0% found this document useful (0 votes)
13 views55 pages

Unit 3 Ccs372

The document covers the fundamentals of virtualization, including types, hypervisors, and various virtualization solutions across servers, desktops, networks, and storage. It outlines practical exercises for hands-on experience and discusses the benefits, challenges, and tools related to network virtualization. Additionally, it provides insights into VLANs and their configuration for improved network management and performance.

Uploaded by

MANI KANDAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views55 pages

Unit 3 Ccs372

The document covers the fundamentals of virtualization, including types, hypervisors, and various virtualization solutions across servers, desktops, networks, and storage. It outlines practical exercises for hands-on experience and discusses the benefits, challenges, and tools related to network virtualization. Additionally, it provides insights into VLANs and their configuration for improved network management and performance.

Uploaded by

MANI KANDAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 55

CCS372:

Virtualization
Fundamentals of Virtualization
• To Learn the basics and types of Virtualization
• To understand the Hypervisors and its types
• To Explore the Virtualization Solutions
• To Experiment the virtualization platforms

2
Unit I INTRODUCTION TO VIRTUALIZATION
7

Virtualization and cloud computing – Need of


virtualization – cost, administration, fast deployment,
reduce infrastructure cost – limitations- Types of
hardware virtualization: Full virtualization – partial
virtualization – Paravirtualization-Types of
Hypervisors
3
UNIT II SERVER AND DESKTOP VIRTUALIZATION

Virtual machine basics- Types of virtual machines-


Understanding Server Virtualization- types of server
virtualization- Business Cases for Server Virtualization – Uses
of Virtual Server Consolidation – Selecting Server
Virtualization Platform-Desktop Virtualization-Types of
Desktop Virtualization

4
UNIT III NETWORK VIRTUALIZATION 6

Introduction to Network Virtualization-Advantages-


Functions-Tools for Network Virtualization-VLAN-
WAN Architecture-WAN Virtualization

5
Unit IV STORAGE VIRTUALIZATION

Memory Virtualization-Types of Storage


Virtualization-Block, File-Address space
Remapping-Risks of Storage Virtualization-SAN-
NAS-RAID

6
Unit V VIRTUALIZATION TOOLS

VMWare-Amazon AWS-Microsoft HyperV- Oracle VM Virtual Box –


IBM PowerVM- Google Virtualization- Case study.

7
PRACTICAL EXERCISES:
1. Create type 2 virtualization in VMWARE or any equivalent Open
Source Tool. Allocate memory and storage space as per
requirement. Install Guest OS on that VMWARE.
2.
1. Shrink and extend virtual disk
2. Create, Manage, Configure and schedule snapshots
3. Create Spanned, Mirrored and Striped volume
4. Create RAID 5 volume
3.
1. Desktop Virtualization using VNC
2. Desktop Virtualization using Chrome Remote Desktop
4. Create type 2 virtualization on ESXI 6.5 server
5. Create a VLAN in CISCO packet tracer
6. Install KVM in Linux
7. Create Nested Virtual Machine(VM under another VM) 8
COURSE OUTCOMES:

1. Analyse the virtualization concepts and Hypervisor


2. Apply the Virtualization for real-world applications
3. Install & Configure the different VM platforms
4. Experiment with the VM with various software

9
TEXT BOOKS
1. Cloud computing a practical approach – Anthony T.Velte , Toby J. Velte Robert Elsenpeter, TATA McGraw- Hill , New
Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg, Andrzej Goscinski, John
Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Advanced Server Virtualization: VMware and Microsoft Platform in the Virtual
Data Center, Auerbach
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress, 2005.
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan
Kaufmann, 2005.
6. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft Platform in the Virtual
Data Center”, Auerbach Publications, 2006.

10
UNIT III NETWORK VIRTUALIZATION 6

Introduction to Network Virtualization-Advantages-


Functions-Tools for Network Virtualization-VLAN-
WAN Architecture-WAN Virtualization.

11
What is Network Virtualization
• Abstracts traditional networking functions from hardware, enabling
multiple virtual networks on a shared infrastructure.
• Facilitates efficient resource use, network flexibility, and simplified
management.
• Tailors virtualized environments to organizations' requirements without
physical restrictions.
• Offers rapid deployment, scalability, and cost-effectiveness.
• Enables optimization of connectivity, streamlined operations, and
adaptability in data centers, cloud computing, or software-defined
networking.
Why Network Virtualization

• Resource Optimization: Virtualization is a technology that separates network


functions from physical hardware, thus allowing virtual networks to be created and
run on a common infrastructure. This way, the resources are used more efficiently.

• Flexibility and Agility: Virtual networks provide unprecedented flexibility which


organizations can use to quickly respond to changing requirements by dynamically
allocating and adjusting resources according to the current needs.

• Cost Efficiency: Through the separation of networking functions from hardware,


organizations can achieve higher resource utilization, which results in cost savings
by reducing hardware expenditure and better operating efficiency.
• Isolation and Security: Virtualization of the network creates the isolation of virtual networks,
which makes security better by preventing communication between different environments
or user groups.

• Scalability: Virtualized networks can be dynamically scaled up or down based on demand,


leading to smooth growth without ongoing hardware investments or disruptions.

• Centralized Management: Network virtualization makes network management and control


centralized which simplifies network administration, monitoring, and troubleshooting
irrespective of the environment.

• Compatibility and Integration: It is the glue that holds together diverse networking
technologies, platforms, and protocols, forging interoperability and compatibility in
heterogeneous network environments.
Types of Network Virtualization
External Network Virtualization:
Combines multiple physical networks or parts of networks into virtual units.

Uses switches, adapters, or networks to achieve this.

Service providers can use this to create independent virtual local area networks (VLANs) from

computers on the same physical LAN, boosting network productivity.


Examples include using VLANs on a Cisco switch to create virtual networks.

VXLAN (Virtual Extensible LAN) is a technology that allows for the creation of virtual

networks over an existing physical network infrastructure.


• Internal Network Virtualization:
• Provides network-like functionality within a single system or server.
• Enables VMs to exchange data on a host without using an external
network.
• Uses software containers to isolate programs or run multiple operating
systems on the same server.
• Virtual NICs (virtual network interface cards) are used for configuring
network interfaces on VMs.
Network Virtualization Technologies
• Software-Defined Networking (SDN): SDN is the form of network virtualization
which is a separation of the control and data plane (control plane makes decisions
as to where to send traffic, and data plane sends the traffic). This division creates a
viable opportunity for more centralized and programmable network administration.

• Virtual LANs (VLANs): VLANs (Virtual Local Area Networks) represent a way to
provide virtualization of a network, which separates a physical network to different
logical ones. This segmentation process facilitates blocking and translation and
boosts network performance through division of the devices into different
broadcast domains.
• Virtual Routing and Forwarding (VRF): VRF creates an environment wherein
multiple instances of a routing table can be created within a single router,
which allows the router to host multiple virtual routers as required. This is,
for example, used for network isolation in service provider environments.

• Network Function Virtualization (NFV): NFV is about virtualizing network


services that we have always used in hardware dedicated to them, such as
firewalls, load balancers, and intrusion detection units. NFV, instead of
relying on hardware to operate the functions, utilizes software executed on
virtualized infrastructure to achieve flexibility and hardware independence.
• Overlay Networks:The virtual networks which are overlayed on the physical
infrastructure, are the logical networks that are created, which provide the
functionality to develop independent virtual networks that are not inter-
dependent with hardware. The technologies such as VXLAN Virtual Extensible
LAN or GRE Generic Routing Encapsulation are widely used as a overlay
virtualization.

• Virtual Private Networks (VPNs): VPNs are a way to secure users or networks
connecting through the internet. Encryption and tunneling protocols give an
ability to make virtual the network, thus creating networks of private and
secure communication channels.
• Multiprotocol Label Switching (MPLS): MPLS is a protocol applied in
telecommunications networks to make the data directed from one
network node to the next on the basis the labels which are not IP
addresses. This promotes the productivity of data transmission and
provides the possibility of logical switching paths within the network.
How does network virtualization
work
• Decouples network services from hardware.
• Enables virtual provisioning of entire networks.
• Allows programmatic creation, provision, and management in software.
• Leverages underlying physical network as packet-forwarding backplane.
• Pools physical network resources in software.
• Requires only IP packet forwarding from physical network.
• Distributed to virtual layer in data center.
• Attached to individual workloads like VMs or containers.
• Network and security policies defined for each connected application.
• Moves with workload to another host.
• Dynamically applies necessary policies to new workloads for policy consistency and network agility.
Challenges of Network
Virtualization
• Security Concerns: Virtualization of networks creates new security concerns. Isolation between virtual
networks needs to be solid to avert unauthorized access, and vulnerabilities in the virtualization layer
could bring down the whole network.

• Performance Overheads: The abstraction and encapsulation processes in network virtualization may
lead to performance degradation due to the introduction of overheads. This, however, may affect the
overall performance of the network in terms of speed and latency, especially for the applications that are
resource intensive.

• Complexity in Management: Managing virtualized networks can be more complex than traditional
networks, especially in scale-up deployments. The need for centralized control and orchestration, though
it has benefits, can lead to management challenges.
• Integration with Legacy Systems: Integrating virtualized networks with the existing legacy
systems is a difficult thing. The coordination of compatibility and seamless communication
between virtualized and non-virtualized components is a process that calls for care and
consideration in implementation.

• Lack of Standardization: A lack of standardized protocols and interfaces for network


virtualization may cause interoperability issues. There is a possibility for vendors to have their
own proprietary solutions and this makes the creation of vendor-agnostic virtualized
environments challenging.

• Skill Gap: Implementation and management of virtualized networks are very different from
the traditional networking skillset. The lack of trained personnel may be the cause of the skills
gap and, therefore, the obstacle to the successful introduction of network virtualization.
Benefits of Network
Virtualization
• Resource Optimization: Virtualization facilitates resource utilization with network resources
virtualization from physical hardware. This will result in better utilization of the installed capacity
and higher network efficiency.

• Flexibility and Agility: Virtualized networks are very flexible in nature, thus they can easily adjust
to changing demands. Network configurations and resources can be redistributed to meet the
new requirements at any time, which makes the system more adaptive.

• Cost Efficiency: Through the separation of network functions from hardware, organizations can
have capital expenditures saved. Virtualization suits the purpose of reducing the demand for
considerable physical infrastructure which leads to lower hardware costs and more cost
efficiency.
• Isolation and Security: Network virtualization strengthens security because it gives
virtual networks the isolation they need. It thus avoids unauthorized access and
interference, thus reducing the effect of attacks on one part of the network on others.

• Scalability: The virtualized network makes it possible to scale easily. Organizations can
scale up and down according to the demand without a significant change in the capital
infrastructure, thus, promoting cost effective growth.

• Centralized Management: Centralized management consoles or controllers are quite


helpful in the management of virtualized networks. It simplifies configuration,
monitoring, and troubleshooting, thereby minimizing the complexity involved in
conventional network management.
Tools for Network Virtualization
• VMware NSX: VMware NSX is a leading network virtualization platform which allows building
virtual networks, switches and routers. It is hardware independent and due to this fact, it
enables flexibility and security.

• Microsoft Hyper-V Network Virtualization: The Network Virtualization feature of Microsoft's


Hyper-V platform allows for the creation of private virtual networks, making multi-tenancy and
migrations of virtual machines much easier across different physical networks.

• Cisco ACI (Application Centric Infrastructure): Cisco ACI uses the principles of network
virtualization and a policy-driven networking approach. It provides an automatic setting up and
managing of network resources that eventually leads to better performance and less manual
setups.
• OpenStack Neutron: Neutron is an open-source networking project which
abstracts the network as a service. It provides users with a capability to create
and manage virtualized networks in a virtual environment with support for both
conventional and software-defined networking.

• Juniper Contrail Networking: Juniper Contrail Networking is a solution that uses


network virtualization and SDN. It automates service provisioning and
networking on a scalable basis for cloud environments.

• Docker Networking: Docker (a container platform) deploys network virtualization


to create isolated networking environments for the containerized applications.
Docker networking facilitates convenient communication between containers.
Virtual LAN (VLAN)
• Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2
(data link layer). Generally, layer 3 devices divide the broadcast domain but the
broadcast domain can be divided by switches using the concept of VLAN.

• A broadcast domain is a network segment in which if a device broadcast a packet then


all the devices in the same broadcast domain will receive it. The devices in the same
broadcast domain will receive all the broadcast packets but it is limited to switches only
as routers don’t forward out the broadcast packet. To forward out the packets to
different VLAN (from one VLAN to another) or broadcast domains, inter Vlan routing is
needed. Through VLAN, different small-size sub-networks are created which are
comparatively easy to handle.
VLAN ranges:
• VLAN 0, 4095: These are reserved VLAN which cannot be seen or used.

• VLAN 1: It is the default VLAN of switches. By default, all switch ports are in
VLAN. This VLAN can’t be deleted or edit but can be used.

• VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete these
VLAN.

• VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These VLAN
can’t be deleted.

• Vlan 1006-4094: This is the extended range of Vlan.


WeConfiguration
can simply create VLANs by simply assigning the vlan-id and Vlan name.
#switch1(config)#vlan 2
#switch1(config-vlan)#vlan accounts
Here, 2 is the Vlan I’d and accounts is the Vlan name. Now, we assign Vlan to
the switch ports.e.g-
Switch(config)#int fa0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access Vlan 2
Also, switchport range can be assigned to required vlans.
Switch(config)#int range fa0/0-2
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
Assigning IP address 192.168.1.1/24, 192.168.1.2/24 and 192.168.2.1/24 to
the PC’s.
Now, we will create Vlan 2 and 3 on switch.
Switch(config)#vlan 2
Switch(config)#vlan 3
We have made VLANs but the most important part is to assign switch ports
to the VLANs.
Switch(config)#int fa0/0
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
Switch(config)#int fa0/1
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 3
Switch(config)#int fa0/2
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
As seen, we have assigned Vlan 2 to fa0/0, fa0/2, and Vlan 3 to fa0/1.
VLANs offer several features
and benefits
• Improved network security: VLANs can be used to separate network traffic and limit
access to specific network resources. This improves security by preventing unauthorized
access to sensitive data and network resources.

• Better network performance: By segregating network traffic into smaller logical


networks, VLANs can reduce the amount of broadcast traffic and improve network
performance.

• Simplified network management: VLANs allow network administrators to group


devices together logically, rather than physically, which can simplify network
management tasks such as configuration, troubleshooting, and maintenance.
• Flexibility: VLANs can be configured dynamically, allowing network
administrators to quickly and easily adjust network configurations as needed.

• Cost savings: VLANs can help reduce hardware costs by allowing multiple
virtual networks to share a single physical network infrastructure.

• Scalability: VLANs can be used to segment a network into smaller, more


manageable groups as the network grows in size and complexity.
key features of VLANs
• VLAN tagging: VLAN tagging is a way to identify and distinguish VLAN traffic from other
network traffic. This is typically done by adding a VLAN tag to the Ethernet frame header.

• VLAN membership: VLAN membership determines which devices are assigned to which
VLANs. Devices can be assigned to VLANs based on port, MAC address, or other criteria.

• VLAN trunking: VLAN trunking allows multiple VLANs to be carried over a single physical
link. This is typically done using a protocol such as IEEE 802.1Q.

• VLAN management: VLAN management involves configuring and managing VLANs, including
assigning devices to VLANs, configuring VLAN tags, and configuring VLAN trunking.
Types of connections in VLAN
• Trunk Link –All connected devices to a trunk link must be VLAN-aware. All
frames on this should have a special header attached to it called tagged frames.

• Access link –It connects VLAN-unaware devices to a VLAN-aware bridge. All


frames on the access link must be untagged.

• Hybrid link –It is a combination of the Trunk link and Access link. Here both
VLAN-unaware and VLAN-aware devices are attached and it can have both
tagged and untagged frames.
Advantages
• Performance – The network traffic is full of broadcast and multicast. VLAN
reduces the need to send such traffic to unnecessary destinations. e.g.-If
the traffic is intended for 2 users but as 10 devices are present in the same
broadcast domain, therefore, all will receive the traffic i.e. wastage of
bandwidth but if we make VLANs, then the broadcast or multicast packet
will go to the intended users only.

• Formation of virtual groups – As there are different departments in every


organization namely sales, finance etc., VLANs can be very useful in order to
group the devices logically according to their departments.
• Security –In the same network, sensitive data can be broadcast which can be
accessed by the outsider but by creating VLAN, we can control broadcast domains,
set up firewalls, restrict access. Also, VLANs can be used to inform the network
manager of an intrusion. Hence, VLANs greatly enhance network security.

• Flexibility –VLAN provide flexibility to add, remove the number of host we want.

• Cost reduction –VLANs can be used to create broadcast domains which eliminate the
need for expensive routers.

By using Vlan, the number of small size broadcast domain can be increased which are
easy to handle as compared to a bigger broadcast domain.
Disadvantages of VLAN
• Complexity: VLANs can be complex to configure and manage, particularly in large or
dynamic cloud computing environments.
• Limited scalability: VLANs are limited by the number of available VLAN IDs, which can
be a constraint in larger cloud computing environments.
• Limited security: VLANs do not provide complete security and can be compromised by
malicious actors who are able to gain access to the network.
• Limited interoperability: VLANs may not be fully compatible with all types of network
devices and protocols, which can limit their usefulness in cloud computing
environments.
• Limited mobility: VLANs may not support the movement of devices or users between
different network segments, which can limit their usefulness in mobile or remote cloud
computing environments.
• Cost: Implementing and maintaining VLANs can be costly, especially if specialized
hardware or software is required.
• Limited visibility: VLANs can make it more difficult to monitor and troubleshoot
network issues, as traffic is isolated in different segments.
Real-Time Applications of VLAN
• Voice over IP (VoIP) : VLANs can be used to isolate voice traffic from data traffic, which improves the quality of VoIP calls and

reduces the risk of network congestion.

• Video Conferencing : VLANs can be used to prioritize video traffic and ensure that it receives the bandwidth and resources it

needs for high-quality video conferencing.

• Remote Access : VLANs can be used to provide secure remote access to cloud-based applications and resources, by isolating

remote users from the rest of the network.

• Cloud Backup and Recovery : VLANs can be used to isolate backup and recovery traffic, which reduces the risk of network

congestion and improves the performance of backup and recovery operations.

• Gaming : VLANs can be used to prioritize gaming traffic, which ensures that gamers receive the bandwidth and resources

they need for a smooth gaming experience.

• IoT : VLANs can be used to isolate Internet of Things (IoT) devices from the rest of the network, which improves security and

reduces the risk of network congestion.


Wide Area Network (WAN)
Architecture
• A Wide Area Network (WAN) architecture connects geographically
dispersed Local Area Networks (LANs) and other devices, relying on
technologies like routers, firewalls, and modems to facilitate
communication across public or private networks
• A wide area network (WAN) is a group of networked systems distributed

across a large geographic area. The networks remain connected to exchange

data within the defined WAN group. The distance can be as small as a few

feet and range to as far away as cities, territories, or nations. Technically,

any network group that isn’t within local proximity of each other forms a

WAN. For example, the public internet we use daily is a type of WAN, as

devices located around the world communicate with each other.


Types of Wide Area Network
(WAN)

• WAN can be classified into two broad categories based on how they

connect the endpoints: via a central device (switched) or through a

dedicated line (point-to-point).

1. Switched WAN

2. Point-to-point WAN
Switched WAN

• In a switched WAN network, multiple component LANs are connected


via a shared networking infrastructure. A WAN switching exchange at
the center governs how network resources are distributed across
locations in conjunction with the network appliances at each location.
Switched WAN is best suited to distributed environments where
network configuration requirements are largely homogenous.
Software-Defined WAN (SD-
WAN)

• It is a technique for making WAN architectures easier to construct, run,


and administer is software-defined WAN (SD-WAN). It relies on
virtualization, overlay networks, application-level policies and onsite SD-
WAN devices and software platforms.

• SD-WAN improves the efficiency of data transfer across a WAN by


shifting traffic to less expensive network links to replace more expensive
leased or MPLS lines.
Types of WAN Technologies
• Circuit switching: Circuit switched networks operate on the virtual connection principle,
which dictates that all messages will take the same way and that resources along this
path are set aside for this connection.

• Packet Switching: The size of a packet in a packet switched network is dictated by the
outgoing link, and these packets may follow different route. These packets are ready to
collected and reassembled at the destination.

• TCP/IP protocol suite: TCP/IP is a protocol suite of foundational of the internet protocols
used to interconnect devices on Internet and other computers networks or device
network. Full form of TCP/IP is Transmission Control Protocol/Internet Protocol.
• Router: A router is a networking device which transfers data packets between
device networks and also we can say it is used to interconnect LANs to form a wide
area network (WAN).

• Packet over SONET/SDH (PoS): Packet over SONET and SDH is a communication
protocol used for WAN transport. When using optical fiber and SONET or SDH
communication protocol used to defines how point-to-point links communicate.

• Multiprotocol Label Switching (MPLS): Multi Protocol Label Switching (MPLS) is an


IP packet routing technique and also a network routing optimization technique that
routes IP packet through paths via labels instead of looking at complex routing
tables of routers.
Characteristics of WAN
• Broader Reach: The reach of WAN in terms coverage of geographical area is very high which
can be a region, country or the world itself.

• Higher Capacity: The capacity of WAN in terms of number of LANs or WANs connected in a
network is very high, which results in connection of large number of user over different
location all around the globe.

• Use of Public Carrier: WAN uses telephone network, cabled system, satellites etc for
connection and transmission purpose which are easily available.

• Resource Sharing: WAN enables its users to share data and information over large area.
Computer resources can be accessed remotely which makes transmission and exchange of
data very easy.
Advantages of WAN
• It covers large geographical area which enhances the reach of organisation to
transmit data quickly and cheaply.

• The data can be stored in centralised manner because of remote access to


data provided by WAN.

• The travel charges that are needed to cover the geographical area of work
can be minimised.

• WAN enables a user or organisation to connect with the world very easily and
allows to exchange data and do business at global level.
Disadvantages of WAN
• Traffic congestion in Wide Area Network is very high.

• The fault tolerance ability of WAN is very less.

• Noise and error are present in large amount due to multiple connection point.

• The data transfer rate is slow in comparison to LAN because of large distances
and high number of connected system within the network.
WAN virtualization

• WAN virtualization, often implemented through SD-WAN, abstracts the underlying


physical network infrastructure into a software-defined overlay, allowing for
flexible and efficient management of wide area network connections.

• WAN virtualization, also known as Software-Defined Wide Area Network (SD-


WAN), abstracts the physical WAN infrastructure into a software-controlled
overlay network.

• SD-WAN solutions use software to manage and optimize network traffic, routing,
and security, rather than relying solely on hardware-based solutions.
Benefits:
• Flexibility and Scalability: SD-WAN allows for easy scaling and reconfiguration of the WAN network,
adapting to changing business needs.

• Cost Reduction: By leveraging lower-cost internet connections and optimizing traffic routing, SD-WAN
can reduce overall WAN costs.

• Improved Performance: SD-WAN can dynamically choose the best path for network traffic, ensuring
optimal performance and minimizing latency.

• Enhanced Security: SD-WAN solutions often include built-in security features, such as encryption and
firewalls, to protect sensitive data.

• Centralized Management: SD-WAN allows for centralized management of the entire WAN network,
simplifying administration and troubleshooting.
Use Cases:
• Connecting Branch Offices: SD-WAN can be used to connect multiple branch
offices to a central data center or cloud environment.

• Cloud Connectivity: SD-WAN provides optimized and secure connectivity to


public and private cloud services.

• Disaster Recovery: SD-WAN can facilitate business continuity and disaster


recovery by enabling the replication of data and applications across
geographically dispersed sites.
Examples:
• SD-WAN Technologies: Technologies like MPLS, cellular, and fiber can be
used to create a virtualized WAN connection.

• SD-WAN Platforms: Companies like Cisco, Juniper, and Palo Alto Networks
offer SD-WAN solutions.

• Cloud-Based SD-WAN: Microsoft Azure Virtual WAN is a cloud networking


service that connects Azure regions, on-premises sites, remote users,
branch offices, and other clouds.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy