Power Systems for AIX - Virtualization I: Implementing Virtualization

5 Day | Instructor Led

This course provides an overview of the PowerVM edition's features on POWER6 and POWER7 processor-based systems. It explains the new features and benefits of virtualization including processor virtualization, Integrated Virtual Ethernet, Virtual I/O Server, and virtual devices, such as virtual Ethernet, virtual SCSI, and virtual Fibre Channel adapters. Basic and advanced configurations of the Virtual I/O Server and its clients are discussed including various availability options.

Inquire About
Power Systems for AIX - Virtualization I: Implementing Virtualization

Ideal Candidates for Power Systems for AIX - Virtualization I: Implementing Virtualization Class

This advanced course is appropriate for System Administrators, Technical Support Personnel, and Business Partners responsible for implementing LPARs on IBM Power Systems with AIX servers.

Power Systems for AIX - Virtualization I: Implementing Virtualization Prerequisites

You should have advanced system administration experience with AIX 5.3 or later. This prerequisite may be met by attending one of the following courses:

Power Systems for AIX II: AIX Implementation and Administration (AN120) or Power Systems for AIX II: AIX Implementation and Administration (ILO) (AX120)
or you must have equivalent AIX and LPAR skills.
General TCP/IP knowledge is strongly recommended. This prerequisite may be met by attending TCPIP for AIX Administrators (AN210).

You are also expected to have logical partition administration skills on POWER6 or (later generations) of processor-based systems, which can be obtained by attending Power Systems for AIX I: LPAR Configuration and Planning (AN110).

What You'll Get in Power Systems for AIX - Virtualization I: Implementing Virtualization

What You'll Learn in Power Systems for AIX - Virtualization I: Implementing Virtualization

Discuss the advantages or value of PowerVM edition's features
Define micro-partitioning and shared processor LPARs
Discuss the benefits of simultaneous multithreading
Discuss and configure the Integrated Virtual Ethernet (IVE)
Install and configure the Virtual I/O Server
Configure virtual network devices, such as virtual Ethernet and shared Ethernet adapters
Configure virtual SCSI and virtual Fibre Channel storage adapters
Configure virtual SCSI target devices on a virtual SCSI adapter
Define file-backed storage pools and file-backed virtual optical devices
Identify single points of failure in virtualized environments
Configure multiple VIO servers for high availability
Configure advanced virtual networking options
Configure the shared Ethernet adapter failover feature
Configure advanced virtual SCSI options
Configure MPIO in a VIO server's client partition
Manage the service events, configure call home, add, exchange FRUs, and discuss FSP failover
Perform PowerVM (VIOS) Maintenance

No Certification Test Available For This Course

No Certification Test Available For This Course

Power Systems for AIX - Virtualization I: Implementing Virtualization Outline

1. Introduction to Partitioning

2. Processor Virtualization

3. Integrated Virtual Ethernet

4. Virtual Ethernet

5a. Virtual I/O Server and Virtual Devices

5b. Virtual I/O Server and Virtual Devices

6. Virtual Network Configurations with Dual VIOS

7. Virtual SCSI Configurations with Dual VIOS

8. N_Port ID Virtualization

9. Migration from Physical to Virtual Storage

10. HMC Service Management.

11. PowerVM Advanced Systems Maintenance

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

This course introduces the concepts and skills necessary to build a website by using IBM Web Content Manager 8.5. It includes building an authoring system, creating and managing web content items, creating a change management framework, and delivering web content. Hands-on exercises on the Windows operating system are provided throughout the course, giving you practical experience with building, designing, and managing a website.



IBM Cognos Framework Manager: Design Metadata Models (V10.2) provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the Web, enabling end users to easily author reports and analyze data.



This course provides participants with introductory to advanced knowledge of metadata modeling concepts and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the Web, enabling end users to easily author reports and analyze data.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W