What equipment or infrastructure is needed to deploy KVM over Ethernet? How does IPMI relate to remote KVM?
KVM over Ethernet -- sometimes called KVM over IP or KVM over LAN -- requires hardware support from each of the servers being managed. In nearly all cases, this involves the inclusion of a KVM feature in a dedicated microcontroller -- usually included in the server's baseboard management controller (BMC) chip. In other systems, KVM over IP capabilities can be added through the inclusion of a daughter card that plugs into the system motherboard.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
One key function of the KVM over Ethernet controller is compression; it must capture keyboard, mouse and video signals and compress that data before sending it on to the network. Video compression is particularly important to effective remote KVM use because high resolutions, high color depths, and graphics and other visual media at the remote server require moving a lot of visual data. Compression reduces bandwidth demands and often eases the lag that might be experienced between moving the mouse or pressing a key and actually seeing the corresponding feedback on the display.
The Intelligent Platform Management Interface (IPMI) is a comprehensive interface designed for out-of-band systems management. IPMI is not required for KVM over IP, but systems supporting IPMI 2.0 will typically include support for integrated features like KVM over IP, remote virtual media and embedded Web server capabilities (among other features). So moving to a server with IPMI 2.0 will often bring KVM over IP capability at the same time.
Dig Deeper on Real-Time Performance Monitoring and Management
Related Q&A from Stephen J. Bigelow
Our enterprise wants to limit the time it spends generating Identity and Access Management policies. What tools are available to automate this task?continue reading
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out ...continue reading
We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.