Question? Call Us  +1 (817) 546-4770

NIT3222 Virtualisation In Computing

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

NIT3222 Virtualisation In Computing

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

NIT3222 Virtualisation In Computing

0 Download9 Pages / 2,062 Words

Course Code: NIT3222
University: Victoria University is not sponsored or endorsed by this college or university

Country: Australia


The assignment requires the following objectives to be satisfied. In addition, the assignment needs to be documented in a correct and clear manner. Note that the maximum mark allocation for this assignment is 25.

Configuring the virtual networks to enable communication.
Adding at least two hosts to SCVMM as displayed in the above diagram.
Adding at least one host as a trusted host (i.e. host resides in the domain).
Storage of at least one virtual machine in the SCVMM library.
Migration of one virtual machine from one host to another.
Placing the SQL server used by SCVMM on a machine that does not operate the VMM service.


Correctness: the documentation correctly describes the objectives and associated configuration.
Presentation: the documentation is well structured and formatted.

Demonstrations of the SCVMM setup will be required to verify that the practical tasks have been satisfied. The assignment documentation will be submitted using VUCollaborate no later than Monday the 23rd of October at 5:00PM. Students are also required to complete a student declaration form upon submission (either electronic or hard copy).


Virtualization computing refers to a new way of capabilities addition to a computer without the need of software licensing in the acquired new hardware or personnel training. In this report, we will be implementing the server of a cloud for the storage of a database and running the services of the application through online means.
We are going to begin by installing the workstation of the VMware whereby an individual is able to create a network that is virtual through the directory that is provided by the software.

Fig 1: Selecting setting up a VNet on VMware
On create new virtual network, we will select the edit option on the displayed menu and since we are going to create a virtual network then we will select the Virtual Network option on the menu.
The virtual Network editor will simply have different type of host connection on which different Nat type of virtual network are connected and enabled on each other. Upon the change of the setting and create a new virtual network, the one on the bottom right first, one needs to change settings and the add network button will be enabled. The next step will be adding a Virtual Network on the network editor. We will select the name of the network and configure the DHCP setting to finalize the network ip address, there are starting ip and ending ip broadcasting network in the communication channel.
All the resources ought to be located on a network. Therefore, a virtual network will be created in this since we already have the subnet, network security group, resource group as well as the public IP address.

Fig 2: Inserting Basic Criteria’s
Connecting a host virtual adapter will enable the user to use basic DHCP ip address to distribute ip address to the virtual machines that are available in the network
Subnetting is one of the new and best technology when it comes to dividing roles. Subnetting is a way of splitting/dividing the network in to one or two routes. For efficiency, reliability and authenticity. In this case, the allocated the ip range of that will give us 512 addresses with a subnet mask of
A service input is a set that simply provides connection between the Virtual Network and the other storage hub or secret data warehouse. One can also block the storage account access and protect it. One can simply protect the traffic flow. It ideally works like the firewall.
After checking that all the data entered are on the design and set correctly, then we are going to create the Virtual Network. It will take up to 3 min in order for the VMware to create one VNet.

Fig 3: Running Virtual Netwrok.
After the VNet is created and all the data in it is put into place, then we will go directly to creating the second Subnet. The application server users some few ip addresses for their own purpose so we are going to create on the remaining amount of ip ranges that is available. If I go to the subnet that I have, it shows the default that takes about half the ip address range and since VMware takes 5 ip addresses for its own use we will be left with the remaining 126 ip addresses within the network.  
A resource group is a large logical group of related resources. The groups focus on the management security in the building of the Virtual Network. When selecting a region, one needs to select an area that is closer to the workstation. The closer the region the quicker the response to the Virtual Network.
Fig 4: Subnetting ip address and Subnet masks
We are going to create a second subnet where we are going to use half of the remainder. The Second subnet known as the Backhead is dedicated in covering the ip range of
 If you are going to create a virtual network it uses a net gateway to connect your private own network into Microsoft VMware then the network requires its own subnet. Then we will add a gateway on it.
Gateways helps one to get linked or connect from a private network to the virtual network hence enabling access to all the basic equipment that is ideally being shared in the group level.
Another thing that needs to be discussed is the Networking Security group. The security group act as the firewall to the virtual network and the subnetting on which they are attached to. Like all the other security roles, they also have the inbound rules that guide and govern the flow of data and information into the virtual network/they have the inbound type of rule and the outbound.
There major 3 rules that are set in the networking security group

Allow any traffic on the Virtual Network to travel in from other virtual networks and enter.
Allow load balancer traffic to travel in the virtual local network.
Denies all the other traffic from access to the Virtual Network.

Upon adjusting the security group then one will click on the resource tab, select create new Network Security group then it will prompt one to input the details to use in the creating, that is, the name of the security group, resource group and the region.
The following step is the one that we will need to create a virtual machine and link it with the network. One of the virtual machines will be windows 8 which will turn out to be out host machine with scvmm and the other machine is Microsoft XP which is host 2 and will act as the client in this way.
Click create a virtual machine on the home tab. A dialog box will prompt you to select the type of application you want either typical machine or a customized one with your setting on it. Then the next step is selecting the operating system, which in this case is Microsoft Xp. Then were going to allocate the disk space to the operating system. 512 mb is the appropriate disk space to be allocated to the Virtual machine. Then were going to customize the hardware configuration in that we select the iso boot location where it is the operating system and were it will store. I have the cd/dvd drive for the Microsoft Xp version

Fig 5: Hardware Configuration
On finalizing the configuration of the hardware requirement the below display will be given showing the machines detail and whether or not were going to power on the machine. On powering on the VMware will directly take us to the Bios boot and will identify the operating system and be able to boot from it.

Fig 6: Validation Pass
We will then select the language the keyboard use and the region as to which we are in. then click ok and the disk partition option will appear and will prompt us to select eh location were the iso image and boot mgr. will be store in the local storage unit. On directing the channel then the boot will commence.

Fig 7: Bios Boot Loader
After successfully setting up the operating system them were good to go and the virtual machine is up and running

Fig 8: Windows Finally Setup
The next step is also to create the second virtual machine but in this case, the machine will be used for scvmm function. The difference also is that the operating system will be in window 8 Version. In creation of the Microsoft Xp the same steps and procedures will be followed the difference is that in this we do not have the windows iso disk. We have a bootable flash. So on the validation pass will need to add some information for the hard disk drive in that we select typical location and on it will choose the hardware that we want to use and the partition number of the hard disk to the drive. One can check on the command prompt the number in which the partition is in use
Fig 9: SCVMM Setup
Were also going to setup and SCVMM server manager for the network in which it is hosted in.
In this phase, a host virtual machine is will be established with the SCVMM machine to enable them to communicate.
Once logged in, we create the profile of the user. We then move to the starter manager and make changes on the server by use of roles that provide a number of choices to the server manager. We then move to the dialog box whereby we select which is:

Data analysis and processing
Development of VMware
Web development and ASP.NET

This enables modification of the firewall as well as restriction of the traffic that enters the box from outside. Then the security rule added from the outside.
Windows 8 is the host that is trusted to run the residential domain and to store the virtual machine in the SCVMM library.
On creating a SCVMM 2012 R2 Requirements there are several requirements that need to be meet such as

the allocation of memory that is 4 gb
Windows Server 2011 & above
Must be a member of active directory domain
Server name cannot exceed it character
SQL Server 2008 R2 with sp 2 and greater.

Fig 10: Local Serve Properties
Create an account of active directory that were going to use for the Virtual Machine to get to admin the host machine
We will create some user and login credentials for the administrator of the server to login and be able to manage the network database and the server
We also need to create a Container in active directory for distributed key management
The diagram below shows how we are going to add hosts to the SCVMM.
In this phase were going to deploy the Permission and administrator account to the server machine by granting it access to various function in the virtual machine
Were also going to Grant the SQL SERVER the permission to admin.
Migration of one virtual machine from one host to another
The sql database being one major backbone for the storage of data and information is very crucial for person guarantee. Move to the dashboard and then pick the option of manage. Use the name of logging in and the password, the level of the performance and the tired of the service we are going to select. After that, begin sending data from the database of the SQL. At the manage option, a notification will appear indicating that we import the blog. Then, enter a password to begin exporting data.
Download Team manager for Windows 8. By doing so, we will be able to access and manage the SQL Database remotely even without login in into the scvmm machine to grant entry to the database
After downloading, we will need to install and make it run to the virtual machine and be able to deploy the administrative rule to the database
The process is as follows: create a database in the cloud in the counsel of the VMware management windows. After creating the database, choose a server, work location and the virtual server.
Placing the SQL server used by SCVMM on a machine that does not operate the VMM service.
We begin this by creating a database. Create two tables that will be used in storing the data contained in sent zip. Then go to import and export data. Then, upload it into the VMware using a tool after creating an account for storage.
MY SQL database creation.
To begin with, launch instances of multi RDS. Create and modify the instances of the database run as deployment of multi A2. Multi A2 deployment enables the application to become transparent. One cannot interact with it directly and it is not possible to use it supporting the read traffic when setting up a database of the VMware. The following conditions should be met:

Creating a security group for the database.
Authorizing the instance for the database.
Launching the instance of the database.

Amazon EC2 Available:
Zhang, L. J., Zhou, Q., 2009. CCOA: Cloud Computing Open Architecture. In Proceedings of the 2009 IEEE International Conference on Web Service, pp. 607-616
Chu, D., Popa, L., Tavakoli, A., Hellerstein, J.M., Levis, P., Shenker, S. and Stoica, I., 2009, November. The design and implementation of a declarative Embedded Cloud implementing. In Proceedings of the 5th international conference on Embedded Cloud implementing systems (pp. 175-188). ACM.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 9 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Virtualisation In Computing. Retrieved from

“Virtualisation In Computing.” My Assignment Help, 2021,

My Assignment Help (2021) Virtualisation In Computing [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Virtualisation In Computing’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Virtualisation In Computing [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Are you having difficulty to make time for the proofreading of your paper? If you are wondering “Who can proofread my paper in the tight deadline,” then we suggest you take writing help from some of the best essay helpers at Our experienced paper writer will make sure that you have a complete error-free essay at the end of the day, irrespective of the type of essays.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »