Unit 3 Ccs372
Unit 3 Ccs372
Virtualization
Fundamentals of Virtualization
• To Learn the basics and types of Virtualization
• To understand the Hypervisors and its types
• To Explore the Virtualization Solutions
• To Experiment the virtualization platforms
2
Unit I INTRODUCTION TO VIRTUALIZATION
7
4
UNIT III NETWORK VIRTUALIZATION 6
5
Unit IV STORAGE VIRTUALIZATION
6
Unit V VIRTUALIZATION TOOLS
7
PRACTICAL EXERCISES:
1. Create type 2 virtualization in VMWARE or any equivalent Open
Source Tool. Allocate memory and storage space as per
requirement. Install Guest OS on that VMWARE.
2.
1. Shrink and extend virtual disk
2. Create, Manage, Configure and schedule snapshots
3. Create Spanned, Mirrored and Striped volume
4. Create RAID 5 volume
3.
1. Desktop Virtualization using VNC
2. Desktop Virtualization using Chrome Remote Desktop
4. Create type 2 virtualization on ESXI 6.5 server
5. Create a VLAN in CISCO packet tracer
6. Install KVM in Linux
7. Create Nested Virtual Machine(VM under another VM) 8
COURSE OUTCOMES:
9
TEXT BOOKS
1. Cloud computing a practical approach – Anthony T.Velte , Toby J. Velte Robert Elsenpeter, TATA McGraw- Hill , New
Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg, Andrzej Goscinski, John
Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Advanced Server Virtualization: VMware and Microsoft Platform in the Virtual
Data Center, Auerbach
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress, 2005.
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan
Kaufmann, 2005.
6. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft Platform in the Virtual
Data Center”, Auerbach Publications, 2006.
10
UNIT III NETWORK VIRTUALIZATION 6
11
What is Network Virtualization
• Abstracts traditional networking functions from hardware, enabling
multiple virtual networks on a shared infrastructure.
• Facilitates efficient resource use, network flexibility, and simplified
management.
• Tailors virtualized environments to organizations' requirements without
physical restrictions.
• Offers rapid deployment, scalability, and cost-effectiveness.
• Enables optimization of connectivity, streamlined operations, and
adaptability in data centers, cloud computing, or software-defined
networking.
Why Network Virtualization
• Compatibility and Integration: It is the glue that holds together diverse networking
technologies, platforms, and protocols, forging interoperability and compatibility in
heterogeneous network environments.
Types of Network Virtualization
External Network Virtualization:
Combines multiple physical networks or parts of networks into virtual units.
Service providers can use this to create independent virtual local area networks (VLANs) from
VXLAN (Virtual Extensible LAN) is a technology that allows for the creation of virtual
• Virtual LANs (VLANs): VLANs (Virtual Local Area Networks) represent a way to
provide virtualization of a network, which separates a physical network to different
logical ones. This segmentation process facilitates blocking and translation and
boosts network performance through division of the devices into different
broadcast domains.
• Virtual Routing and Forwarding (VRF): VRF creates an environment wherein
multiple instances of a routing table can be created within a single router,
which allows the router to host multiple virtual routers as required. This is,
for example, used for network isolation in service provider environments.
• Virtual Private Networks (VPNs): VPNs are a way to secure users or networks
connecting through the internet. Encryption and tunneling protocols give an
ability to make virtual the network, thus creating networks of private and
secure communication channels.
• Multiprotocol Label Switching (MPLS): MPLS is a protocol applied in
telecommunications networks to make the data directed from one
network node to the next on the basis the labels which are not IP
addresses. This promotes the productivity of data transmission and
provides the possibility of logical switching paths within the network.
How does network virtualization
work
• Decouples network services from hardware.
• Enables virtual provisioning of entire networks.
• Allows programmatic creation, provision, and management in software.
• Leverages underlying physical network as packet-forwarding backplane.
• Pools physical network resources in software.
• Requires only IP packet forwarding from physical network.
• Distributed to virtual layer in data center.
• Attached to individual workloads like VMs or containers.
• Network and security policies defined for each connected application.
• Moves with workload to another host.
• Dynamically applies necessary policies to new workloads for policy consistency and network agility.
Challenges of Network
Virtualization
• Security Concerns: Virtualization of networks creates new security concerns. Isolation between virtual
networks needs to be solid to avert unauthorized access, and vulnerabilities in the virtualization layer
could bring down the whole network.
• Performance Overheads: The abstraction and encapsulation processes in network virtualization may
lead to performance degradation due to the introduction of overheads. This, however, may affect the
overall performance of the network in terms of speed and latency, especially for the applications that are
resource intensive.
• Complexity in Management: Managing virtualized networks can be more complex than traditional
networks, especially in scale-up deployments. The need for centralized control and orchestration, though
it has benefits, can lead to management challenges.
• Integration with Legacy Systems: Integrating virtualized networks with the existing legacy
systems is a difficult thing. The coordination of compatibility and seamless communication
between virtualized and non-virtualized components is a process that calls for care and
consideration in implementation.
• Skill Gap: Implementation and management of virtualized networks are very different from
the traditional networking skillset. The lack of trained personnel may be the cause of the skills
gap and, therefore, the obstacle to the successful introduction of network virtualization.
Benefits of Network
Virtualization
• Resource Optimization: Virtualization facilitates resource utilization with network resources
virtualization from physical hardware. This will result in better utilization of the installed capacity
and higher network efficiency.
• Flexibility and Agility: Virtualized networks are very flexible in nature, thus they can easily adjust
to changing demands. Network configurations and resources can be redistributed to meet the
new requirements at any time, which makes the system more adaptive.
• Cost Efficiency: Through the separation of network functions from hardware, organizations can
have capital expenditures saved. Virtualization suits the purpose of reducing the demand for
considerable physical infrastructure which leads to lower hardware costs and more cost
efficiency.
• Isolation and Security: Network virtualization strengthens security because it gives
virtual networks the isolation they need. It thus avoids unauthorized access and
interference, thus reducing the effect of attacks on one part of the network on others.
• Scalability: The virtualized network makes it possible to scale easily. Organizations can
scale up and down according to the demand without a significant change in the capital
infrastructure, thus, promoting cost effective growth.
• Cisco ACI (Application Centric Infrastructure): Cisco ACI uses the principles of network
virtualization and a policy-driven networking approach. It provides an automatic setting up and
managing of network resources that eventually leads to better performance and less manual
setups.
• OpenStack Neutron: Neutron is an open-source networking project which
abstracts the network as a service. It provides users with a capability to create
and manage virtualized networks in a virtual environment with support for both
conventional and software-defined networking.
• VLAN 1: It is the default VLAN of switches. By default, all switch ports are in
VLAN. This VLAN can’t be deleted or edit but can be used.
• VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete these
VLAN.
• VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These VLAN
can’t be deleted.
• Cost savings: VLANs can help reduce hardware costs by allowing multiple
virtual networks to share a single physical network infrastructure.
• VLAN membership: VLAN membership determines which devices are assigned to which
VLANs. Devices can be assigned to VLANs based on port, MAC address, or other criteria.
• VLAN trunking: VLAN trunking allows multiple VLANs to be carried over a single physical
link. This is typically done using a protocol such as IEEE 802.1Q.
• VLAN management: VLAN management involves configuring and managing VLANs, including
assigning devices to VLANs, configuring VLAN tags, and configuring VLAN trunking.
Types of connections in VLAN
• Trunk Link –All connected devices to a trunk link must be VLAN-aware. All
frames on this should have a special header attached to it called tagged frames.
• Hybrid link –It is a combination of the Trunk link and Access link. Here both
VLAN-unaware and VLAN-aware devices are attached and it can have both
tagged and untagged frames.
Advantages
• Performance – The network traffic is full of broadcast and multicast. VLAN
reduces the need to send such traffic to unnecessary destinations. e.g.-If
the traffic is intended for 2 users but as 10 devices are present in the same
broadcast domain, therefore, all will receive the traffic i.e. wastage of
bandwidth but if we make VLANs, then the broadcast or multicast packet
will go to the intended users only.
• Flexibility –VLAN provide flexibility to add, remove the number of host we want.
• Cost reduction –VLANs can be used to create broadcast domains which eliminate the
need for expensive routers.
By using Vlan, the number of small size broadcast domain can be increased which are
easy to handle as compared to a bigger broadcast domain.
Disadvantages of VLAN
• Complexity: VLANs can be complex to configure and manage, particularly in large or
dynamic cloud computing environments.
• Limited scalability: VLANs are limited by the number of available VLAN IDs, which can
be a constraint in larger cloud computing environments.
• Limited security: VLANs do not provide complete security and can be compromised by
malicious actors who are able to gain access to the network.
• Limited interoperability: VLANs may not be fully compatible with all types of network
devices and protocols, which can limit their usefulness in cloud computing
environments.
• Limited mobility: VLANs may not support the movement of devices or users between
different network segments, which can limit their usefulness in mobile or remote cloud
computing environments.
• Cost: Implementing and maintaining VLANs can be costly, especially if specialized
hardware or software is required.
• Limited visibility: VLANs can make it more difficult to monitor and troubleshoot
network issues, as traffic is isolated in different segments.
Real-Time Applications of VLAN
• Voice over IP (VoIP) : VLANs can be used to isolate voice traffic from data traffic, which improves the quality of VoIP calls and
• Video Conferencing : VLANs can be used to prioritize video traffic and ensure that it receives the bandwidth and resources it
• Remote Access : VLANs can be used to provide secure remote access to cloud-based applications and resources, by isolating
• Cloud Backup and Recovery : VLANs can be used to isolate backup and recovery traffic, which reduces the risk of network
• Gaming : VLANs can be used to prioritize gaming traffic, which ensures that gamers receive the bandwidth and resources
• IoT : VLANs can be used to isolate Internet of Things (IoT) devices from the rest of the network, which improves security and
data within the defined WAN group. The distance can be as small as a few
any network group that isn’t within local proximity of each other forms a
WAN. For example, the public internet we use daily is a type of WAN, as
• WAN can be classified into two broad categories based on how they
1. Switched WAN
2. Point-to-point WAN
Switched WAN
• Packet Switching: The size of a packet in a packet switched network is dictated by the
outgoing link, and these packets may follow different route. These packets are ready to
collected and reassembled at the destination.
• TCP/IP protocol suite: TCP/IP is a protocol suite of foundational of the internet protocols
used to interconnect devices on Internet and other computers networks or device
network. Full form of TCP/IP is Transmission Control Protocol/Internet Protocol.
• Router: A router is a networking device which transfers data packets between
device networks and also we can say it is used to interconnect LANs to form a wide
area network (WAN).
• Packet over SONET/SDH (PoS): Packet over SONET and SDH is a communication
protocol used for WAN transport. When using optical fiber and SONET or SDH
communication protocol used to defines how point-to-point links communicate.
• Higher Capacity: The capacity of WAN in terms of number of LANs or WANs connected in a
network is very high, which results in connection of large number of user over different
location all around the globe.
• Use of Public Carrier: WAN uses telephone network, cabled system, satellites etc for
connection and transmission purpose which are easily available.
• Resource Sharing: WAN enables its users to share data and information over large area.
Computer resources can be accessed remotely which makes transmission and exchange of
data very easy.
Advantages of WAN
• It covers large geographical area which enhances the reach of organisation to
transmit data quickly and cheaply.
• The travel charges that are needed to cover the geographical area of work
can be minimised.
• WAN enables a user or organisation to connect with the world very easily and
allows to exchange data and do business at global level.
Disadvantages of WAN
• Traffic congestion in Wide Area Network is very high.
• Noise and error are present in large amount due to multiple connection point.
• The data transfer rate is slow in comparison to LAN because of large distances
and high number of connected system within the network.
WAN virtualization
• SD-WAN solutions use software to manage and optimize network traffic, routing,
and security, rather than relying solely on hardware-based solutions.
Benefits:
• Flexibility and Scalability: SD-WAN allows for easy scaling and reconfiguration of the WAN network,
adapting to changing business needs.
• Cost Reduction: By leveraging lower-cost internet connections and optimizing traffic routing, SD-WAN
can reduce overall WAN costs.
• Improved Performance: SD-WAN can dynamically choose the best path for network traffic, ensuring
optimal performance and minimizing latency.
• Enhanced Security: SD-WAN solutions often include built-in security features, such as encryption and
firewalls, to protect sensitive data.
• Centralized Management: SD-WAN allows for centralized management of the entire WAN network,
simplifying administration and troubleshooting.
Use Cases:
• Connecting Branch Offices: SD-WAN can be used to connect multiple branch
offices to a central data center or cloud environment.
• SD-WAN Platforms: Companies like Cisco, Juniper, and Palo Alto Networks
offer SD-WAN solutions.