SlideShare a Scribd company logo
1 of 36
Download to read offline
NETWORK VIRTUALIZATION
SEMINAR REPORT
CHAPTER 1
INTRODUCTION
1.1 WHAT IS VIRTUALIZATION?
Virtualization is the basic act of decoupling an infrastructure service
from the physical assets on which that service operates.
The infrastructure service exists entirely in a software abstraction layer:
• Lifecycle – started/stopped anytime
• Identity – being independent to physical world
• Location – could deployed anywhere
• Configuration – being simpler to manage
1.2 TYPES OF VIRTUALIZATION
FIG 1
FIG 2
FIG 3
FIG 4
FIG 5
1.3 NETWORK VIRTUALIZATION
In computing, network virtualization or network virtualisation is the
process of combining hardware and software network resources
and network functionality into a single, software-based administrative
entity, a virtual network.
Currently, there are two types of network virtualization:
• Internal Virtualization. Internal virtualization is designed to use
software containers to replicate the functionality of a single network.
• External Virtualization. External virtualization combines multiple local
networks into a single “virtual” network to improve the network efficiency
FIG 6
FIG 7
CHAPTER 2
NETWORK PROTOCOL AND MODEL
2.1 NETWORK PROTOCOL
• Rules and procedures governing transmission between computers
• Used to identify communicating devices, secure attention of intended
recipient, check for errors and re-transmissions
• All computers using a protocol have to agree on how to code/decode
the message, how to identify errors, and steps to take when there are
errors or missed communications Computer System Protocol
Packaging Protocol Delivery Protocol
2.2 NETWORK TOPOLOGIES
• Topology refers to the physical or logical layout of the computers
in a particular network
• Commonly used topologies are star, bus and ring.
FIG 8
2.3 NETWORK TYPES LANS AND WANS
• Local area network Network of computers and other devices
within a limited distance Uses star, bus or ring topologies Network
interface cards in each device specifies transmission rate, message
structure, and topology Network operating system routes and
manages communications and coordinates network resources
• Wide area network Network of computers spanning broad
geographical distances Switched or dedicated lines Firms use
commercial WANs for communication
FIG 9
CHAPTER 3
NETWORK ARCHITECTURE
3.1 PACKET SWITCHING
• Message/Data is divided into fixed or variable length packets
• Each packet is numbered and sent along different paths to the
destination
• Packets are assembled at the destination
• Useful for continued message transmission even when part of the
network path is broken
FIG 10
3.2 CONNECT TWO NETWORKS
FIG 11
3.3 CONNECT MULTIPLE NETWORKS
FIG 12
FIG 13
FIG 14
3.4 THE SIMPLE VIEW OF INTERNET
FIG 15
3.5 NETWORK DESIGN RULES
Hierarchical approach
• Traffic is aggregated hierarchically from an access layer into a
layer of distribution switches and finally onto the network core
• . A hierarchical approach to network design has proven to deliver
the best results in terms of optimizing scalability, improving
manageability, and maximizing network availability.
FIG 16
CHAPTER 4
EXTERNAL NETWORK VIRTUALIZATION
4.1 External network virtualization in different layers :
• Layer 1 Seldom virtualization implement in this physical data
transmission layer.
• Layer 2 Use some tags in MAC address packet to provide
virtualization. Example, VLAN.
• Layer 3 Use some tunnel techniques to form a virtual network.
Example, VPN.
• Layer 4 or higher Build up some overlay network for some
application. Example, P2P.
4.2 Two virtualization components :
• Device virtualization
• Virtualize physical devices in the network
• Data path virtualization
• Virtualize communication path between network access
points Router Switch Data Path
Device virtualization
▪ Layer 2 solution
• Divide physical switch into multiple logical switches.
▪ Layer 3 solution 3
• VRF technique ( Virtual Routing and Forwarding )
• Emulate isolated routing tables within one physical router.
Data path virtualization
▪ Hop-to-hop case
• Consider the virtualization applied on a single hop data- path.
▪ Hop-to-cloud case
• Consider the virtualization tunnels allow multi-hop data- path. 24
4.3 Protocol approach
• Protocols usually used to approach data-path virtualization
• Three implementations
o 802.1Q – implement hop to hop data-path virtualization
MPLS ( Multiprotocol Label Switch ) – implement router and
switch layer virtualization
o GRE (Generic Routing Encapsulation ) – implement
virtualization among wide variety of networks with tunneling
technique. 25
802.1Q
• Standard by IEEE 802.1
• Not encapsulate the original frame
• Add a 32-bit field between MAC address and EtherTypes field
o ETYPE(2B): Protocol identifier
o Dot1Q Tag(2B): VLAN number, Priority code
MPLS ( Multiprotocol Label Switch )
• Also classified as layer 2.5 virtualization
• Add one or more labels into package
• Need Label Switch Router(LSR) to read MPLS header 28
FIG 17
GRE ( Generic Routing Encapsulation )
• GRE is a tunnel protocol developed by CISCO
• Encapsulate a wide variety of network layer protocol
• Stateless property
o This means end-point doesn't keep information about the
state
CHAPTER 5
INTERNAL NETWORK VIRTUALIZATION
• A single system is configured with containers, such as the Xen
domain, combined with hypervisor control programs or pseudo-
interfaces such as the VNIC, to create a “network in a box”.
• This solution improves overall efficiency of a single system by
isolating applications to separate containers and/or pseudo
interfaces.
• Virtual machine and virtual switch :
o The VMs are connected logically to each other so that they
can send data to and receive data from each other.
o Each virtual network is serviced by a single virtual switch.
o A virtual network can be connected to a physical network by
associating one or more network adapters (uplink adapters)
with the virtual switch.
5.1 Internal network virtualization in different layers :
• Layer 1 Hypervisor usually do not need to emulate the physical
layer.
• Layer 2 Implement virtual L2 network devices, such as switch, in
hypervisor. Example, Linux TAP driver + Linux bridge.
• Layer 3 Implement virtual L3 network devices, such as router, in
hypervisor. Example, Linux TUN driver + Linux bridge + iptables
• Layer 4 or higher Layer 4 or higher layers virtualization is usually
implemented in guest OS. Applications should make their own
choice.
5.2 Properties of virtual switch
• A virtual switch works much like a physical Ethernet switch.
• It detects which VMs are logically connected to each of its virtual
ports and uses that information to forward traffic to the correct
virtual machines.
5.3 Typical virtual network configuration
• Communication network
o Connect VMs on different hosts
• Storage network
o Connect VMs to remote storage system
• Management network
o Individual links for system administration
FIG 18
5.4 Network virtualization example form VMware
FIG 19
CHAPTER 6
TRADITIONAL APPROACH AND NEW TECHNIQUES
6.1 TRADITIONAL APPROACH
In KVM system
▪ KVM focus on CPU and memory virtualization, so IO virtualization
framework is completed by QEMU project.
▪ In QEMU, network interface of virtual machines connect to host by
TUN/TAP driver and Linux bridge.
▪ Work with TUN/TAP and Linux Bridge :
o Virtual machines connect to host by a virtual network adapter,
which is implemented by TUN/TAP driver
o Virtual adapters will connect to Linux bridges, which play the
role of virtual switch.
TUN/TAP driver
▪ TUN and TAP are virtual network kernel drivers
o TAP (as in network tap) simulates an Ethernet device and it
operates with layer 2 packets such as Ethernet frames. TUN (as
in network TUNnel) simulates a network layer device and it
operates with layer 3 packets such as IP
• Data flow of TUN/TAP driver
o Packets sent by an operating system via a TUN/TAP device are
delivered to a user-space program that attaches itself to the
device.
o A user-space program may pass packets into a TUN/TAP
device. TUN/TAP device delivers (or "injects") these packets to
the operating system network stack thus emulating their
reception from an external source.
FIG 20
Linux bridge
• Bridging is a forwarding technique used in packet-switched computer
networks
• Unlike routing, bridging makes no assumptions about where in a
network a particular address is located.
• Bridging depends on flooding and examination of source addresses in
received packet headers to locate unknown devices
• Bridging connects multiple network segments at the data link layer
(Layer 2) of the OSI model.
FIG 21
TAP/TUN driver + Linux Bridge
FIG 22
6.2 NEW TECHNIQUES
In Xen system
• Since implemented with para-virtualization type, guest OS load
modified network interface drivers
• Modified network interface drivers communicate with virtual
switches in Dom0, which act as TAP in traditional approach.
• Virtual switch in Xen can be implemented by Linux bridge or
work with other optimization.
FIG 23
Detail in Xen System
FIG 24
Some performance issues :
• Page remapping
o Hypervisor remap memory page for MMIO.
• Context switching
o Whenever packets send, induce one context switch from guest
to Domain 0 to drive real NIC
• Software bridge management
o Linux bridge is a pure software implementation
• Interrupt handling
o When interrupt occur, induce one context switch again.
FIG 25
Improve Xen performance by software
▪ Large effective MTU
▪ Fewer packets
▪ Lower per-byte cost
FIG 26
Improve Xen performance by hardware
• CDNA (Concurrent Direct Network Access) hardware adapter
• Remove driver domain from data and interrupts
• Hypervisor only responsible for virtual interrupts and assigning
context to guest OS
FIG 27
6.3 Case Study
• VMware offer a hybrid solution of network virtualization in Cloud
• .Use redundant links to provide high availability.
• Virtual switch in host OS will automatically detect link failure and
redirect packets to back-up links.
FIG 28
CHAPTER 7
SUMMARY AND CONCLUSION
7.1 Network Virtualization Summary
Virtualization in layers
• Usually in Layer 2 and Layer 3
External network virtualization
• Layer 2
o 802.1q
• Layer 3
o MPLS, GRE
Internal network virtualization
• Traditional approach
o TAP/TUN + Linux bridge
• New technique
o Virtual switch, CDNA
FIG 29
IaaS Case Study
IaaS open source project – Eucalyptus
• Elastic Utility Computing Architecture for Linking Your Programs to
Useful Systems IaaS Architecture of Eucalyptus
FIG 30
IaaS Case Study Server Virtualization
FIG 31
IaaS Case Study System Component
• Cloud Controller (CLC)
o Dispatch user request to some clusters.
• Cluster Controller (CC)
o Determine enough resource for virtual machine deployment
• Node Controller (NC)
o Run user’s virtual machines.
IaaS Case Study Storage Virtualization
FIG 32
IaaS Case Study Two kinds of storage systems
• Walrus ( S3 compatible )
o Mainly store the images, which provided by users or
administrator, for VMs booting.
• Storage Controller
o Mainly store user created logical volumes which can be
attached to specified VMs in run-time.
o Each storage controller in a cluster is controlled by the
corresponding cluster controller, and each VM can utilize
these logical volumes through networks.
Network Virtualization
FIG 33
Network architecture :
• Bridge ( Virtual Switch )
o Make virtual machines on one node share physical NICs
• DHCP
o Map virtual MAC addresses of VMs to private IPs in the
LAN.
• NAT
o Forward the packages to public network (WAN).
• IP/MAC mapping table
o IP addresses are assigned by Eucalyptus
o . MAC addresses are assigned by hypervisor
o . This mapping table is maintained by Eucalyptus system.
7.2 NETWORK VIRTUALIZATION ADVANTAGES
• It is cheaper
• It keeps costs predictable.
• It reduces the workload.
• It offers a better uptime.
• It allows for faster deployment of resources.
• It promotes digital entrepreneurship.
• It provides energy savings.
7.3 NETWORK VIRTUALIZATION DISADVANTAGES
• It can have a high cost of implementation. ...
• It still has limitations. ...
• It creates a security risk. ...
• It creates an availability issue. ...
• It creates a scalability issue. ...
• It requires several links in a chain that must work together cohesively.
...
• It takes time.
7.4 CONCLUSION
Mainly Virtualization means, running multiple operating systems on a
single machine but sharing all the hardware resources. And it helps us to
provide the pool of IT resources so that we can share these IT resources
in order get benefits in the business.
7.5 REFERENCE:
➢ https://www.javatpoint.com/virtualization-in-cloud-computing
➢ https://en.wikipedia.org/wiki/Network_virtualization

More Related Content

What's hot

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overviewkoesteruk22
 
Virtualization
VirtualizationVirtualization
Virtualizationimp_satish
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...Edureka!
 

What's hot (20)

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Windows server
Windows serverWindows server
Windows server
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Firewall
FirewallFirewall
Firewall
 
Vpn
VpnVpn
Vpn
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 

Similar to Network virtualization seminar report

Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualizationSDN Hub
 
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Dan Mihai Dumitriu
 
B21DA0201_03.ppt
B21DA0201_03.pptB21DA0201_03.ppt
B21DA0201_03.pptDrPreethiD1
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
 
OpenStack Networking and Automation
OpenStack Networking and AutomationOpenStack Networking and Automation
OpenStack Networking and AutomationAdam Johnson
 
MidoNet gives OpenStack Neutron a Boost
MidoNet gives OpenStack Neutron a BoostMidoNet gives OpenStack Neutron a Boost
MidoNet gives OpenStack Neutron a BoostOpenStack_Online
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydneyMiguel Lavalle
 
OpenVirtex (OVX) Tutorial
OpenVirtex (OVX) TutorialOpenVirtex (OVX) Tutorial
OpenVirtex (OVX) Tutorial동호 손
 
CV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfCV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfoumaimaziat1
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingRanjan K.M.
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationAkhilesh Dhawan
 
Midokura Gluecon 2014 - Level up your OpenStack Neutron Networking
Midokura Gluecon 2014 - Level up your OpenStack Neutron NetworkingMidokura Gluecon 2014 - Level up your OpenStack Neutron Networking
Midokura Gluecon 2014 - Level up your OpenStack Neutron NetworkingAdam Johnson
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolPradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
 

Similar to Network virtualization seminar report (20)

Raga_SDN_NSX_1
Raga_SDN_NSX_1Raga_SDN_NSX_1
Raga_SDN_NSX_1
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
 
10 sdn-vir-6up
10 sdn-vir-6up10 sdn-vir-6up
10 sdn-vir-6up
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
B21DA0201_03.ppt
B21DA0201_03.pptB21DA0201_03.ppt
B21DA0201_03.ppt
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015
 
OpenStack Networking and Automation
OpenStack Networking and AutomationOpenStack Networking and Automation
OpenStack Networking and Automation
 
MidoNet gives OpenStack Neutron a Boost
MidoNet gives OpenStack Neutron a BoostMidoNet gives OpenStack Neutron a Boost
MidoNet gives OpenStack Neutron a Boost
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
 
OpenVirtex (OVX) Tutorial
OpenVirtex (OVX) TutorialOpenVirtex (OVX) Tutorial
OpenVirtex (OVX) Tutorial
 
CV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdfCV-Chapitre8 (2).pdf
CV-Chapitre8 (2).pdf
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Midokura Gluecon 2014 - Level up your OpenStack Neutron Networking
Midokura Gluecon 2014 - Level up your OpenStack Neutron NetworkingMidokura Gluecon 2014 - Level up your OpenStack Neutron Networking
Midokura Gluecon 2014 - Level up your OpenStack Neutron Networking
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 

More from SKS

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 
Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsSKS
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar reportSKS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learningSKS
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issuesSKS
 
Research ethics
Research ethicsResearch ethics
Research ethicsSKS
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standardsSKS
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimentersSKS
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentationSKS
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensusSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsSKS
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the lawSKS
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision SKS
 
Safety and risk
Safety and riskSafety and risk
Safety and riskSKS
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 
Reducing risk
Reducing riskReducing risk
Reducing riskSKS
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case studySKS
 
Assessment of safety and risk
Assessment of safety and riskAssessment of safety and risk
Assessment of safety and riskSKS
 

More from SKS (20)

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethics
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learning
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issues
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standards
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimenters
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentation
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensus
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the law
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Reducing risk
Reducing riskReducing risk
Reducing risk
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case study
 
Assessment of safety and risk
Assessment of safety and riskAssessment of safety and risk
Assessment of safety and risk
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 

Network virtualization seminar report

  • 2. CHAPTER 1 INTRODUCTION 1.1 WHAT IS VIRTUALIZATION? Virtualization is the basic act of decoupling an infrastructure service from the physical assets on which that service operates. The infrastructure service exists entirely in a software abstraction layer: • Lifecycle – started/stopped anytime • Identity – being independent to physical world • Location – could deployed anywhere • Configuration – being simpler to manage 1.2 TYPES OF VIRTUALIZATION FIG 1
  • 5. 1.3 NETWORK VIRTUALIZATION In computing, network virtualization or network virtualisation is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Currently, there are two types of network virtualization: • Internal Virtualization. Internal virtualization is designed to use software containers to replicate the functionality of a single network. • External Virtualization. External virtualization combines multiple local networks into a single “virtual” network to improve the network efficiency FIG 6
  • 7. CHAPTER 2 NETWORK PROTOCOL AND MODEL 2.1 NETWORK PROTOCOL • Rules and procedures governing transmission between computers • Used to identify communicating devices, secure attention of intended recipient, check for errors and re-transmissions • All computers using a protocol have to agree on how to code/decode the message, how to identify errors, and steps to take when there are errors or missed communications Computer System Protocol Packaging Protocol Delivery Protocol 2.2 NETWORK TOPOLOGIES • Topology refers to the physical or logical layout of the computers in a particular network • Commonly used topologies are star, bus and ring.
  • 8. FIG 8 2.3 NETWORK TYPES LANS AND WANS • Local area network Network of computers and other devices within a limited distance Uses star, bus or ring topologies Network interface cards in each device specifies transmission rate, message structure, and topology Network operating system routes and manages communications and coordinates network resources • Wide area network Network of computers spanning broad geographical distances Switched or dedicated lines Firms use commercial WANs for communication
  • 10. CHAPTER 3 NETWORK ARCHITECTURE 3.1 PACKET SWITCHING • Message/Data is divided into fixed or variable length packets • Each packet is numbered and sent along different paths to the destination • Packets are assembled at the destination • Useful for continued message transmission even when part of the network path is broken FIG 10
  • 11. 3.2 CONNECT TWO NETWORKS FIG 11 3.3 CONNECT MULTIPLE NETWORKS
  • 13. FIG 14 3.4 THE SIMPLE VIEW OF INTERNET
  • 15. 3.5 NETWORK DESIGN RULES Hierarchical approach • Traffic is aggregated hierarchically from an access layer into a layer of distribution switches and finally onto the network core • . A hierarchical approach to network design has proven to deliver the best results in terms of optimizing scalability, improving manageability, and maximizing network availability. FIG 16
  • 16. CHAPTER 4 EXTERNAL NETWORK VIRTUALIZATION 4.1 External network virtualization in different layers : • Layer 1 Seldom virtualization implement in this physical data transmission layer. • Layer 2 Use some tags in MAC address packet to provide virtualization. Example, VLAN. • Layer 3 Use some tunnel techniques to form a virtual network. Example, VPN. • Layer 4 or higher Build up some overlay network for some application. Example, P2P. 4.2 Two virtualization components : • Device virtualization • Virtualize physical devices in the network • Data path virtualization • Virtualize communication path between network access points Router Switch Data Path Device virtualization ▪ Layer 2 solution • Divide physical switch into multiple logical switches.
  • 17. ▪ Layer 3 solution 3 • VRF technique ( Virtual Routing and Forwarding ) • Emulate isolated routing tables within one physical router. Data path virtualization ▪ Hop-to-hop case • Consider the virtualization applied on a single hop data- path. ▪ Hop-to-cloud case • Consider the virtualization tunnels allow multi-hop data- path. 24 4.3 Protocol approach • Protocols usually used to approach data-path virtualization • Three implementations o 802.1Q – implement hop to hop data-path virtualization MPLS ( Multiprotocol Label Switch ) – implement router and switch layer virtualization o GRE (Generic Routing Encapsulation ) – implement virtualization among wide variety of networks with tunneling technique. 25 802.1Q • Standard by IEEE 802.1 • Not encapsulate the original frame • Add a 32-bit field between MAC address and EtherTypes field o ETYPE(2B): Protocol identifier
  • 18. o Dot1Q Tag(2B): VLAN number, Priority code MPLS ( Multiprotocol Label Switch ) • Also classified as layer 2.5 virtualization • Add one or more labels into package • Need Label Switch Router(LSR) to read MPLS header 28 FIG 17 GRE ( Generic Routing Encapsulation ) • GRE is a tunnel protocol developed by CISCO • Encapsulate a wide variety of network layer protocol • Stateless property
  • 19. o This means end-point doesn't keep information about the state
  • 20. CHAPTER 5 INTERNAL NETWORK VIRTUALIZATION • A single system is configured with containers, such as the Xen domain, combined with hypervisor control programs or pseudo- interfaces such as the VNIC, to create a “network in a box”. • This solution improves overall efficiency of a single system by isolating applications to separate containers and/or pseudo interfaces. • Virtual machine and virtual switch : o The VMs are connected logically to each other so that they can send data to and receive data from each other. o Each virtual network is serviced by a single virtual switch. o A virtual network can be connected to a physical network by associating one or more network adapters (uplink adapters) with the virtual switch. 5.1 Internal network virtualization in different layers : • Layer 1 Hypervisor usually do not need to emulate the physical layer. • Layer 2 Implement virtual L2 network devices, such as switch, in hypervisor. Example, Linux TAP driver + Linux bridge. • Layer 3 Implement virtual L3 network devices, such as router, in hypervisor. Example, Linux TUN driver + Linux bridge + iptables • Layer 4 or higher Layer 4 or higher layers virtualization is usually implemented in guest OS. Applications should make their own choice.
  • 21. 5.2 Properties of virtual switch • A virtual switch works much like a physical Ethernet switch. • It detects which VMs are logically connected to each of its virtual ports and uses that information to forward traffic to the correct virtual machines. 5.3 Typical virtual network configuration • Communication network o Connect VMs on different hosts • Storage network o Connect VMs to remote storage system • Management network o Individual links for system administration FIG 18
  • 22. 5.4 Network virtualization example form VMware FIG 19
  • 23. CHAPTER 6 TRADITIONAL APPROACH AND NEW TECHNIQUES 6.1 TRADITIONAL APPROACH In KVM system ▪ KVM focus on CPU and memory virtualization, so IO virtualization framework is completed by QEMU project. ▪ In QEMU, network interface of virtual machines connect to host by TUN/TAP driver and Linux bridge. ▪ Work with TUN/TAP and Linux Bridge : o Virtual machines connect to host by a virtual network adapter, which is implemented by TUN/TAP driver o Virtual adapters will connect to Linux bridges, which play the role of virtual switch. TUN/TAP driver ▪ TUN and TAP are virtual network kernel drivers o TAP (as in network tap) simulates an Ethernet device and it operates with layer 2 packets such as Ethernet frames. TUN (as in network TUNnel) simulates a network layer device and it operates with layer 3 packets such as IP • Data flow of TUN/TAP driver o Packets sent by an operating system via a TUN/TAP device are delivered to a user-space program that attaches itself to the device.
  • 24. o A user-space program may pass packets into a TUN/TAP device. TUN/TAP device delivers (or "injects") these packets to the operating system network stack thus emulating their reception from an external source. FIG 20 Linux bridge • Bridging is a forwarding technique used in packet-switched computer networks • Unlike routing, bridging makes no assumptions about where in a network a particular address is located. • Bridging depends on flooding and examination of source addresses in received packet headers to locate unknown devices • Bridging connects multiple network segments at the data link layer (Layer 2) of the OSI model.
  • 25. FIG 21 TAP/TUN driver + Linux Bridge FIG 22
  • 26. 6.2 NEW TECHNIQUES In Xen system • Since implemented with para-virtualization type, guest OS load modified network interface drivers • Modified network interface drivers communicate with virtual switches in Dom0, which act as TAP in traditional approach. • Virtual switch in Xen can be implemented by Linux bridge or work with other optimization. FIG 23 Detail in Xen System
  • 27. FIG 24 Some performance issues : • Page remapping o Hypervisor remap memory page for MMIO. • Context switching o Whenever packets send, induce one context switch from guest to Domain 0 to drive real NIC • Software bridge management o Linux bridge is a pure software implementation • Interrupt handling o When interrupt occur, induce one context switch again. FIG 25 Improve Xen performance by software
  • 28. ▪ Large effective MTU ▪ Fewer packets ▪ Lower per-byte cost FIG 26 Improve Xen performance by hardware • CDNA (Concurrent Direct Network Access) hardware adapter • Remove driver domain from data and interrupts • Hypervisor only responsible for virtual interrupts and assigning context to guest OS
  • 29. FIG 27 6.3 Case Study • VMware offer a hybrid solution of network virtualization in Cloud • .Use redundant links to provide high availability. • Virtual switch in host OS will automatically detect link failure and redirect packets to back-up links. FIG 28
  • 30. CHAPTER 7 SUMMARY AND CONCLUSION 7.1 Network Virtualization Summary Virtualization in layers • Usually in Layer 2 and Layer 3 External network virtualization • Layer 2 o 802.1q • Layer 3 o MPLS, GRE Internal network virtualization • Traditional approach o TAP/TUN + Linux bridge • New technique o Virtual switch, CDNA
  • 31. FIG 29 IaaS Case Study IaaS open source project – Eucalyptus • Elastic Utility Computing Architecture for Linking Your Programs to Useful Systems IaaS Architecture of Eucalyptus FIG 30
  • 32. IaaS Case Study Server Virtualization FIG 31 IaaS Case Study System Component • Cloud Controller (CLC) o Dispatch user request to some clusters. • Cluster Controller (CC) o Determine enough resource for virtual machine deployment • Node Controller (NC) o Run user’s virtual machines.
  • 33. IaaS Case Study Storage Virtualization FIG 32 IaaS Case Study Two kinds of storage systems • Walrus ( S3 compatible ) o Mainly store the images, which provided by users or administrator, for VMs booting. • Storage Controller o Mainly store user created logical volumes which can be attached to specified VMs in run-time. o Each storage controller in a cluster is controlled by the corresponding cluster controller, and each VM can utilize these logical volumes through networks.
  • 34. Network Virtualization FIG 33 Network architecture : • Bridge ( Virtual Switch ) o Make virtual machines on one node share physical NICs • DHCP
  • 35. o Map virtual MAC addresses of VMs to private IPs in the LAN. • NAT o Forward the packages to public network (WAN). • IP/MAC mapping table o IP addresses are assigned by Eucalyptus o . MAC addresses are assigned by hypervisor o . This mapping table is maintained by Eucalyptus system. 7.2 NETWORK VIRTUALIZATION ADVANTAGES • It is cheaper • It keeps costs predictable. • It reduces the workload. • It offers a better uptime. • It allows for faster deployment of resources. • It promotes digital entrepreneurship. • It provides energy savings. 7.3 NETWORK VIRTUALIZATION DISADVANTAGES • It can have a high cost of implementation. ... • It still has limitations. ... • It creates a security risk. ... • It creates an availability issue. ... • It creates a scalability issue. ... • It requires several links in a chain that must work together cohesively. ...
  • 36. • It takes time. 7.4 CONCLUSION Mainly Virtualization means, running multiple operating systems on a single machine but sharing all the hardware resources. And it helps us to provide the pool of IT resources so that we can share these IT resources in order get benefits in the business. 7.5 REFERENCE: ➢ https://www.javatpoint.com/virtualization-in-cloud-computing ➢ https://en.wikipedia.org/wiki/Network_virtualization