Q1.Advantages and Disadvantages of adopting server virtualization
Virtualization refers to the separation of a service request from the essential physical delivery of the same service. Virtual memory is used to create more space than the physical memory.
The deployment of virtual infrastructure by the organization provides an obstruction layer between storage, computing and networking hardware. By using this obstruction technique, it is non-disruptive because the layout remains unchanged once it has been deployed. Virtual infrastructure also helps in managing resources in a pooled manner across the enterprise being used as a single entity (Menasce, 2005). In this way, the Information Technology administrator responds to the dynamic organizational requirements in good time without physically troubleshooting. Virtualization can help an organization to provide another infrastructure to the main stream enterprise without affecting the normal operation of the physical structure. There is hardware independence when working with virtualized infrastructure (Carpenter, 2009). It promotes reliability, Load balancing, availability, and security and lowers administrative costs. Legacy applications can be run on the old server while the newly adopted application runs on VMs.
Not all architectural server designs can be virtualized making it limited to specific architectures such as X86. With shared resources in a single consolidated server, it is possible that if the server is down, a large value of applications will be down as well and this could affect a large number of applications.
Q2. Plan for implementing Hyper-V
Hyper-V is a Microsoft server technology released as part of Windows server 2008. It was developed by Microsoft from scratch in order to be secure, provide server virtualization solutions and to be manageable.
There are three features that mainly stand out, the first one is the fact that hypervisor is micro-kenelized where host drivers and management functions are positioned on the partition. It helps reduce the size and of hypervisor increasing its efficiency (Scarfone et al., 2011). The second feature is where VMs are not run on hyper-V host server’s installation as an application on windows server. However, it runs in the same location as host processors meaning that VMs and workloads associated with it such as SQL server. Once the host is sized correctly, it can allow VM share storage, physical processor and memory resources. The third feature is that hyper-V is designed to be secure where hardware features known as Data Execution Prevention. Hyper-V host hardware protects VMs and host against attacks known as buffer overflow.
Q3. The strategy for explaining concepts of server virtualization.
I would use Snapshots on Hyper-B system to explain how virtualization works. It uses Microsoft volume shadow (VSS) to create duplicates for the files where entire virtual server as a guest image. This snapshot also contains compressed copy of RAM with bitmap of virtual disk that can be used to illustrate how virtualization s achieved (Menasce, 2005). Subsequent snapshots can also be taken in the same guest session making it easy to understand by laymen or those who are not very knowledgeable on how the virtualization system works.
Q4. Should the Organization move on with Implementation of Virtual Infrastructure?
Yes, the organization should go ahead and implement the Server virtualization. The security element of the full virtualization from the hyper server and host is far beyond reaching. It cannot be achieved without implementing virtualization (Carpenter, 2009). The cost of maintenance and implementation is low therefore keeping the software up-to-date is very easy and simple. Planning helps ensure the security of virtual elements that should be compliance with the organizational policies. It minimizes costs and maximizes on security.
Carpenter, T. (2009). Implementing a Hyper-V Virtualization Infrastructure. Available at: < http://www.slideshare.net/ASPE_INC/implementing-a-hyperv-virtualization-infrastructure>
Menasce, D.A. (2005). Virtualization: Concepts, Applications and Performance Modeling. Available at: < http://cs.gmu.edu/~menasce/papers/menasce-cmg05-virt-slides.pdf>
Scarfone, K., Souppaya, M., Hoffman, P. (2011).Guide to Security for Full Virtualization Technologies: Recommendations of the National Institute of Standards and Technology. Available at: < http://csrc.nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf>