Virtualization Fundamentals With VMware vSphere Example | Mohammed Asif Khan | Skillshare

Playback Speed


1.0x


  • 0.5x
  • 0.75x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 1.75x
  • 2x

Virtualization Fundamentals With VMware vSphere Example

teacher avatar Mohammed Asif Khan

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

    • 1.

      Untitled video Made with Clipchamp (2)

      1:43

    • 2.

      Section 1 : About Virtualization

      0:49

    • 3.

      Types Of Virtualization

      0:34

    • 4.

      Section 2: Traditional Data-Centers

      1:19

    • 5.

      Is Installing Multiple Applications On One Server Possible ?

      0:42

    • 6.

      Drawbacks of Installing Multiple Applications On One Server

      2:15

    • 7.

      One is to One Ratio Advantages

      2:13

    • 8.

      Drawbacks of Traditional Data Centers

      3:07

    • 9.

      What Is The Reason Of Installing The Traditional Data Center

      0:53

    • 10.

      What Solution We Need ?

      0:33

    • 11.

      Server Virtualization Is The Solution

      2:47

    • 12.

      Section 3: Virtualization History

      3:02

    • 13.

      Section 4: About VMware

      0:40

    • 14.

      First Company To Virtualize x86 Architecture

      0:13

    • 15.

      VMware Customers

      0:40

    • 16.

      VMware Products

      0:41

    • 17.

      Section 5: About vSphere

      0:34

    • 18.

      What is Hypervisor ?

      1:43

    • 19.

      Hypervisor Types

      1:17

    • 20.

      Type 2 Hypervisor

      2:58

    • 21.

      Types 2 Hypervisor Examples

      0:18

    • 22.

      Type 1 Hypervisor

      2:38

    • 23.

      Types 1 Hypervisor Examples

      1:06

    • 24.

      What is ESXi?

      1:19

    • 25.

      ESXi Shares The Resources With VMs

      1:38

    • 26.

      What is DCUI ?

      1:27

    • 27.

      VMware host client

      4:34

    • 28.

      Section 6 : vCenter Server

      3:03

    • 29.

      Other Uses Of The vCenter Server

      0:48

    • 30.

      Section 7 : vMotion

      3:36

    • 31.

      vMagic

      0:33

    • 32.

      Storage vMotion With Examples

      4:29

    • 33.

      Understanding Enhanced vMotion With Example

      0:54

    • 34.

      Section 8 : vSphere High Availability (HA)

      0:26

    • 35.

      High Availability Example

      2:43

    • 36.

      Seciton 9 : Fault Tolerance (FT)

      0:59

    • 37.

      How Fault Tolerance Works?

      1:26

    • 38.

      Section 10 : Distributed Resource Scheduler (DRS)

      0:32

    • 39.

      DRS Example Full

      3:06

    • 40.

      DRS Uses vMotion

      0:31

    • 41.

      Section 11 : Single Sign On (SSO)

      1:30

    • 42.

      SSO Supports Multiple Identity Sources

      0:27

    • 43.

      Section 12 : About Virtual Machine

      1:20

    • 44.

      Virtual Machine Functionality

      0:47

    • 45.

      Virtual Machine Resources

      0:51

    • 46.

      Virtual Machine Files

      0:36

    • 47.

      Virtual Machine File Format

      0:50

    • 48.

      Configuration File

      0:36

    • 49.

      NVRAM File

      0:55

    • 50.

      Log File

      0:49

    • 51.

      VMDK File Full

      0:49

    • 52.

      What Are Virtual Machine Characteristics

      0:29

    • 53.

      Compatibility

      0:52

    • 54.

      Isolation

      1:48

    • 55.

      Encapsulation

      2:07

    • 56.

      Hardware Independence

      1:00

    • 57.

      VM Cloning full

      2:55

    • 58.

      What is the use of Clone

      1:35

    • 59.

      Flexibility

      0:38

    • 60.

      Security full

      0:51

    • 61.

      Backup full

      1:04

    • 62.

      Restore

      1:37

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

15

Students

1

Projects

About This Class

The primary purpose of this course is to build the Virtualization foundation to remove the Virtualization fear from the Students.

This course is designed for Students, System administrators, and anyone who is keen to know what is virtualization in simple language

This course will be helpful to the Sales Engineers in explaining virtualization benefits to their clients to get more sales

It covers the virtualization fundamentals and it doesn't have any lab.

After completing this course, you will have an understanding of Server Virtualization.

Meet Your Teacher

Level: Beginner

Class Ratings

Expectations Met?
    Exceeded!
  • 0%
  • Yes
  • 0%
  • Somewhat
  • 0%
  • Not really
  • 0%

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.

Transcripts

1. Untitled video Made with Clipchamp (2): Hello, everyone. My name is Asif. I have over 15 years of IT experience, trained more than 70 thousandtuents globally, expert in Windows server, CCNA, MV V sphere, cloud computing, and mode. I acquired bachelor's degree in computer applications and master's degree in computer applications, which has provided me with a good strong foundation in both theoretical and practical aspects of computer science and IT. This advanced education has played a key role in shaping my career and my ability to simplify complex IT concepts for student. In this lesson, you will get introduction to key Windows server features, including active directory, PNS, group policy management console, IIS, PRV, DSCP, Windows Deployment service, risk quotas, backup and recovery. This lesson will provide you an overview of these features to help you to understand their purpose and applications. This class is perfect for freshers exploring IT system administrators and IT professionals, career changers looking to break into IT. Low peer experience is required, bring your curiosity and basic understanding of IT concepts. By the end of this class, you will understand the purpose and functions of Windows Server 20022 features. Be confident discussing and recognizing key features in IT environment. Build foundational knowledge to explore further IT learning. Ready to explore Windows Server 2022 features. Let's get started. I will see you in the first lesson. 2. Section 1 : About Virtualization: First of all, we will see what is the meaning of virtualization. In computing the term virtualization refers to a digital copy of something rare. So virtualization is a digital copy of real things. Like the characters in computer games are the digital copies of humans. In this example. These are the computer game characters. They are the digital copies of humans. These virtual copies are appearing to exist if you see they are appearing to exist but not exiting in the physical world. So they are not existing in the physical world. We cannot, does them. This is the meaning of virtualization. 3. Types Of Virtualization: In this video, we will see types of virtualization. There are many virtualization types available, like storage virtualization, network virtualization. Let's talk virtualization and server virtualization. In this course, we will discuss server virtualization using VMware vSphere example to understand the virtualization concepts. To understand the server virtualization, we must understand that traditional way to deploy the service first. 4. Section 2: Traditional Data-Centers: Let us understand the traditional way to deploy the servers. The traditional datacenters or server roles, server room space. It is the row where we install the server. So traditional server rules are filled with several physical server. So if you visit any traditional server room or data centers, you will see so many servers is stored in the server room. This example, we have some racks. In each rack, you will install the physical servers. If you see these racks are having multiple physical servers, electron these physical servers, okay, so we have multiple racks in our server room or data center, and each rack will have multiple physical servers. So you might be wondering why so many p's because servers, in their traditional datacenters, the answer is, it is a common practice to dedicate an individual server with a single application. Let us say you have one application. If you want to install one application, you read one physical server. If you want to. If you want to install two applications, you need two physical servers. If you want to install Android applications, you will need 100 physical servers. The ratio in their traditional data center is one is to one. 5. Is Installing Multiple Applications On One Server Possible ?: In this section, we will discuss why this one is to one ratio. So after knowing that their traditional networks follow one is to one ratio, you might be having some questions like, can we install multiple applications on one server or not? The answer is yes, we can install multiple applications on one server. Then you might be having another question. The question is if we can install multiple applications on one server, Y to follow this one is to one ratio. Why we are not installing all the applications on one server? The answer is installing multiple applications on one server is having some drawbacks. 6. Drawbacks of Installing Multiple Applications On One Server: We'll try to understand the drawbacks using this example. Let us say our requirement is true is further below services and applications like Active Directory, DNS server, DHCP server or web server, e-mail server, sequel server run SAP. What we will do, we will take one physical server on the top of this physical server, you will install any server operating system. In this example, we have installed Windows Server 2022 operating system. On the top of this operating system, we will install the services and applications like Active Directory, DNS server, DHCP server, web server, evil Server and SQL Server, so that multiple services are installed on one server. We can install multiple services on one server. And these services are accessed by the user. So imagine you have multiple users in your network. These users will access these services while operating system. Now let us see the drawbacks of installing them multiple services on one server. The first drawback is if the operating system gets corrupted, okay, let us say this operating system gets corrupted. All the services are not available to the user because the services are installed on this operating system and this operating system is not available, so services also are not available. This is the first robert. The second drawback is it will slow down the operating system. We are using only one operating system here. This operating system is serving that multiple users and we have installed multiple services on this operating system. This operating system is having so much of load here. So it will slow down the operating system. And we can't install the services like SAP, Oracle on Active Directory. So whenever we run Active Directory on any server, it will not allow the other services to be installed like SAP, Oracle, et cetera. This is that third drawback of installing the multiple services on one server. 7. One is to One Ratio Advantages: So to overcome these issues, we will follow one is to one ratio, where we will purchase that dedicated server for each application. Which means if you have six applications, we will purchase six physical servers. If we have 100 applications, we will purchase and read physical server. So in our example, we have six applications and services. So we have purchased six servers, server one, server to server three, server for server Pi servers. After purchasing the hardware server, the first thing you will do is even installed on a server operating system. So in our example, we have installed Windows Server operating system on all the six servers. On the top of it, you will install the application server one, we have installed Active Directory on server two, we have installed DNS server, and server three, we have installed web server or server for we have installed sequence server, server Pi, we have SAP. On servers six, we have installed email server. So let us see the advantages of this. One is to one ratio. Let us say this operating system of e-mail server gets corrupted. So only this e-mail services not available to the users. These users can access the other services like Active Directory, DNS, web server sequence, SAP. You need to work only on this server. This is the first advantage. The next advantage is you will get the better performance from all the servers because we have a stalled the applications and services on separate operating system. Okay, so there is very less load on each operating system and you will get the better performance. Fourth advantage is you can install the software select sequence because we are using the separate server here to install the Sequel Server. Active Directory will not stop this sequel server to be installed. 8. Drawbacks of Traditional Data Centers: Dedicating one server to one application is a traditional way of installing the server send data center. This method has so when you draw bags, will discuss about the drawbacks of traditional datacenters. That is, one is to one ratio method. If you are dedicating one server, one application, and if you have hundred applications and you need to purchase 100 servers. If you are using their traditional way, you need multiple servers. If you are using multiple servers, then you need multiple switches. And you need to do a lot of capably. Then the next drawback is there is a huge power consumption if you have multiple servers in your datacenter. So there will be more power consumption when you have a lot of servers. And you need to provide quality for by seven oversupply. In case of power failure, we need to provide the backup hazard or supply backup via UPS and generator. And these generators required here. So this is the UPS here, these are the generators and these generators are required. Then the next one drawback is the traditional datacenters required extra cooling. Why this cooling? Because servers and related devices generate an enormous rate, which is the data must be installed to make them whole. So if you have more number of servers, they will generate more heat and required extra Cooley. So in this example, if you see you have installed is easier to make the data-center core. We need largest space in their traditional data centers because we installed multiple servers, multiple networking devices. Then to manage the complete the additional infrastructure, we need huge manpower. We need network engineers, engineers, technicians, electricians, etc. In short, the traditional datacenters. Because a lot of money, the shocking parties, ie server in their traditional data-center will utilize up to productive per cent of its resources, which means we are wasting 80 per cent of resources of each server. I've taken a screenshot of one of the computers. If you see here, the CPU utilization is two per cent here. Memory realization in 19% and the hard disk utilization is 0%. So imagine you are spending a lot of money and we are utilizing only 20 per cent of the resources of each server. 9. What Is The Reason Of Installing The Traditional Data Center: Despite so many drawbacks the companies were using, the one is to one ratio only for one reason. And that reason is to provide a separate operating system or separate application. In our example, if you see, we have provided a separate operating system to Active Directory, separate operating system to DNS server operating system cool. Web server separate operating system to sequel server separate operating system for SAP. Separate operating system to e-mail server. Why we are providing this operate Operating System, two separate application here to get the better performance. If this operating system or eBay server goes down, other services are still available and all the operating system are having a less float so they can give them better performance. This is a reason we are providing, we are using one is to one ratio in their traditional network. 10. What Solution We Need ?: To overcome the drawbacks caused by traditional datacenter, that is, one is to one ratio. We need a solution that allows us to run multiple operating system on one physical server, which you will take one physical server. On the top of this one physical server, you will run multiple operating system. At the same time. On the top of this vertebral operating system, you can run different applications. So we need this solution. 11. Server Virtualization Is The Solution: And the solution is server virtualization. Will see what is this server virtualization? Server virtualization. It is a technology that allows single physical server to run multiple operating system at the same time. So what this server virtualization will do, it will allow multiple operating systems to run at the same time on one physical server. With this, with this technology, what he will do, you will take one physical server. On the top of this physical server, you will install virtualization software, this virtual address. So there's different software. What it will do, it will help you create the virtual machines. So we will create multiple virtual machines here. So we need six applications to be as far, so we will create six virtual machines, 1234 by six on the top of this, each virtual machine, we will install a separate operating system. If you see here, Virtual Machine One is having its own operating system. Virtual machine is having its own operating system in the same way, virtual machine 3456, they are having their own operating systems. On the top of this operating systems you will install the applications like Active Directory, DNS, web server, sequel server, SAP, Penn, e-mail server. Each application is getting its own operating system here, which is possible with this server virtualization. And let us see their traditional architecture and Watson architecture. With traditional architecture, you will take the physical server on the top of this physical server is taller. What operating system on the top of the server operating system human is fun. That application. With virtual architecture, you will take physical server. On the top of this physical server, you will install the virtualization software, which is also called as hypervisor. You will install virtualization software. On the top of this virtualization software, you will create multiple virtual machines. Okay, Here we have created six virtual machines. On the top of this virtual machines you will create, you will install the operating systems. On the top of this operating system, you will install the applications. This is the origin architecture. 12. Section 3: Virtualization History: Moving forward with the virtualization, virtualization was supposed to be limited in 1960s by IBM. Virtualization was developed for mainframe computers. This is the main perineal computer. Mainframe computers are very big. If you see. It is a very big computer which took one big hall to get is four. And they are very expensive as well. And we can't afford to install only one application on one computer, which means we can't afford to follow the one is to one ratio. For better utilization of mainframe computers. Virtualization technology was developed. Ibm has released an operating system called STP CMS, or virtualization in 1960. In 1970, IBM has at least one more virtualization software called VM. So these are the virtualization software. So you might be wondering if this virtualization technology has been there since 1960s. Why are we adopting it now? Let us try to understand the reason virtualization was developed for mainframe computer architecture. It is developed for the mainframe computer architecture. Today, computers like racks or this is the Rack Server, and it is based on X86 architecture. The architecture of mainframe computer and Rack Server is different. We can't use the mainframe virtualization software on exit is based on computers because the architecture is different, so we can't use the mainframe softwares virtualize the racks or was it tastes like we can't install the iPhone applications on leukemias 3310 over here. So we can't install the iPhone apps on Nokia's 3310 own here. In the same way, we can't use the mainframe computer virtualization software. In X86 architecture computers. No company has developed the virtualization software for X86 architecture till 1999. Vmware is the first company to invent the virtualization for X86 platform in 1990s to address the under utilization and other issues. So VM-Series, the first company to virtualize the X86 architecture. That is why we are adopting this technology before 1990s, we didn't have any solution to virtualize the X86 architecture. We add the solution to virtualize only the main frame computers. 13. Section 4: About VMware: In this section we are going to discuss what is the older. Most of the students think VMware virtualization software, but it is a software company that develops virtualization software. It was founded in 1998. Vmware provides Cloud computing and virtualization software. The company was officially launched in February 1999. The first product of VMware is VMware workstation, which was delivered in May 1999. So VMware is not a virtualization software. It is a company that develops virtualization. Socrates. 14. First Company To Virtualize x86 Architecture: Vmware is the first company to invent the virtualization for X86 platform. In 1990s, addressed the under utilization and other issues. 15. VMware Customers: Vmware is a global leader in X86 virtualized shared, put it, with over 400,000 customers, including 100% of Fortune 500 company. So all the Fortune 500 companies are the VMware customers. And more than 80 per cent of virtualized workloads. And a large percentage of business critical applications are running on VMware technology. 16. VMware Products: Vmware has multiple products like vCloud Director, which is the Cloud delivery service. We aware as G1, which virtualizes the van connections. Horizon View, is used for desktop virtualization. In app is used for application virtualization. Nsx is used for network virtualization. We sand is used for storage virtualization. And we have v is here, which is used for a server virtualization. In our course, we are going to see how to virtualize the diverse, which means we are going to discuss vSphere, VMware, vSphere. 17. Section 5: About vSphere: In this section we will discuss what is vSphere. Vsphere is a VMware products used to virtualize the X86 server. Server virtualization product from VMware. Vsphere is not a single software. It has multiple components like ESX, psi, vCenter Server V motion and has been motion by availability, fault-tolerance. We center single sign-on. So these are multiple components. So we vSphere. 18. What is Hypervisor ?: We will discuss about these two different components. One by one. We'll see what is E6. So to understand what is ESX size, we need to understand what is hypervisor past. Okay, So let us see what is the hypervisor first. Then we'll see what is ESX, say. Hypervisor virtualization software is installed on the top of physical server. Okay, this is a physical server. If we want to virtualize X86 architecture, you need to install the virtualization. This virtualization software will create multiple virtual machines. On the top of this virtual machines, you will install the operating system. On the top of operating system, you'll install that application. So we need the virtual virtualization software to be installed on the top of this physical server. This virtualization software is known as hypervisor. The correct terminology of this virtualization software is hypervisor. Virtualization software is installed on the top of physical server. You can see we have one physical server and we have installed the hypervisor on the top of this physical server. With the help of this hypervisor, we can create multiple virtual machines. So with the help of this hypervisor, we can create multiple virtual machines and we can run multiple operating systems on physical server at the same time. At the same time, we can run multiple operating systems. 19. Hypervisor Types: In this section, we will see hypervisor types. There are two types of hypervisors. Type one hypervisor and type two hypervisor. Type one hypervisor directly on the hardware you will take the server. Does say this is a physical server. On the top of this, physicals are on the top of this. Because there are hardware, you will install the type one hypervisor. Type two hypervisor, you will take the server, the top of the server. You will install the operating system, any operating system like Windows Server 2012 to two, or Windows ten operating system. On the top of this Windows operating system, you will install the hypervisor, then you will create the virtual machines. So type one hypervisor, it will run directly on the hardware. Type two hypervisor will run on the operating system like Windows ten. Windows Server 2020. Will discuss about these two hypervisors, one by one in detail. First we will see type two hypervisor. Then we will see what is type one hypervisor. 20. Type 2 Hypervisor: Let us discuss about type two hypervisor. Type two hypervisor doesn't directly run on the hardware, is straight, it runs on the operating system, will use type two hypervisor. What will you do? You will take one computer. On the top of this computer. You will install the operating system like Windows ten operating system. On the top of this Windows ten operating system, you will install the type two hypervisor. On the top of this type two hypervisor, you will create different virtual machines. On the top of these virtual machines, you will install the operating system, installed applications on the top of this operating system. This is how you will work with type two hypervisor. It will not directly run on the hardware. Type two hypervisor really show up in server-based and even onwards. So we don't use type two hypervisor in the real networks. And they are suitable for individual PC users needing to run multiple operating system without formatting their current operating systems. Let us say you are a software developer and you have one PC. This PC, you have already installed windows ten operating system. And you have developed on software and you want to test your software on different operating system like Windows operating system, Windows Server 22 operating system, Linux operating system. But without formatting your computer, what will you do? You will install the type two hypervisor on the top of this Windows ten operating system. On the top of this type two hypervisor, you will create multiple virtual machines. On the top of this, these virtual machines you will install Windows 11 operating system, Windows Server 2022 operating is instrumental Linux operating system. And you can test your software here without formatting here current operating system. Type two hypervisor is less secure than type one hypervisor because there is a mediator between type two hypervisor and hardware. So here if you see this is a type two hypervisor and this is the hardware. Between these type two hypervisor and hardware we have the operating system which makes this type two hypervisor less secure. And it is very slow as well. It is slower than type one hypervisor. Again, the same reason we have the mediator between type two hypervisor and heartburn. 21. Types 2 Hypervisor Examples: There are different type two hypervisors available from different companies. Oracle, VirtualBox, Microsoft has Microsoft Virtual PC and VMware as VMware workstation. So these, these are the type two hypervisors. 22. Type 1 Hypervisor: It is C type one hypervisor in detail. A type one hypervisor directly on the computers with hardware, as we have discussed, this type one hypervisor, it will run directly on the physical hardware. So you will take one server. On the top of this server. You will install the type one hypervisor. On the top of this hypervisor, type one hypervisor, you will create the different virtual machines. On the top of this virtual machines, you will install the operating system, like Windows Server operating system. On the top of this operating system, you will install the applications. If you see here, this is the physical server here, and we're running that type one hypervisor on the top of this physical hardware. And it will virtualize the X86 architecture here, we can create them multiple virtual machines. In this example, we have created a virtual machine, virtual machine, virtual machine three. In Virtual Machine, one, virtual machine, a virtual machine. Through all these virtual machines, we have installed the operating systems. On the top of this operating system, installed that application. So type one hypervisor and was directly on the physical hardware. And it will directly interact with the hardware resources of the server, like CPU RAM, and I see DVD drive. So hardware servers are having the resources like CPU, RAM, and I see dividend IPCC. It is having the hardware resources like CPU, RAM. And I see an DVD drive. This hypervisor will directly interact with these resources. And it is also known as bare-metal hypervisor. Why it is known as a bare-metal hypervisor because it is sitting directly on the hardware. It is sitting directly on the metal here. That is why it is known as bare metal hypervisor. And type one hypervisor is highly appreciate because they have direct access to the physical hardware. So this type one hypervisor, it is highly efficient because it is interacting the hardware directly. There is no mediator between the hypervisor and hardware. And it increases the security because there is nothing between hypervisor in hardware. 23. Types 1 Hypervisor Examples: There are different type one hypervisors available from different companies. Oracle as Oracle VM, Microsoft has Microsoft Hyper-V, VMware, hypervisor Pauling VMware ESX site, which virtualizes X86 architecture. So VMware hypervisor name is ESX and ESX size they're responsible virtualize the X86 architecture, or we can say ESX size irresponsible to take the virtual copy of physical hardware. Esx, the core component of VCRs. So guys, we have discussed that vSphere is having multiple components, which includes ESX size. So ES6 psi is the core component because this is the software. This is the operating system which virtualizes the X86 architecture. That is why it is a core competence without this ESX, say there is no use of vSphere. 24. What is ESXi?: In our previous videos, we have discussed what is hypervisor. Now, it will be very easy for us to understand what this is. So let us see ES6 say in detail, ESX I stands for Elastic is chi x integrated. Es6 I is the VMware's type one hypervisor. So as we have discussed, type one hypervisor is installed on the top of peace because server, so what you will do, you will take the physical server. On the top of this physical server, you will install the ESX side. After installing the ESX size, you can create multiple virtual machines. So with the help of this ESX site, we can create multiple virtual machines. Vm1, VM2, VM3. We young poor. And on the top of this virtual, virtual machines, we will install that operating system. Okay, we'll install the operating system. And we can run these multiple operating system on the same physical server at the same time. 25. ESXi Shares The Resources With VMs: Esx, say share the resources of physical server with multiple virtual machines. So in this example, you can see we have one physical server. On the top of this physical server, we have installed ESX, say on the top of this. Yes, except we have created three virtual machines. Vm1, VM2, VM3, okay, then we have installed the operating system on each virtual machine. Then we have installed the application on top of this operating system. This physical server is having some resources like CPU and I see, and DVD drive. Okay, these are the physical resources of this physical server. So what this ESX I will do ES6, I share the resources of peace because server, it will share this ESX. I will share the resources of this physical server with these virtual machines. Okay? And resources are nothing but you can say CPU RAM and I see deviated, right? And the server with ES6 I installed is reported to ask the host or ESX host. This server is having the ESX size store and this server is referred to as post or ESX cycles. And the most important part is this ES6 I is a core component of vSphere. 26. What is DCUI ?: In this section we will discuss about VCU. Or VCU is transport direct, solely user interface. And it is a consoler ES6 site. This is the console. This is x, this is a DC, or it is used to do the initial configuration of ESX hosts like volunteering the host name or IP address, subnet mask, default gateway, et cetera. To access the CuI, you need to be physically available in front of server. You will access the server directly. The CUI is used for initial configuration or we can't perform the advanced things like creating virtual machines. Which is why at the CuI, if you see here, we don't have any option to create the virtual machine or versus suggests here, which means we can't perform the advanced things. Why DCI? It is used to do the initial configuration only. To perform the advanced things like creating virtual machines switches. We need to use the VMware host client. 27. VMware host client: In this section we will discuss what is VMware postcard. It is used to perform the add one things like creating virtual machines or just switches. So if you want to create a virtual machine, virtual switch, you will use VMware was glide, and this is the VMware host plant. And if you see here, it is having the option to create the virtual machine. So we can create the virtual machine, we can manage the storage. And with the help of this networking option, we can create the virtual switches has been so it is a web-based application and it is used to manage only one year post per session. Let us try to understand what is the meaning of this session sentence. So let us say we have taken one physical server. On the top of this physical server, we have installed ESX, say, we have configured the IP address 192 dot 68 dot 148, or ten on this ESX host using VCU, I know we want to create the virtual machine. We want to manage this ESX host. So what will you do? You will access this ESX host from your laptop remotely. You will open the browser and you will type the IP address, 192 dot one, dot, one dot. Then you will get this interface. Okay? So here we have only one ES6 I host, and we're accessing this ESX host, promote our laptop remotely using one session. Let us say in your environment, you have multiple ESX host. Okay, let us say you have ES6 side1, side2, ES6 side three, ESX size, port and IP addresses of these ESX host. 19168 dot 140-190-1608 dot 1, 404-190-1608 dot one dot 301-90-1608 dot one for t dot. We have poor ESX hose. And if you want to manage all the poor ESX host using VMware host client, we need to create four sessions. Let us try to understand what does it mean by creating or sessions for managing the poor ESX host? So if you want to manage the ESX host, okay, you will manage it by your PC remotely. You will take the PC. And if you want to manage the ES6 i1, you will open up a browser and you will type the IP address of ES6 HIV-1 190 two.16 shared. What? One for t.na separate session is created. If you want to manage the ESX Hosts to, again, you will open the browser, then you will type the IP address. 192.1.1.20 is second session is created for the other ESX host. Okay, So prayer session is created. So in this example, we have created four sub units such as to manage the board ESX cycles. If you have hundreds of ESX host in your network, you will create 100 sessions. So let us say you don't want to create a separate session or separate ESX host. You want to manage all the ESX host with one session, then you will use vCenter Server. 28. Section 6 : vCenter Server: In this section, we will discuss about vCenter Server. Vmware. Vcenter Server is an advanced sort of work management software. So vCenter Server is a software. It is used to manage multiple ESX host with one session centrally. So let us say we have or ESX cycles. We have ESX psi one. He is excited to ES6 site three years except for the IV doses of this or hosts are like 192 dot 168 dot 140-190-1608 dot one for t dot 201-90-1608 dot one for t dot, one, dot 168 dot one for T dot. And we want to access all the ESX host, we want to manage them. So instead of creating or separate sachets here, what you will do, you will take one server. On this server, you will install vCenter Server software. After installing the vCenter Server software on this server, you will configure an IP address. Let us say the IP address of this vCenter Server is 192 dot one dot 14000. Then you will add all the four ESX host. This vCenter Server. After adding all the four ESX host. So this vCenter Server, we will manage them from our PC. You will go to your PC and you will open up a browser and you will type doc IP address of this vCenter Server 192 dot one dot 14000. And you will be connecting to the vCenter Server with the world session. I, like VMware host client. With one session, you will accept the vCenter Server. Via vCenter Server, you will access, you will manage the multiple ESX size hosts. So in this example, if you see we have three ESX host 123 and we have one vCenter Server. We have added all the three ESX host with this vCenter Server. And we're managing this to be as excited host from the web client via vCenter Server with one session. 29. Other Uses Of The vCenter Server: Besides managing the multiple ESX host premise central point, vCenter Server is mandatory who use the advanced features like V motion and has been motion, high availability, all distributed resource scheduler, VM cloning. And much worse, if you don't have vCenter Server, you cannot use these advanced features of VMware vSphere or we cannot use these components of VMware vSphere will discuss about this. Jersey one-by-one. 30. Section 7 : vMotion: In this section, we will discuss about emotion. The migration of a live virtual machine from one host to another host is called B motion. Let us try to understand what is the meaning of this sentence. With this example. Let us say we have one physical server. And on the top of this physical server we have installed ESX size. And it will become the ESX host letters say the host name is ES6 I1. Then on the top of this ES6 site, we will create three virtual machines. We have View Virtual Machine, one, virtual machine, virtual machine three. On the top of this original machine, we have installed the operating system, server operating system. Then on the top of this operating system, we have installed applications. Applications like sequel server. This is our database server that we have is for web server, an Active Directory. And these services are accessed by the users. Okay, everything is working fine. Opera sometimes this ES6 i1 is running very slow. It is giving some issues. Okay, so to fix this, the issues, we need to shut down this server. If you shut down this ESX host, these services will not be available to the users. This is the problem here. If you have only one ESX host in your network, and if it is down, all the virtual machines will not be available to the users. So what you will do, you will take one more ESX host. You will take one more Server. Is installed on the top of this server. And it has say it is ESX cycle. So this ESX i1 is having some issues. It is a running variable. We need to fix it. We need to do the maintenance of this. Esx. I1 will do the maintenance. We need to shut it off. So we will not read this ES6 I1 right away. Before shutting it down, we will migrate the virtual machines of this ESX, psi1, psi2. And the procedure, the method of migrating the live virtual machines from one host to another host is called V version. So we version is used to migrate the live virtual machines from one host to another host without affecting any services. 31. vMagic: This is the beauty of virtualization, or this is the beauty of V motion, where we're migrating the live virtual machine from one server to another server without affecting any services. Servers will be working. During the migration. Vmware referred this technology as B version. But for me, it is a V magic. 32. Storage vMotion With Examples: In this section, we'll discuss about storage v Moshe. Storage we motion is used to migrate the live virtual machine pies from one is storage to another storage during maintenance or upgraded. This turn, this sentence. To understand what is historically motion, we need to have the understanding of virtual machine. So first we will see what is Virtual Machine, then we'll discuss are what is storage? Virtual machine? Is this software computer? Software computer means it is a collection of multiple pies. Okay, so multiple phi's makes one virtual machines. So these files must be saved somewhere. So these files are saved on history. So let us take this example. Who understand what is a storage emotion? What is virtual machine? Let us say we have one physical server. On the top of this physical server we have is hard. He is on the top of this ES6. Ivf created some virtual machines. Vm1, VM2, VM3, as we have discussed, it is a software computer and it is the collection of multiple pi. So these files must be saved somewhere. So these files are saved in a storage. This is storage will have the VM1, VM2 pies, vm three pies, okay. All the virtual machine pies are saved in. This is storage. Let us say it is the storage, but after sometimes you want to upgrade it appeared this is storage we need to unwanted from the physical server. If you unmanned the storage from the physical servers, all the files will not be available, which means all the virtual machines will not be available to the users. So what is the solution? Solution is, you will attach one more storage. Let us say it is a storage pool. And before unwanted data storage one, you will migrate that you will migrate that buys from a storage pool is storage. So how will you migrate these files from one storage to another disorder? Using the storage, we will share technology using a storage V motion. We can move the pies from one storage to another is for easy. So let us see the storage. We motion definition one more time. The storage, the motion is used to migrate the live virtual machine pies from one is storage to another storage during maintenance or off period. In this example, if you see we have the physical server. On the top of this physical server we have is called ESX. On the top of this ES6 have we have created or virtual machines, virtual machine 123.4. And these virtual machine pi star is stored in the storage here. So we have a storage one. And storage to all the virtual machine files are stored in the storage on your thighs. Vm2 and VM3. We own four piles are extraordinary storage on. And if you want to migrate these files from the storage one to a storage pool, you will use the storage of emotion. 33. Understanding Enhanced vMotion With Example: In this section, we'll see and asked the motion has been motion per palms. Emotion and storage be more shampoo guitars. So it is a combinational. We more Shannon and storage we emotion. If you see this example here, it is having 2 v, ESX, i1 and i2. And we have created one virtual machine on use excitable, and we have two storage. Storage is storage. What these enhance the emotion will do, it will migrate the live virtual machine from one host to another is excels. At the same time, it will migrate the virtual machine pies from one storage for another research. 34. Section 8 : vSphere High Availability (HA): In this section we will discuss about vSphere high availability. Vsphere high availability provides high availability for virtual machines. If any host phase, the virtual machines or failed hosts are restarted on alternate or so. We'll try to understand these two sentences with one example that we'll come back to this slide. 35. High Availability Example: Let us say we have ESX cycles. This is E one. And we have created some virtual machines. Or this ESX cycles VM1, VM2, and VM3, and we have ES6 psi2. Now let us see this. Esx I1 goes down abruptly. We don't have any chars. We don't have any time to migrate the virtual machines from ESX them onto ESX or two, it is down every roughly. Now what this HA will do, it will restart the virtual machine of this period of host on another ESX host, which is working fine. So guys, this high availability is restarting the virtual machines on another host, which will be a downtime. The virtual machines will not be available to those users for some time because it is restarting the virtual machines here. Retained get any time to migrate the live virtual machines. So you need to remember this point. With HCA. They will be downtime. So it provides high availability or Virtual Machine if any host phase. Here in this example, if you see this is ESX i1 and it is ES6 or two ESX. Everyone is where the virtual machines of this spill host are you started on alternate or so all the virtual machines or this ES6 islands are restarted in ES6 site with HA you will have downtime. Virtual machines will not be available for some time because it is really starting them on another host. Virtual machines are being restarted. There will be a downtime. Virtual machine will not be available to the users for some time. If you see we have U6, say one ES6 side to side goes down and all the virtual machines or restarted on ES6. 36. Seciton 9 : Fault Tolerance (FT): In this section, we will discuss about fault-tolerance or f t. Fault-tolerance provides high availability for virtual machines with no downtime unlike high availability. So let us try to understand this sentence with this example. Notice here we have two ESX hosts, ES6, i1, and i2. And on this one we have one virtual machine, Vm1. And it is the mission critical virtual machine, which means it should run 24 by seven. It should run without any downtime. So for that, what you will do, you will enable fault-tolerant. When you enable the fault dominance, what will happen if this ESX I1 goes down? This vm1 will immediately start working on ES6 psi2 without any downtime. 37. How Fault Tolerance Works?: In this section, we will see how fault tolerance works. Fault-tolerance provides a continuous availability of virtual machines by creating a live shadow is trans, or a virtual machine on another ESX host. We'll try to understand these centers using one example. In this example, we have two ESX hose. One is ESX, one, another one is ESX settle. On top of this ESX L1, we have created one virtual machine, and we want this virtual machine to run cruelty four by seven. It should be available 24 by seven to the users. So what you will do, you will enable the port on is when you enable the fault on arrays, it will create this fault-tolerance. We'll create the shadow virtual machine on another ESX cycles, so it will become primary virtual machine. The other virtual machine will be the shadow of this virtual machine. If this ESX I1 goes down, this shadow virtual machine will become the primary Virtual Machine and it is available to the users. And one more shadow will be created on another ES6 I host. This is how this fault tolerance works. This is, it will make the virtual machines available 24 by seven to the users. 38. Section 10 : Distributed Resource Scheduler (DRS): In this section we will discuss about the distributed the resource scheduler, which is also known as DRS. Drs is a load balancing solution vSphere. It migrates virtual machines from over utilized ES6 I equals to n under utilized ESX host for load balancing. Let us try to understand these two sentences with this example. 39. DRS Example Full: Imagine we have ESX hosts. Es6, say E1. And E is excited to ESX i1 is having some virtual machines. Let us say it is having virtual machine one, virtual machine, virtual machine three. And virtual machine for ES6 or two is having only one virtual machine, which is V of Pi. Our virtual machine pipe. This ESX i1 is utilizing 90 per cent of its resources, resources in the essays, RAM and CPU. And out of this, 90%, 50 per cent of resources are utilized by V01. Cruelty per cent of resources are utilized the VM2, ten per cent of resources are utilized by VM3. Ten per cent of resources are utilized by Vm for whereas this ES6 i2 is utilizing only ten per cent of its resources, which is utilized by this video. But now this DRS will monitor both the ESX host and it will find that there is no balance between ESX psi1, psi2. So to balance this to ES6 I host, it will move some virtual machines from ESX I want to erase, etc. So let us say this GRS will move vm 2341234. Okay, it was utilising cruelty per cent of resources. It was utilizing ten per cent of resources and it was utilizing ten per cent of resources that VM for. Now, this EAC excite two is utilizing 50 per cent of its resources. And ESX server is also utilizing that 50 per cent of its resources. Now, both the ESX host are balanced. Esx i1 is utilizing 50 per cent of resources, and ES6 i2 is also utilizing up 50 per cent of resources. Drs will do the load balancing based on the resource utilization. It will not do the load balancing based on the number of virtual machines. If you see ES6 ion is having only one virtual machine, but it is utilizing 50 per cent of resources. Whereas ESX i2 is having poor virtual machines. And this poor virtual machines together utilizing up 50 per cent of resources. So the load balancing will be done based on the resources, not based on the virtual machines. 40. DRS Uses vMotion: So DRS is a load balancing solution for vSphere with Margaret is the virtual machines from overutilized ESX host when under utilized ESX host for load balancing. Drs migrate the virtual machine is between ESX I was using VMware friends. So it will use this V motion technology to migrate the virtual machines from one host to another. Host port will load balancing. 41. Section 11 : Single Sign On (SSO): In this section we will discuss about the vCenter single sign-on, which is also known as SSO. Single sign-on is an authentication service. It allows a user to log into multiple vSphere components like vCenter Server, vCloud Director, etc, with this signal ID. So as we all know, vSphere is having multiple components like vCenter Server or vCloud Director to access them to login. These are different components. We don't need to create separate accounts. With the help of this single sign-on. We can login to these different services with a single ID. Like you access the multiple applications of Google with one account. As we all know, Google is having multiple applications like Google Search, YouTube, Play Store, google use Gmail, meet, etc. So to access these services, we don't create a separate account. With the help of one account. We access all the different applications. Or is it possible? It is possible because of this SSO, Google is also using single sign-on. With the help of this single sign-on, you access all the other application, all the multiple applications with one account. 42. SSO Supports Multiple Identity Sources: Vcenter single sign-on supports multiple identities sources like Active Directory and opened a lab. What is this identity source? This, it is source is used to save the user a course. So we have different identities sources available in market. Microsoft uses Active Directory, Linux uses open-ended. 43. Section 12 : About Virtual Machine: In this section, we will see what is a virtual machine in detail in our previous videos, we have seen that we can create multiple virtual machines on the top of this physical machine using virtualization software. But we don't know the characteristics of virtual machine. What are the advantages of virtual machines? So we're going to cover what is virtual machine first. Then we will see the characteristics of virtual machine. Then we are going to cover the advantages are virtual machine. Virtual machine is a water channel copy of a physical machine. It is also referred to as the software computer. So virtual machine is a software computer. And a virtual machine is made up of multiple pi. So whenever we create a Virtual Machine is multiple files are created. And if this virtual machine is nothing but a set of files that are stored on a story. So guys, as we have discussed, whenever we create, a virtual machine is created and these files are stored on a storage. 44. Virtual Machine Functionality: In this section we will see the virtual machine functionality. Virtual machine provides the same functionality as physical machines. So it will work like a physical machine. It runs an operating system and applications like a physical machine. So on physical machine we run any operating system like Windows operating system, Linux operating system. The same way. We can run Windows operating system, Linux operating system on the virtual machine. And we can run the applications as well. And it has additional benefits in terms of portability, manageability, and security. 45. Virtual Machine Resources : In this section we will discuss about the virtual machine resources. Physical machines have physical resources like processor, memory, graphic card, NIC, card, storage, keyboard, mouse, etc. And virtual machines have the virtual resources like virtual processor, virtual memory, virtual graphic card, or MAC, or jewelry storage, virtual keyboard and mouse. But internal resources are stored in a storage in the Obama points. 46. Virtual Machine Files : In this section we will discuss about virtual machine pies. As we have discussed earlier, the virtual machines are made up of multiple pi. So a Virtual Machine consist of several pies. Data is stored on a storage device. Let us say we have created one virtual machine. It will create multiple piles. And these multiple pi star is stored on a storage device and a virtual machine. Key files are configuration file, virtual disk file. And we ran setting files and log files. 47. Virtual Machine File Format: In this section we will discuss about Virtual Machine file format. So when you create a virtual machine, you need to assign a name to it. Let us say we have created one virtual machine and we need to assign a name to this virtual machine. Imagine we have assigned one name, like Windows Server dashed one. This is our virtual machine name. And the files are created with this virtual machine names like Windows server one dot NV RAM, Windows server one dot vm, DKA, Windows server one dot VMX. So this is a file format. 48. Configuration File: In this section we will discuss about the configuration file dot VMX is the virtual machine configuration file. This is the VMX file. And it contains virtual machine hardware information like our mini CPUs and NICs are available in the virtual machine. How much RAM is available in our gel material, this file is having the hardware information of the virtual machine. 49. NVRAM File: In this section we will discuss are what we ran settings file, which is also referred to as dot n where m. Okay, so if you see here, we have this dot enemy ran pile, and it stores the state of virtual machines bios settings. So this dot NV RAM file is now having the virtual machines bios information and changes made to the bios settings are saved in that dot and we remember, so whatever the changes you are making in their bios settings, they are saved in this dot n where m file or we can say this dot NV RAM pile, either buy or sell virtual machine. 50. Log File: In this section we will discuss about the log. Log pile saves the virtual machine logs. Okay, So this is the log pi and of polynom, of this log file is vmware dot loc. It doesn't have the virtual machine name. And what is the use of this log piracy? If there is any issue in your network, if there is any issue in your infrastructure, VMware support will fix the issue after investigation. Logs in the log file. Okay, so even a problem is there in your network, you will contact that VMware support. They will ask you to provide the log file. They will investigate the log messages and they will fix the issue. 51. VMDK File Full: In this section we will discuss about virtual machine disk file. Lot VMD k is the virtual machine disk file. This is the.vmd k. And it is a virtual hard disk of a virtual machine where you save that data. In physical machines, we have physical hard disk. In virtual machine we have virtual hard disk. And.vmd k is the virtual hard disk where we save that data. So these are the files of a virtual machine. Virtual machines or having some other pies which you will learn in the advanced course. 52. What Are Virtual Machine Characteristics : In this section, we will discuss about four key characteristics of virtual machine. Virtual machines are following characteristics like compatibility, isolation, encapsulation, hardware independence, which offer several benefits to users. We will discuss all these four characteristics one by one in detail. 53. Compatibility: In this video, we will discuss about virtual machine. First characteristic, that is compatibility. So in our previous videos, we have discussed virtual machine provides the same functionality as hardware machine. So virtual machines are compatible with all the X86 operating systems, applications and device drivers, which means we can run the same software is that you would run on physical machine. Okay, so you can run all the same softwares on virtual machines that you would run on a physical machine. This is the meaning of compatibility. So all the softwares, all the X86 or face are compatible with virtual machines. 54. Isolation : In this video, we will discuss about the second characteristic of virtual machine, which is isolation. Will try to understand what is this isolation, what is the advantage of isolation with this example? In this example, if you see we have one physical machine. On the top of this physical machine, we have created three virtual machines. Virtual machine, one, virtual machine, and virtual machine three, all these three virtual machines, Our sharing the resources of same physical server. Even though they are sharing the resources of same physical machine, they are isolated from each other. Isolated means they are not connected with each other, but they are not dependent on each other. So what is the advantage of this isolation? If one virtual machine gets crashed? In this example, let us say virtual machine gets crashed. It will not affect Virtual Machine one N virtual machine three. These two virtual machines remain available to the users. This is the advantage of isolation if you see the sentences here. While virtual machines where the resources of same physical machine, but they remain completely isolated from each other, so they are independent of each other. If one virtual machine crashes, in this example, VM2 gets grabbed. The other two virtual machines will not be affected. So Vm1 and Vm2, they will not be affected. And they remain available to the users. 55. Encapsulation : In this section, we will discuss about the third virtual machine characteristics, which is encapsulation. As we have discussed, virtual machine is a set of pies. If you create a Virtual Machine, multiple files are created. What this encapsulation will do. The encapsulation saves all the virtual machine files in one capsule. Encapsulation will save all these files in one capsule are in one folder on a storage device, which makes Virtual Machine portable. Because all files are saved in one capsule or table. We can move the virtual machine from one ESX host to another host very easily because we are moving Virtual Machine, which means we are moving the older from one host to another ES6 I host. This is a user encapsulation. You can move and copy. Virtual machine is like moving and copying the regular computer pi. So it is very easy to move the virtual machines from one host to another host because all the files are saved in one folder. So moving is like moving that regular pile, moving the virtual machine is like moving the regular file from one host to another ESX host. What it will encapsulate, what this encapsulation will encapsulate. It will encapsulate all the virtual machine pies operating system and its application in one capsule or one folder. In this example, if you see, we have created three virtual machines. Virtual machine, one, virtual machine, and virtual machine three, all these three virtual machines are having operating system and applications. All the files are saved in separate folder of each virtual machine. 56. Hardware Independence: In this section, we will discuss about the fourth virtual machine characteristic, which is hardware individualist. Let us try to understand what does it mean by hardware and liberalism. The virtual machines are hardware independent, which means we can migrate the virtual machine is from Intel architecture to AMD architecture, because the virtual machines are set of Pi. So in this example, if you see we have two ESX host. This ESX host is having Intel architecture and this ESX host chase AMD architecture, but we can move the virtual machine is from architecture ESX hose to AMD architecture ESX host. Because of virtual machines or the set of files, they are compatible with every architecture. 57. VM Cloning full: This video, we will see what is a virtual machine. We only, we only thing is the process of creating an exact or P on virtual machine. You see this example here we have one virtual machine with the help of threonine. We have created the exact copy of this virtual machine. So what is a clone here? A clone is a copy of an existing virtual machine. So this is the primary Virtual Machine or period virtual machine. We have created the clone of this period virtual machine and clone as same hardware, software and other configuration as original Virtual Machine. This loan will have the same software, same operating system, L, same virtual hardware as well. The existing virtual machine called parent of the purines. So this original Virtual Machine is known as parent, and a copy of this parent is known as clone. Clone. Operation is completed, okay, when we create the copy, when we create the loan, the loan is a separate virtual machines. So this clone will be a separate virtual machine. Let us discuss what is the use of curriculum. Goals are useful when you need to create multiple virtual machines with the same operating system and applications, imagine you have a requirement to create hundred virtual machines. Width will lose 11 operating system, an MS Office application. So what you will do, you will create virtual machines. After creating 100 virtual machines, you will install operating system on all the Virtual Machines one-by-one. Ledoux, we'll install the MS Office application on all the virtual machines, which will take a lot of time. So instead of that, what you will do, you will create one virtual machine. On the top of this virtual machine, you will install windows 11 operating system. On the top of this window is 11 operating system, you will install MS Office. After that, you will create 99 clones, which will save your time. Installing a guest operating system and application can be time-consuming. And with clause, you can make many copies of a virtual machine from a single installation and configuration process. So you need to create only one virtual machine. And you can create multiple clause from this virtual machine. 58. What is the use of Clone : Let us discuss what is the use of piccolo. Those are useful when you need to create multiple virtual machines with the same operating system end applications, imagine you have a requirement to create 100 virtual machines. Width will lose 11 operating system and MS Office application. So what you will do, you will create 100 virtual machines. After creating 100 virtual machines, you will install operating system on all the Virtual Machines one-by-one. You will install the MS Office application on all the virtual machines, which will take a lot of time. So instead of that, what you will do, you will create one virtual machine. On the top of this virtual machine, you will install Windows 11 operating system. On the top of this window Sullivan Operating System, you will install MS Office. After that, you will create 99 close, which will save your time. Installing a guest operating system and application can be time consuming. And with clothes, you can make many copies of a virtual machine from a single installation and configuration process. So you need to create only one virtual machine. And you can create multiple clause from this virtual machine. 59. Flexibility: In this video, we will discuss about flexibility. Virtual machines are flexible. What does it mean by flexible? You can move the virtual machines from one ESX host to another host easily because they are set of Pi. So in this example we have ES6, i1, and ESX R2. And we can move the virtual machines from one ESX host to another host easily. Because the virtual machines are flexible, because of virtual machines are set up piles. 60. Security full: In this video, we will discuss about security in virtual machine advantages. To understand the security concept in virtual machine, we will take this example. In this example we have one physical machine. On the top of this physical machine, we have created three virtual machines and let us say VM1, VM2, and VM3. And let us say VM2 gets infected with malware like ransomware. This virtual machine will contain the damage made by these malware to itself. And the other two virtual machines will not be affected. And they remain available to the users because the virtual machines are isolated from each other. This is how it provides the security to virtual machines. 61. Backup full: In this video, we will discuss about virtual machine backup. Virtual machines can be backed up periodically. In this example, we have one physical server. On the top of this physical server, we have four virtual machines. Virtual machine 123.4. And we have discussed that virtual machines are nothing but the collection of pies. And we have one backup server. This backup server is responsible for taking the backup of these virtual machines periodically, periodically miss. You will set one time, let us say at 10:00 P.M. the backup should be taken. Server will take the backup every day at 10:00 P.M. and it will save this backup. It is backup repository. Okay? So virtual machines can be backed up periodically and the backup server creates a copy of virtual machines and save it on a backup repository that can be restored later in case of disaster. 62. Restore : In this video, we will see when and where to restore the backups. So you can restore the virtual machines to the original location in case of ransomware attack and virtual machine failure. So in our previous video, we have seen that we have taken the backup of this for Virtual Machine and it is saved in this backup repository. Let us say this virtual machine for is infected with ransomware attack. In this case, what we will do given restore the virtual machine pore at the same location. And this virtual machine for really start working. And let us say this Virtual Machine one is down, it is not working at all. In this case also, you will restore the backup at the same location and this Virtual Machine, one really start working fine. You can restore the virtual machines to a different location. Let us see how in this example we have yes, X i1 and i2 and we have taken the backup of this board virtual machine. And let us say this ESX host is down, the physical server is down. In this case, we cannot restore the virtual machine adverse same location. We need to restore the virtual machine at depend locations. So we will restore the virtual machine on ESX setup. And the restoration process is very fast. We can restore the virtual machine is in human years, unlike physical environment.