Annex B Virtualization Lesson Plan 1
Annex B Virtualization Lesson Plan 1
Annex B
DS.02.01
Virtualization
Student Outline
Data Systems Administrator Course
M09CVQ1
Date of Revision: 20211014
Table of Contents
Terminal Learning Objective ....................................................................................................... 3
Enabling Learning Objectives ...................................................................................................... 3
Introduction to Virtualization ................................................................................................ 5
1. Performance ...................................................................................................................... 13
2. Ecosystem .......................................................................................................................... 13
3. Management Tool .............................................................................................................. 13
4. Live Migration .................................................................................................................... 13
5. Cost .................................................................................................................................... 13
Characteristics of Virtual Machines ...................................................................................... 14
Page 2 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
2. Without the aid reference, identify in writing the characteristics of virtual environments,
in accordance with 0671-IMPL-1001
4. Without the aid of reference, identify in writing the types of virtualization technology, in
accordance with 0671-IMPL-1001.
6. Without the aid of reference, identify in writing the types of hypervisors, in accordance
with 0671-IMPL-1001.
8. Without the aid of reference, identify in writing the characteristics of virtual machines,
in accordance with 0671-IMPL-1001.
9. Without the aid of reference, identify in writing the requirements for virtualization
regarding virtual machines, in accordance with 0671-IMPL-1001.
Page 3 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
10. Without the aid of reference, identify in writing the purpose of storage virtualization, in
accordance with 0671-IMPL-1001
11. Without the aid of reference, identify in writing the types of datastores, in accordance
with 0671-IMPL-1001.
12. Without the aid of reference, identify in writing the characteristics of networked
attached storage, in accordance with 0671-IMPL-1001.
13. Without the aid of reference, identify in writing the characteristics of a storage area
network, in accordance with 0671-IMPL-1001.
14. Without the aid of reference, identify in writing the characteristics of VMware storage
virtualization (VSAN) in accordance with 0671-IMPL-1001.
15. Without the aid of reference, identify in writing the characteristics of best practices for
software defined storage in accordance with 0671-IMPL-1001
16. Without the aid of reference, identify in writing the characteristics of virtual
management tools, in accordance with 0671-IMPL-1001.
17. Without the aid of reference, identify in writing the characteristics of virtual switch, in
accordance with 0671-IMPL-1001.
18. Without the aid of reference, identify in writing the characteristics of virtual distributed
switch in accordance with 0671-IMPL-1001.
Page 4 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Introduction to Virtualization
What is virtualization
Virtualization is the creation of a virtual – (rather than actual)—version of something, such as
an operating system (OS), a server, a storage devices or network resources. Virtualization uses
software that simulates hardware functionality in order to create a virtual system. This practice
allows IT organizations to operate multiple operating systems, more than one virtual system
and various applications on a single server. The benefits of virtualization include greater
efficiencies and economies of scale.
Software called hypervisors separate the physical resources from the virtual environments—the
things that need those resources. Hypervisors can sit on top of an operating system (like on a
laptop) or be installed directly onto hardware (like a server), which is how most enterprises
virtualize. Hypervisors take your physical resources and divide them up so that virtual
environments can use them.
Resources are then partitioned as needed from the physical environment to the many virtual
environments. Users interact with and run computations within the virtual environment
(typically called a guest machine or virtual machine).
When the virtual environment is running and a user or program issues an instruction that
requires additional resources from the physical environment, the hypervisor relays the request
to the physical system and caches the changes—which all happens at close to native speed
(particularly if the request is sent through an open source hypervisor based on KVM, the Kernel-
based Virtual Machine).
OS virtualization is the use of software to allow a piece of hardware to run multiple operating
system images at the same time. The technology got its start on mainframes decades ago,
allowing administrators to avoid wasting expensive processing power.
Page 5 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
2. Virtualization
The virtualization layer is responsible for recreating the same or a different environment where
the guest will operate
3. Host
The host represents the original environment where the guest is supposed to be managed
Page 6 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Characteristics of Virtualization
VM’s have the following characteristics, which offer several benefits.
1. Partitioning
2. Isolation
3. Encapsulation
4. Hardware Independence
Page 7 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
1. Desktop Virtualization
Desktop virtualization is when the host server can run virtual machines using a hypervisor (a
software program). A hypervisor can directly be installed on the host machine or over the
operating system (like Windows, Mac, and Linux). Virtualized desktops don’t use the host
system’s hard drive; instead, they run on a remote central server. This type of virtualization is
useful for development and testing teams who need to develop or test applications on different
operating systems. The three most popular types of desktop virtualization are Virtual desktop
infrastructure (VDI), Remote desktop services (RDS), and Desktop-as-a-Service (DaaS).
2. Application Virtualization
This is abstracting the application layer away from the operating system. This way, the
application can run in an encapsulated form without being depended upon on by the operating
system underneath. This can allow a Windows application to run on Linux and vice versa, in
addition to adding a level of isolation. One advantage is maintaining a standard cost-effective
operating system configuration across multiple machines by isolating applications from their
local operating systems. There are additional cost advantages like saving on license costs, and
greatly reducing the need for support services to maintain a healthy computing environment.
3. Server Virtualization
Server virtualization is a process of partitioning the resources of a single server into multiple
virtual servers. These virtual servers can run as separate machines. Server virtualization allows
organizations to run multiple independent OSs (guests or virtual) all with different
configurations using a single (host) server. The process also saves the hardware cost involved in
keeping a host of physical servers, so businesses can make their server infrastructure more
streamlined.
4. Network Virtualization
Page 8 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Network virtualization helps manage and monitor the entire computer network as a single
administrative entity. Administrators can keep a track of various elements of network
infrastructure such as routers and switches from a single software-based administrator’s
console. Network virtualization helps network optimization for data transfer rates, flexibility,
reliability, security, and scalability. It improves the overall network’s productivity and efficiency.
It becomes easier for administrators to allocate and distribute resources conveniently and
ensure high and stable network performance.
5. Storage Virtualization
Storage virtualization is the process of pooling physical storage of multiple network storage
devices so it looks like a single storage device. Storage virtualization facilitates archiving, easy
backup, and recovery tasks. It helps administrators allocate, move, change and set up resources
efficiently across the organizational infrastructure. An example would be VMware vSAN.
When a server oversees multiple operating systems with diverse users and functions, the
hypervisor’s ability to isolate each operating system is crucial in ensuring the users can each
maintain clean data which isn’t affected by the other systems in their server. The hypervisor
makes virtualization a great tool for testing new software. Let’s say a unit administrator is
looking to use a new application on the server. How can he tell if the new program is going to
affect the other programs in my system? In a traditional operating system, any problems
caused by a new application would require them to test each individual application to decide
which one is negatively affected by the new installation. With a VM, they can simultaneously
run multiple systems to see how the new application interacts with the whole.
Page 9 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
The most commonly deployed type of hypervisor is the type 1 or bare-metal hypervisor, where
virtualization software is installed directly on the hardware where the operating system is
normally installed. Because bare-metal hypervisors are isolated from the attack-prone
operating system, they are extremely secure. In addition, they generally perform better and
more efficiently than hosted hypervisors. For these reasons, most enterprise companies choose
bare-metal hypervisors for data center computing needs.
While bare-metal hypervisors run directly on the computing hardware, hosted hypervisors run
on top of the operating system (OS) of the host machine. Although hosted hypervisors run
within the OS, additional (and different) operating systems can be installed on top of the
hypervisor. The downside of hosted hypervisors is that latency is higher than bare-metal
hypervisors. This is because communication between the hardware and the hypervisor must
pass through the extra layer of the OS. Hosted hypervisors are sometimes known as client
hypervisors because they are most often used with end users and software testing, where
higher latency is less of a concern.
Hardware acceleration technology can create and manage virtual resources faster by boosting
processing speed for both bare-metal and hosted hypervisors. A type of hardware accelerator
known as a virtual Dedicated Graphics Accelerator (vDGA) takes care of sending and refreshing
high-end 3-D graphics. This frees up the main system for other tasks and greatly increases the
display speed of images. For industries such as oil and gas exploration, where there is a need to
quickly visualize complex data, this technology can be very useful.
Both types of hypervisors can run multiple virtual servers for multiple tenants on one physical
machine. Public cloud service providers lease server space on the different virtual servers to
different companies. One server might host several virtual servers that are all running
workloads for different companies. This type of resource sharing can result in a “noisy
neighbor” effect, when one of the tenants runs a large workload that interferes with the server
performance for other tenants. It also poses more of a security risk than using a dedicated bare-
metal server.
A bare-metal server that a single company has full control over will always provide higher
performance than a virtual server that is sharing a physical server’s bandwidth, memory and
processing power with other virtual servers. The hardware for bare-metal servers can also be
optimized to increase performance, which is not the case with shared public servers. Businesses
Page 10 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
that need to comply with regulations that require physical separation of resources will need to
use their own bare-metal servers that do not share resources with other tenants.
Type 1 hypervisors:
These hypervisors offer advanced features and scalability, but require licensing, so the costs are
higher.
There are some lower-cost bundles that VMware offers and they can make hypervisor
technology more affordable for small infrastructures.
VMware is the leader in the Type-1 hypervisors. Their vSphere/ESXi product is available in a
free edition and 7 commercial editions.
2. Microsoft Hyper-V
The Microsoft hypervisor, Hyper-V doesn’t offer many of the advanced features that VMware’s
products provide. However, with XenServer and vSphere, Hyper-V is one of the top 3 Type-1
hypervisors.
It was first released with Windows Server, but now Hyper-V has been greatly enhanced with
Windows Server 2012 Hyper-V. Hyper-V is available in both a free edition (with no GUI and no
Page 11 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
virtualization rights) and 4 commercial editions – Foundations (OEM only), Essentials, Standard,
and Datacenter. Hyper-V
Type 2 hypervisors:
1. VMware Workstation/Fusion/Player
It is intended to run only one virtual machine (VM) and does not allow creating VMs.
VMware Workstation is a more robust hypervisor with some advanced features, such as record-
and-replay and VM snapshot support.
For running multiple different operating systems or versions of one OS on one desktop,
For developers that need sandbox environments and snapshots, or
For labs and demonstration purposes.
2. VMware Server
VMware Server is a free, hosted virtualization hypervisor that’s very similar to the VMware
Workstation.
VMware has halted development on Server since 2009
3. Microsoft Virtual PC
This is the latest Microsoft’s version of this hypervisor technology, Windows Virtual PC and runs
only on Windows 7 and supports only Windows operating systems running on it.
4. Oracle VM VirtualBox
VirtualBox hypervisor technology provides reasonable performance and features if you want to
virtualize on a budget. Despite being a free, hosted product with a very small footprint,
VirtualBox shares many features with VMware vSphere and Microsoft Hyper-V.
Red Hat’s Kernel-based Virtual Machine (KVM) has qualities of both a hosted and a bare-metal
virtualization hypervisor. It can turn the Linux kernel itself into a hypervisor so the VMs have
direct access to the physical hardware.
Page 12 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Characteristics of Hypervisors
1. Performance
Look for benchmark data that shows how well the hypervisor performs in a production
environment. Ideally, bare-metal hypervisors should support guest OS performance close to
native speeds.
2. Ecosystem
Look for good documentation and technical support to implement and manage hypervisors
across multiple physical servers at scale. Also, look for a healthy community of third-party
developers that can support the hypervisor with their own agents and plugins that offer
capabilities, such as backup and restore capacity analysis and fail-over management.
3. Management Tool
Running VMs isn’t the only thing you must manage when using a hypervisor. You must
provision the VMs, maintain them, audit them, and clean up disused ones to prevent "VM
sprawl." Ensure that the vendor or third-party community supports the hypervisor
architecture with comprehensive management tools.
4. Live Migration
This enables you to move VMs between hypervisors on different physical machines without
stopping them, which can be useful for both fail-over and workload balancing.
5. Cost
The management software that makes it scalable to support an enterprise environment can
often be expensive. The vendor’s licensing structure, which may change depending on
whether you deploy it in the cloud or locally.
Page 13 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
VMs are isolated from the rest of the system, and multiple VMs can exist on a single piece of
hardware, like a server. They can be moved between host servers depending on demand or to
use resources more efficiently. Each operating system runs in the same way an operating
system or application normally would on the host hardware, so the end user experience
emulated within the VM is nearly identical to a real-time operating system experience running
on a physical machine
1. CPU
The CPU, or processor, is the component of a computer system that performs the tasks
required for computer applications to run. The CPU is the primary element that performs the
computer functions. CPUs contain cores. vCPU is the abbreviation for virtual centralized
processing unit. As for a definition, a vCPU represents a portion or share of the underlying,
physical CPU that is assigned to a particular virtual machine (VM).
2. Memory (RAM)
The memory resource settings for a virtual machine determine how much of the host's memory
is allocated to the virtual machine. The virtual hardware memory size determines how much
memory is available to applications that run in the virtual machine. A virtual machine cannot
benefit from more memory resources than its configured virtual hardware memory
size. ESXi hosts limit the memory resource use to the maximum amount useful for the virtual
machine, so that you can accept the default of unlimited memory resources.
The network adapter (NIC) on a virtual machine assist in connecting to a network, to enhance
communications, or to replace an older adapter. When an administrator adds a NIC to a virtual
machine, they select the adapter type, network connection, whether the device should connect
when the virtual machine is turned on. Will function as VMXNET if VMWARE Tools are
installed. VMXNET is optimized for performance in a virtual machine. Because operating system
vendors do not provide built-in drivers for this card, you must install VMware Tools to have a
driver for the VMXNET network adapter available.
Page 14 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
* vSphere supports two models of storage provisioning, thick provisioning and thin
provisioning.
Thick provisioning
It is a traditional model of the storage provisioning. With the thick provisioning, large amount of
storage space is provided in advance in anticipation of future storage needs. However, the
space might remain unused causing underutilization of storage capacity.
Thin provisioning
This method contrast with thick provisioning helps eliminate storage underutilization problems
by allocating storage space in a flexible on-demand manner. Thin provisioning allows the ability
to report more virtual storage space than there is real physical capacity. When thin provisioning
is used, monitor actual storage usage to avoid conditions when the amount of physical storage
space is low. (This is the preferred method)
Page 15 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
The process involves extracting and covering the internal functions of a storage device from the
host application, host servers or a general network in order to enable the application and
network-independent management of storage.
Storage virtualization is also known as cloud storage. Storage virtualization helps by facilitating
easy backup, archiving and recovery tasks by consuming less time and possibly restoring lost or
corrupted data.
Page 16 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
vCenter Server (VCSA) and ESXi support the following types of datastores.
Datastores that you deploy on block storage devices use the vSphere Virtual Machine File
System (VMFS) format. VMFS is a special high-performance file system format that is optimized
for storing virtual machines. Can be extended to span over physical storage devices.
An NFS client built into ESXi uses the Network File System (NFS) protocol over TCP/IP to access
a designated NFS volume. The volume is located on a NAS server. The ESXi host mounts the
volume as an NFS datastore, and uses it for storage needs. (This is seldom being used in the
USMC)
3. vSAN
vSAN aggregates all local capacity devices available on the hosts into a single datastore shared
by all hosts in the vSAN cluster. This is the preferred method.
4. vVol
vVols datastore represents a storage container in vCenter Server and vSphere Client. (Rarely
used within USMC)
Page 17 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
A Network File System (NFS) allows remote hosts to mount file systems over a network and
interact with those file systems as though they are mounted locally. This enables system
administrators to consolidate resources onto centralized servers on the network. NFS is good
for UNIX server-to-server file sharing.
Using the SMB protocol, an application (or the user of an application) can access files or other
resources at a remote server. This allows applications to read, create, and update files on the
remote server. SMB can also communicate with any server program that is set up to receive an
SMB client request. The native Windows network file sharing protocol is the preferred
protocol for Windows clients.
AFP is a network file control protocol system specifically designed for Mac-based platforms. AFP
is common for faster networks where large files need to be transferred. (This is rarely used on
most USMC networks)
Page 18 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Common Internet File System (CIFS) is a network file system protocol used for providing shared
access to files and printers between machines on the network. A CIFS client application can
read, write, edit and even remove files on the remote server.
A SAN presents storage devices to a host such that the storage appears to be locally attached.
This simplified presentation of storage to a host is accomplished through the use of different
types of virtualization.
Page 19 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
SANs will be connected through two protocols, Fibre Channel (FC) and iSCSI.
It is a high-speed network technology that can provide lossless original block data in an orderly
manner. This technology defines multiple communication layers for transmitting SCSI
commands and information units using the Fibre Channel Protocol (FCP). In addition to SCS,
Fibre Channel can also interoperate with IP and other protocols. It provides point-to-point,
switching and loop interfaces, and can provide data rates up to 128Gbps. Fibre Channel can
support devices that are 10 kilometers apart. However, Fibre Channel (FC) networks can
be complex and require special equipment such as switches, adapters, and ports.
*SCSI - SCSI commands are sent in a command descriptor block (CDB), which consists of a one
byte operation code (opcode) followed by five or more bytes containing command-specific
parameters. (Fibre Channel is rarely used in the USMC)
2. iSCSI
It is a transport layer protocol that can provide block-level access to storage devices through a
TCP/IP network. This protocol works on top of TCP and describes how to transmit SCSI data
packets via a local area network (LAN), wide area network (WAN) or the Internet. iSCSI enables
organizations to build shared storage networks, such as storage area networks (SAN).
Because iSCSI uses standard Ethernet technology, organizations often use iSCSI, which makes
it cheaper and easier than Fibre Channel (FC). (Typically used in the USMC)
Page 20 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
vSAN supports both hybrid and all-flash configurations using a two-tier architecture. Both
configurations use a caching tier and a capacity tier. The caching tier is composed of at least
one flash drive per host. The capacity tier is composed of at least one flash device (for all-flash)
or one magnetic disk (for hybrid) per host. vSAN combines the host's storage resources into a
single, high-performance, shared data store that all the hosts in the cluster can use.
Page 21 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Cluster Size
Min. 2 hosts - Max. 64 hosts
Software defined
Integrated with vSphere
Simple
Flexible
Storage policies
Deduplication & Compression
Encryption
Erasure coding
All Flash or Hybrid
Page 22 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
The first thing to do is to identify workloads and their respective applications, servers, and
clients. Typical characteristics to look at will be storage space and not over allocating resources.
*Do not forget to choose “Thin disk” mode when allocating storage to a virtual machine.
Once the administrator has identified workloads, performance characteristics, and capacity
needs. They can look to optimize the environment by utilizing vendors that are renown within
the USMC architecture. For example staying consistent with VMWare for their virtualization
needs rather than choosing another vendor. Ensuring VMWare technologies are compatible
with the physical server that the type 1 hypervisor will reside on. As they deploy new software
and hardware, be careful to deploy recommended firmware and drivers.
Once the Storage Area Network is compatible with physical storage vendors, administrators will
need to posture their environment for scalability. Design it for growth so the environment will
scale to match their developing storage requirements. When designing for resilience,
understand the current and future thresholds before implementation. Know the uptime
requirements and resilience objectives for the storage configurations including cluster nodes,
redundant network connections for uninterrupted traffic, and performance. Pay attention to
scalability and growth characteristics within the environment to include; storage media,
processors, and RAM. Understand the process and know how simple (or not) it will be to
update firmware and drivers. The last thing you want is to put your whole team on alert and
down during upgrades to systems for hours every time updates are needed.
Page 23 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Virtualization management tools are also required to identify the root cause of any problems.
They do this by analyzing the application, server, virtual and storage layers to troubleshoot
issues.
Increasingly, virtualization management tools are being asked to handle more strategic
management tasks. For example, they are required to identify usage patterns and help to
predict future virtualization infrastructure bottlenecks and resource limits.
Page 24 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
vCenter allows the configuration of host and VMs while monitoring their performance. It
provides an in-depth visibility into configuring all critical components on every level of your
virtual infrastructure. Administrators can use events, alerts, and the scheduler. vCenter even
allows managing the environment with users, groups, and additional roles.
Each vCenter Server is associated with a vCenter Single Sign-On domain. The domain name
defaults to vsphere.local, but you can change it during deployment. The domain determines the
local authentication space.
VCSA allows managing resource shares for CPU, memory, disk space, and networking
bandwidth. Administrators can modify allocations while virtual machines are running; and
enabling applications to dynamically acquire more resources when needed.
vCenter allows moving a virtual machine from one physical server (ESXi host) to another with
no downtime. Storage vMotion is a feature that allows the live migration of a running virtual
machine's VMDKs from one storage system to another, with no downtime for the VM.
Page 25 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
With vRealize Operations, IT organizations of all sizes can improve performance, avoid
downtime, and become more efficient with comprehensive visibility across applications and
infrastructure in one place.
• Intelligent operations – Self-learning tools, predictive analytics, and Smart Alerts about
application and infrastructure health enable proactive identification and remediation of
emerging performance, capacity, and configuration issues.
Page 26 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
VMware Tools
VMware Tools is a suite of utilities that enhances the performance of the virtual machines guest
operating system and improves management of the virtual machine. Without VMware Tools
installed in your guest operating system, guest performance lacks important functionality.
Installing VMware Tools eliminates or improves these issues:
Characteristics of vSwitches
A virtual switch is a software program – a logical switching fabric that emulates a switch as a
layer-2 network device. A virtual switch ensures the same functions as a regular switch, with
the exception of some advanced functionalities. Namely, unlike physical switches, a virtual
switch:
1. Does not learn the MAC addresses of transit traffic from the external network.
2. Does not participate in Spanning Tree protocols.
3. Cannot create a network loop for redundant network connection.
VMware’s virtual switches are called vSwitches. vSwitches are used for ensuring connections
between virtual machines as well as connecting virtual and physical networks. A vSwitch uses a
physical network adapter (also called NIC - Network Interface Controller) of the ESXi host for
connection to the physical network. Administrators may want to create a separate network
with a vSwitch and physical NIC for performance and/or security reasons in the following cases:
Page 27 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Aside from much more robust management the virtual networking across the vSphere
landscape, the vDS provides many other advantages and features compared to the vSphere
Standard Switch. These include the following:
1. Simplified virtual machine network configuration – With the vDS, administrators can
significantly simplify VM networking configuration across their vSphere infrastructure.
The vDS allows administrators to provide centralized control of their VM networking,
including centralized control over the port group naming, VLAN configuration, security,
and many other settings.
2. Link Aggregation Control Protocol (LACP) – Keep in mind that the only supported way
to run LACP in the vSphere environment with vSphere virtual networking is using the
vSphere Distributed Switch.
3. Network health-check capabilities – The vDS provides many network health check
capabilities, including verifying vSphere to physical network checks.
4. Advanced network monitoring and troubleshooting – With the vDS, administrators
have access to RSPAN ERSPAN, IPFIX Netflow version 10, SNMPv3, rollback and recovery
of the network configuration
5. Templates for backing up and restoring virtual machine network configuration
6. Netdump for network-based host debug
7. Advanced networking features – These include Network I/O Control (NIOC), SR-IOV,
and BPDU filter, among others.
8. Private VLANs (PVLAN) support – The vSphere Distributed Switch allows the use of
Private VLANs, which provide even more security options for segmenting traffic
Page 28 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
Page 29 of 30
Data Systems Administrator Course M09CVQ1
DS.02.01 Intro to Virtualization
References
https://www.vmware.com/solutions/virtualization.html
https://docs.vmware.com/en/VMware-
vSphere/6.7/com.vmware.vsphere.vcenterhost.doc/GUID-302A4F73-CA2D-49DC-8727-
81052727A763.html
Page 30 of 30
Data Systems Administrator Course M09CVQ1