. Summarize the opposing viewpoints outlined in the Points of View
Provide a rough estimate of the number of physical machines : Provide a rough estimate of the number of physical machines that can be virtualized in a host machine for a typical data center environment.
What ways could your chosen service improve their : Why is it difficult to provide a clear definition of abuse and neglect? what ways could your chosen service improve their partnerships with families?
Explain how virtualization can benefit tsg in area of server : Explain how virtualization can benefit TSG in the areas of server and desktop consolidation, data replication, backup and archiving, VoIP, and cloud computing.
How has social media impacted comedy : How has social media impacted comedy? Has the impact of social media been positive or negative? Has social media and going viral impacted the art of comedy?
Vietnam military in the position of marine back : Fred Smith is a renowned leader who founded FedEx Inc. after serving in the Vietnam military in the position of a marine back.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many telemarketers should be scheduled each day of week

The Gaubert Marketing Company needs the following number. How many telemarketers should be scheduled each day of the week to begin their five-day work week?

  Why did the authors use the one-way anova test

Write a 2- -page critique of the article you found. In your critique, include responses to the following: USE HEADINGS

  Generating class diagram and pseudocode

Develop a class named CustomerRecord which holds a customer number, name, and address. Incorporate different methods in order to set the values for each data field and output values for each data field.

  Discuss difference between identification and authentication

What is the difference between Identification and Authentication

  Explain what you imagine are future challenges

Explain what you imagine are future challenges to securing the cyber domain, including those you discussed. Will we ever eliminate these challenges

  Critique or defend the use of the application

Explain the advantages and disadvantages of each. If you locate such a guide online, please make sure you give credit where credit is due.

  What is not working properly since you can get to a site

What isn't working properly, since you can get to a site via the Internet but can't get the domain name CNN to be recognized?

  Construct and solve the two recurrence equations

Construct and solve the two recurrence equations(one for each of the recursive methods) and get the big Theta time complexity for each

  Create an index on the last name column

Create an index on the last name column. Explain what type of index you created and why - Explain Plan to analyze performance of a query to find all customers

  Write a program that reads ten characters into a linked list

Write a java program that reads ten characters into a linked list and displays them in the reverse of the order in which they were read.

  Define the architectural features of a super computer system

Study the following architectural features of a micro-, a mini-, a large-scale, and a super computer system with an MCU you have access.

  Study and analyze the principles of inheritance

Study and analyze the principles of inheritance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd