Browse Definitions :
Definition

differencing disk

Contributor(s): Anil Desai

A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system. The purpose of differencing disks is to make it possible to maintain information about changes made so that they can be reversed if necessary.

Differencing disks are based on either a fixed-size or dynamically expanding VHD and can be configured with parent-child relationships to form a hierarchy of VHD types. The disks store all of the changes that would otherwise be written to the parent VHD.  However, it's important to remember that, as a rule, any VHD that serves as a parent must remain read-only.

Differencing disks can increase manageability, especially when multiple VMs share a similar configuration, and can dramatically reduce the amount of disk space required on a Virtual Server host computer. The drawbacks are that differencing disks can be difficult to manage and large hierarchies of disks can potentially lead to performance problems, especially if all of the physical VHD files are located on the same disks or arrays. Within Virtual Server, you can merge a differencing disk with its parent -- an operation that commits all the changes and either updates the base VHD or creates a new VHD file.

This was last updated in April 2013

Continue Reading About differencing disk

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Some Queries:

1. What happens to child VMs if parent disk got corrupted.
2. Can we replace parent disk with another parent disk?
3. If I make 1000 child VMs from 1 parent disk, does it have IO issues or bottlenecks?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close