Network virtualization

Network virtualization

In computing, Network Virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.

Network virtualization is categorized as either external, combining many networks, or parts of networks, into a virtual unit, or internal, providing network-like functionality to the software containers on a single system. Whether virtualization is internal or external depends on the implementation provided by vendors that support the technology.

Contents

Components of a virtual network

Various equipment and software vendors offer network virtualization by combining any of the following:

  • Network hardware, such as switches and network adapters, also known as network interface cards (NICs)
  • Network elements such as Firewalls, Load Balancers
  • Networks, such as virtual LANs (VLANs) and containers such as virtual machines (VMs) and Solaris Containers
  • Network storage devices
  • Network M2M elements such as Telecommunications 4G HLR and SLR devices
  • Network Mobile elements such as Laptops, Tablets and Cell Phones
  • Network media, such as Ethernet and Fibre Channel

Following is a survey of common network virtualization scenarios and examples of vendor implementation of these scenarios.

External network virtualization

Some vendors offer external network virtualization, in which one or more local networks are combined or subdivided into virtual networks, with the goal of improving the efficiency of a large corporate network or data center. The key components of an external virtual network are the VLAN and the network switch. Using VLAN and switch technology, the system administrator can configure systems physically attached to the same local network into different virtual networks. Conversely, VLAN technology enables the system administrator to combine systems on separate local networks into a VLAN spanning the segments of a large corporate network.

Internal network virtualization

Other vendors offer internal network virtualization. Here a single system is configured with containers, such as the Xen domain, combined with hypervisor control programs or pseudo-interfaces such as the VNIC, to create a “network in a box.” This solution improves overall efficiency of a single system by isolating applications to separate containers and/or pseudo interfaces. More information on management of network virtualization could be found at [1].

Examples of internal network virtualization

Citrix and Vyatta have built a Virtual Network Stack combining Vyatta's routing, firewall and IPsec VPN functionality with Citrix Netscaler load balancer, Branch Repeater WAN optimization and Access Gateway SSL VPN. The vNetworkStack project is defining entire virtualized network architectures for branch offices, datacenters and cloud computing environments.

OpenSolaris network virtualization features (see OpenSolaris Network Virtualization and Resource Control) enable the "network in the box" scenario. The features of the OpenSolaris Crossbow Project provide the ability for containers such as zones or virtual machines on a single system to share resources and exchange data. Major Crossbow features include VNIC pseudo-interfaces and virtual switches, which emulate network connectivity by enabling containers to exchange data without having to pass that data onto the external network.

Microsoft Virtual Server uses virtual machines such as those provided by Xen to create a network in the box scenario for x86 systems. These containers can run different operating systems, such as Windows or Linux, and be associated with or independent of a system's NIC.

Combined internal and external network virtualization

Some vendors offer both internal and external network virtualization software in their product line. For example, Machine-To-Machine Intelligence (M2MI) technology covers both Internal, External and Multi-vendor software and hardware based technologies. M2MI is unique in its approach of applying "whitelist" blocking across all multi-vendor network elements, this approach ensures that Virtual Machines can not be "ARP spoofed", a technique used to compromise Virtual Machines at the network level. VMware provides products that offer both internal and external network virtualization only. VMware's basic approach is network in the box on a single system, using virtual machines that are managed by hypervisor software. VMware then provides its VMware Infrastructure software to connect and combine networks in multiple boxes into an external virtualization scenario.

Network virtualization initiatives

See also

References

  1. ^ A. Galis, S. Clayman, A. Fischer, A. Paler, Y. Al-Hazmi, H. De Meer, A. Cheniour, O. Mornard, J. Patrick Gelas and L. Lefevre, et al. “Future Internet Management Platforms for Network Virtualisation and Service Clouds”- ServiceWave 2010, December 2010, http://servicewave.eu/2010/joint-demonstration-evening/ and in “Towards A Service-Based Internet” Lecture Notes in Computer Science, 2010, Volume 6481/2010, 235-237, DOI: 10.1007/978-3-642-17694-4_39

Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • OpenSolaris Network Virtualization and Resource Control — is a set of OpenSolaris features, currently under development by Sun Microsystems as an open source project. OpenSolaris provides an internal network virtualization and quality of service scenario, implemented through the features of the… …   Wikipedia

  • OpenSolaris Network Virtualization and Resource Control — OpenSolaris Network Virtualization and Resource Control  набор технологий для OpenSolaris, предназначенных для виртуализации сети. Данные технологии находятся в стадии разработки компанией Sun Microsystems и сообществом OpenSolaris (проект… …   Википедия

  • Virtualization — In computing, virtualization is a broad term that refers to the abstraction of computer resources:* Platform virtualization, which separates an operating system from the underlying platform resources ** Full virtualization ** Hardware assisted… …   Wikipedia

  • Virtualization Embedded Controller Interface — Virtualization Embedded Controller Interface, abbreviated as VECI, is a technology used for Intel Virtualization Technology (Intel VT) in chipsets that support Core 2 Duo microprocessors. Details The VECI bus allows the Virtualization Engine (VE) …   Wikipedia

  • Network File Management — (NFM) is a data storage management related category that was identified and defined in 2004 by several prominent data storage analysts. The term is used interchangeably with NAS Virtualization and File Virtualization among data storage industry… …   Wikipedia

  • Network Professional Association — Type Professional Organization Area served Worldwide Website Network Professional Association Established 1991, the non profit Network Professional Associatio …   Wikipedia

  • Network file management — This article is about an information technology system. For the autosomal dominant genetic disorder NFM, see Neurofibromatosis. Network file management (NFM) is a data storage management related category that was identified and defined in 2004 by …   Wikipedia

  • Virtualization engine — In computing, a virtualization engine is the concept of giving a holistic view of all the resources in the entire network infrastructure. The holistic view is independent of the physical data storage devices and their geographic location.A good… …   Wikipedia

  • X86 virtualization — is the method by which x86 based guest operating systems are run under another host x86 operating system, with little or no modification of the guest OS. The x86 processor architecture did not originally meet the Popek and Goldberg virtualization …   Wikipedia

  • Operating system-level virtualization — is a server virtualization method where the kernel of an operating system allows for multiple isolated user space instances, instead of just one. Such instances (often called containers, VEs, VPSs or jails) may look and feel like a real server,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”