1. COVER
2. TITLE PAGE
3. COPYRIGHT
4. DEDICATION
5. ACKNOWLEDGMENTS
6. ABOUT THE AUTHORS
7. INTRODUCTION
1. Who Should Read This Book
2. What Is Covered in This Book
3. How to Contact the Author
8. CHAPTER 1: Understanding Virtualization
1. Describing Virtualization
2. Understanding the Importance of Virtualization
3. Understanding Virtualization Software Operation
9. CHAPTER 2: Understanding Hypervisors
1. Describing a Hypervisor
2. Understanding the Role of a Hypervisor
3. Comparing Today's Hypervisors
10. CHAPTER 3: Understanding Virtual Machines
1. Describing a Virtual Machine
2. Understanding How a Virtual Machine Works
3. Working with Virtual Machines
11. CHAPTER 4: Creating a Virtual Machine
1. Performing P2V Conversions
2. Loading Your Environment
3. Building a New Virtual Machine
12. CHAPTER 5: Installing Windows on a Virtual Machine
1. Loading Windows into a Virtual Machine
2. Understanding Configuration Options
3. Optimizing a New Virtual Machine
13. CHAPTER 6: Installing Linux on a Virtual Machine
1. Loading Linux into a Virtual Machine
2. Understanding Configuration Options
3. Optimizing a New Linux Virtual Machine
14. CHAPTER 7: Managing CPUs for a Virtual Machine
1. Understanding CPU Virtualization
2. Configuring VM CPU Options
3. Tuning Practices for VM CPUs
15. CHAPTER 8: Managing Memory for a Virtual Machine
1. Understanding Memory Virtualization
2. Configuring VM Memory Options
3. Tuning Practices for VM Memory
16. CHAPTER 9: Managing Storage for a Virtual Machine
, 1. Understanding Storage Virtualization
2. Configuring VM Storage Options
3. Tuning VM Storage
17. CHAPTER 10: Managing Networking for a Virtual Machine
1. Understanding Network Virtualization
2. Configuring VM Network Options
3. Tuning Practices for Virtual Networks
18. CHAPTER 11: Copying a Virtual Machine
1. Cloning a Virtual Machine
2. Working with Templates
3. Saving a Virtual Machine State
19. CHAPTER 12: Managing Additional Devices in Virtual Machines
1. Using Virtual Machine Tools
2. Understanding Virtual Devices
3. Configuring a CD/DVD Drive
4. Configuring a Floppy Disk Drive
5. Configuring a Sound Card
6. Configuring USB Devices
7. Configuring Graphic Displays
8. Configuring Other Devices
20. CHAPTER 13: Understanding Availability
1. Increasing Availability
2. Protecting a Virtual Machine
3. Protecting Multiple Virtual Machines
4. Protecting Data Centers
21. CHAPTER 14: Understanding Applications in a Virtual Machine
1. Examining Virtual Infrastructure Performance Capabilities
2. Deploying Applications in a Virtual Environment
3. Understanding Virtual Appliances and vApps
4. Open Stack and Containers
5. Cloud and the Future of Virtualization
22. APPENDIX: Answers to Additional Exercises
1. Chapter 1
2. Chapter 2
3. Chapter 3
4. Chapter 4
5. Chapter 5
6. Chapter 6
7. Chapter 7
8. Chapter 8
9. Chapter 9
10. Chapter 10
11. Chapter 11
12. Chapter 12
13. Chapter 13
14. Chapter 14
, 23. GLOSSARY
24. INDEX
25. END USER LICENSE AGREEMENT
List of Tables
1. Chapter 1
1. TABLE 1.1 Byte Sizes
2. TABLE 1.2 Processor Speed Increases Over 6 Years
2. Chapter 7
1. TABLE 7.1 Cores Available in Various Processor Configurations
3. Chapter 8
1. TABLE 8.1 Memory Optimization Techniques
4. Chapter 13
1. TABLE 13.1 Availability Percentages
List of Illustrations
1. Chapter 1
1. FIGURE 1.1 A basic VMM
2. FIGURE 1.2 Moore's law: transistor count and processor speed
3. FIGURE 1.3 Server consolidation
2. Chapter 2
1. FIGURE 2.1 Where the hypervisor resides
2. FIGURE 2.2 A virtual machine monitor
3. FIGURE 2.3 A Type 1 hypervisor
4. FIGURE 2.4 A guest failure
5. FIGURE 2.5 A Type 2 hypervisor
6. FIGURE 2.6 Abstracting hardware from the guests
7. FIGURE 2.7 Processing a guest I/O
8. FIGURE 2.8 The ESXi architecture
9. FIGURE 2.9 The Xen hypervisor architecture
10. FIGURE 2.10 Microsoft Hyper-V architecture
3. Chapter 3
1. FIGURE 3.1 A virtual machine
2. FIGURE 3.2 Windows Device Manager in a VM
3. FIGURE 3.3 CPU settings in a VM
4. FIGURE 3.4 Memory settings in a VM
5. FIGURE 3.5 A simple virtual network
6. FIGURE 3.6 Network resources in a VM
7. FIGURE 3.7 Virtual machine storage
8. FIGURE 3.8 Storage resources in a VM
9. FIGURE 3.9 A simplified data request
10. FIGURE 3.10 A simplified data request in a virtual environment
11. FIGURE 3.11 Cloning a VM