SlideShare a Scribd company logo
1 of 24
CONTENT 
Introduction 
Need of Virtualization 
Network Virtualization 
Working 
A New Proposal 
Benefits 
Limitations 
Future impact 
Conclusion
INTRODUCTION 
 Virtualization refers to the act creating the virtual 
version rather than the actual for simulating a 
hardware platform such as server, storage or 
network resources in software. 
 The physical devices are simply responsible for the 
forwarding of packets, while the virtual network 
provides an intelligent abstraction that makes it easy 
to deploy and manage network services and 
underlying network resources.
NEED OF VITUALIZATION 
When virtualization technique is applied to the 
network, it creates a logical software-based view of 
the hardware and software networking resources 
such as switches, routers, etc. 
 It provides solution to the problem incurred in 
moving the virtual machine across different 
domains. 
 The idea is to apply virtualization technique on 
networking to provide parallel data transmission to 
achieve high speed network.
NETWORK VIRTUALIZATION 
 Network Virtualization literally tries to create a 
logical segment across the network by dividing the 
network logically at flow level. It is similar to 
partitioning the hard drive. 
 It is accomplished by using a variety of hardware 
and software and combining network. 
 Network Virtualization is an overlay and it can be 
said to be act like a tunnel. Instead of physically 
connecting two domains in a network, NV creates a 
tunnel through the existing network to connect two 
domains. This runs on high performance x86 
architectures.
NV ARCHITECTURE
WHY IT IS USED 
 This paves a new way to virtualize the infrastructure 
and make changes on top of the existing 
infrastructures. 
 The main goal of this concept is to allow people to 
move VMs independently of their existing 
infrastructure and no need of reconfiguration of 
network. 
 The intended result of Network Virtualization is 
improved network productivity and efficiency.
 Physical network-while excellent at forwarding 
packets-is an inflexible, complex and costly barrier 
to realize the full agility required for parallel data 
transmission. 
 Physical network bounds to network resources and 
topology. The solution to this barrier is to virtualize 
the network which decouples the network services 
from underlying physical n/w hardware or 
resources. 
 Decoupling virtual networks from the physical 
hardware allows you to scale the pool of network 
capacity without affecting the virtual networks 
operating above it.
“Nicira” delivers 
the first network 
virtualization 
platform which 
enables the n/w for 
cloud.
WORKING 
 The idea behind virtual network software is to 
introduce an abstraction which will decouple traffic 
in physical network elements and also it creates 
virtual components such as virtual network adapters 
and virtual switches. 
 NV requires the VLAN software on each virtualized 
server as well as within the switches. Those switches 
are referred as intelligent switches. 
 Virtual network software provided by Citrix and 
Vyatta offers a platform to create a complete 
virtualized network stack for an organization.
When two VMs on the same server exchange data, no 
traffic goes out onto the external network. 
 The workloads simply exchange data between 
locations in the server’s memory. 
 This offers extremely fast performance for data 
transferred between the workloads. 
 In addition, that data does not need to go out onto the 
external network, so bandwidth is freed for other 
servers and tasks out on the network.
SEVEN KEY FEATURES ANY NETWORK VIRTUALIZATION 
DELIVER 
 Completely decouple virtual networks from the 
underlying network hardware 
 Faithfully reproduce physical network services in 
the logical space 
 Complement any server hypervisor platform, and 
any application on any virtual or physical machine 
 Allow programmatic provisioning and virtual 
network control 
 Enable cloud scale (>10K virtual networks)
 Provide secure address space isolation between 
virtual networks, the physical network and the 
control plane 
 Take full advantage of physical network capacity 
ATTRIBUTES OF NV 
 Multi-tenant segmentation 
Workload portability 
Multi-site Asset Utilization 
 Network Abstraction from Physical to Virtual 
 Virtual Machine Aware
NETWORK SECURITY THROUGH NV 
 From server 
consolidation to the 
cloud, virtualization is 
now the dominant 
computing platform 
worldwide. Beyond 
expanding computing 
capabilities, increase 
network virtualization 
can also be considered 
a method to increase 
network security.
 The basic idea is to use NV to restrict n/w traffic 
within physical network. 
 Nodes which are configured as a part of given virtual 
network can send or receive data on that virtual 
networks, the traffic tends to be more secure . 
 Hence the unauthorized nodes are not allowed to 
access the sensitive data.
SECURITY PROVIDED BY NV 
 Isolation and Multi-Tenancy 
 Segmentation 
 Advanced security service Insertion , Chaining and 
Steering 
 Consistent security models across Physical and 
Virtual Infrastructure
 The idea of virtualizing wireless network is gaining 
attention as it has the potential to improve spectrum 
utilization and perhaps create new services. 
And also data security is not up to the level of getting 
in wired network. 
Interference is more in wireless technologies like 
Wi-Fi and there is a possibility of random signal 
loss. 
But the speed of transmission is more and physical 
link is not required when compared to wired 
network.
BENIFITS 
 Reduce hardware cost 
 Server power consumption can be reduced 
 Recoverability: quick recovery from hardware 
failure 
 Disaster recovery 
 Installation speed and simplicity 
 Increased mobility and collaboration 
 More Scalability
LIMITATIONS 
 Experience required for implementing or operating 
virtualization 
 Power computers can only create virtual 
environment. 
FUTURE IMPACT 
 The idea proposed is about virtualizing wireless 
network since it has more scope in future. 
 The challenge we are facing while virtualizing the 
wireless network is assigning the physical resources 
to virtual networks in an efficient manner.
CONCLUSION 
 NV also helps in preventing destruction of data 
while sending through virtual links. 
 Any number of virtual links can be created which 
helps in sending more packets than sending it over 
the single physical network 
While the journey toward a highly virtualized 
infrastructure will be long, and at times arduous, 
the result will bring the enterprise to new levels of 
performance, reliability, agility, and efficiency.
QUESTIONS?
THANK 
YOU

More Related Content

What's hot

High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networkingJohn Berkmans
 
ONP 2.1 platforms maximize VNF interoperability
ONP 2.1 platforms maximize VNF interoperabilityONP 2.1 platforms maximize VNF interoperability
ONP 2.1 platforms maximize VNF interoperabilityPaul Stevens
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks pptAkshay Hegde
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computingprabathsl
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFVIgor D.C.
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boardsMohamed Ramadan
 
6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)NAIM Networks, Inc.
 
Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsNitinder Mohan
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
DPDK - Data Plane Development Kit
DPDK - Data Plane Development KitDPDK - Data Plane Development Kit
DPDK - Data Plane Development KitVinay Pandey
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1nixon
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsAniekan Akpaffiong
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networksTrinity Dwarka
 

What's hot (20)

High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
 
The Impact of Cloud
The Impact of CloudThe Impact of Cloud
The Impact of Cloud
 
ONP 2.1 platforms maximize VNF interoperability
ONP 2.1 platforms maximize VNF interoperabilityONP 2.1 platforms maximize VNF interoperability
ONP 2.1 platforms maximize VNF interoperability
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks ppt
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computing
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFV
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)6th SDN Interest Group Seminar - Session1 (131210)
6th SDN Interest Group Seminar - Session1 (131210)
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Pruning Edge Research with Latency Shears
Pruning Edge Research with Latency ShearsPruning Edge Research with Latency Shears
Pruning Edge Research with Latency Shears
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
SDN Research Projects Guidance
SDN Research Projects GuidanceSDN Research Projects Guidance
SDN Research Projects Guidance
 
DPDK - Data Plane Development Kit
DPDK - Data Plane Development KitDPDK - Data Plane Development Kit
DPDK - Data Plane Development Kit
 
Bringing The Power of SDN to The Masses
Bringing The Power of SDN to The MassesBringing The Power of SDN to The Masses
Bringing The Power of SDN to The Masses
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
 
Networking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS AdministratorsNetworking Brush Up for Amazon AWS Administrators
Networking Brush Up for Amazon AWS Administrators
 
cloud computing
cloud computingcloud computing
cloud computing
 
The Great IT Migration
The Great IT MigrationThe Great IT Migration
The Great IT Migration
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 

Similar to Simulation of network through virtualization technique

01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptxXeniaRaquel1
 
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsHappiest Minds Technologies
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...csandit
 
Cto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfCto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfPaulo R
 
Network Functions Virtualization.pptx
Network Functions Virtualization.pptxNetwork Functions Virtualization.pptx
Network Functions Virtualization.pptxBachaspatiJoshi
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksIJCSIS Research Publications
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperAerohive Networks
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing Sanjiv Pradhan
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologyIRJET Journal
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivityIT Brand Pulse
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014Sanjay Basu
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapatibuildacloud
 

Similar to Simulation of network through virtualization technique (20)

01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx
 
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
 
Cto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfCto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnf
 
Network Functions Virtualization.pptx
Network Functions Virtualization.pptxNetwork Functions Virtualization.pptx
Network Functions Virtualization.pptx
 
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay NetworksProposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
Proposal of a Transparent Relay System with vNIC for Encrypted Overlay Networks
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
N fv good
N fv goodN fv good
N fv good
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivity
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Simulation of network through virtualization technique

  • 1.
  • 2. CONTENT Introduction Need of Virtualization Network Virtualization Working A New Proposal Benefits Limitations Future impact Conclusion
  • 3. INTRODUCTION  Virtualization refers to the act creating the virtual version rather than the actual for simulating a hardware platform such as server, storage or network resources in software.  The physical devices are simply responsible for the forwarding of packets, while the virtual network provides an intelligent abstraction that makes it easy to deploy and manage network services and underlying network resources.
  • 4. NEED OF VITUALIZATION When virtualization technique is applied to the network, it creates a logical software-based view of the hardware and software networking resources such as switches, routers, etc.  It provides solution to the problem incurred in moving the virtual machine across different domains.  The idea is to apply virtualization technique on networking to provide parallel data transmission to achieve high speed network.
  • 5. NETWORK VIRTUALIZATION  Network Virtualization literally tries to create a logical segment across the network by dividing the network logically at flow level. It is similar to partitioning the hard drive.  It is accomplished by using a variety of hardware and software and combining network.  Network Virtualization is an overlay and it can be said to be act like a tunnel. Instead of physically connecting two domains in a network, NV creates a tunnel through the existing network to connect two domains. This runs on high performance x86 architectures.
  • 7. WHY IT IS USED  This paves a new way to virtualize the infrastructure and make changes on top of the existing infrastructures.  The main goal of this concept is to allow people to move VMs independently of their existing infrastructure and no need of reconfiguration of network.  The intended result of Network Virtualization is improved network productivity and efficiency.
  • 8.  Physical network-while excellent at forwarding packets-is an inflexible, complex and costly barrier to realize the full agility required for parallel data transmission.  Physical network bounds to network resources and topology. The solution to this barrier is to virtualize the network which decouples the network services from underlying physical n/w hardware or resources.  Decoupling virtual networks from the physical hardware allows you to scale the pool of network capacity without affecting the virtual networks operating above it.
  • 9. “Nicira” delivers the first network virtualization platform which enables the n/w for cloud.
  • 10. WORKING  The idea behind virtual network software is to introduce an abstraction which will decouple traffic in physical network elements and also it creates virtual components such as virtual network adapters and virtual switches.  NV requires the VLAN software on each virtualized server as well as within the switches. Those switches are referred as intelligent switches.  Virtual network software provided by Citrix and Vyatta offers a platform to create a complete virtualized network stack for an organization.
  • 11. When two VMs on the same server exchange data, no traffic goes out onto the external network.  The workloads simply exchange data between locations in the server’s memory.  This offers extremely fast performance for data transferred between the workloads.  In addition, that data does not need to go out onto the external network, so bandwidth is freed for other servers and tasks out on the network.
  • 12. SEVEN KEY FEATURES ANY NETWORK VIRTUALIZATION DELIVER  Completely decouple virtual networks from the underlying network hardware  Faithfully reproduce physical network services in the logical space  Complement any server hypervisor platform, and any application on any virtual or physical machine  Allow programmatic provisioning and virtual network control  Enable cloud scale (>10K virtual networks)
  • 13.  Provide secure address space isolation between virtual networks, the physical network and the control plane  Take full advantage of physical network capacity ATTRIBUTES OF NV  Multi-tenant segmentation Workload portability Multi-site Asset Utilization  Network Abstraction from Physical to Virtual  Virtual Machine Aware
  • 14. NETWORK SECURITY THROUGH NV  From server consolidation to the cloud, virtualization is now the dominant computing platform worldwide. Beyond expanding computing capabilities, increase network virtualization can also be considered a method to increase network security.
  • 15.  The basic idea is to use NV to restrict n/w traffic within physical network.  Nodes which are configured as a part of given virtual network can send or receive data on that virtual networks, the traffic tends to be more secure .  Hence the unauthorized nodes are not allowed to access the sensitive data.
  • 16. SECURITY PROVIDED BY NV  Isolation and Multi-Tenancy  Segmentation  Advanced security service Insertion , Chaining and Steering  Consistent security models across Physical and Virtual Infrastructure
  • 17.
  • 18.  The idea of virtualizing wireless network is gaining attention as it has the potential to improve spectrum utilization and perhaps create new services. And also data security is not up to the level of getting in wired network. Interference is more in wireless technologies like Wi-Fi and there is a possibility of random signal loss. But the speed of transmission is more and physical link is not required when compared to wired network.
  • 19.
  • 20. BENIFITS  Reduce hardware cost  Server power consumption can be reduced  Recoverability: quick recovery from hardware failure  Disaster recovery  Installation speed and simplicity  Increased mobility and collaboration  More Scalability
  • 21. LIMITATIONS  Experience required for implementing or operating virtualization  Power computers can only create virtual environment. FUTURE IMPACT  The idea proposed is about virtualizing wireless network since it has more scope in future.  The challenge we are facing while virtualizing the wireless network is assigning the physical resources to virtual networks in an efficient manner.
  • 22. CONCLUSION  NV also helps in preventing destruction of data while sending through virtual links.  Any number of virtual links can be created which helps in sending more packets than sending it over the single physical network While the journey toward a highly virtualized infrastructure will be long, and at times arduous, the result will bring the enterprise to new levels of performance, reliability, agility, and efficiency.