MICROSOFT NETWORK VIRTUALIZATION

Slides:



Advertisements
Similar presentations
And many others…. Deliver networking as part of pooled, automated infrastructure Ensure multitenant isolation, scale and performance Expand.
Advertisements

Hyper-V Network Virtualization
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
What most companies get from ARIN In total, that range is only 3,566 blocks of /24!!!
Understanding Internet Protocol
Red Corp Blue Subnet1 Blue Subnet3Blue Subnet2 Blue Subnet5 Blue Subnet4 Red Subnet2 Red Subnet1 Blue Sales Net Red HR Net Multitenant.
Guide to Network Defense and Countermeasures Second Edition
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 9: Creating and Configuring Virtual Networks
Internet Protocol Security (IPSec)
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Blue CorpRed Corp Blue Subnet1 Blue Subnet3Blue Subnet2 Blue Subnet5 Blue Subnet4 Red Subnet2 Red Subnet1 Blue R&D Net Blue Sales Net.
Data Center Network Redesign using SDN
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 13 – Network Security
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Microsoft Virtual Academy.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Chapter 8: Virtual LAN (VLAN)
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Module 1: Configuring Routing by Using Routing and Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
WS-B327 Dynamic, policy-driven network (re)configuration Consistent, profile- based deployment of SDN traffic policies through distributed.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Virtual Local Area Networks In Security By Mark Reed.
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
MPLS Virtual Private Networks (VPNs)
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Chapter 2 Network Models
Virtual Private Networks
Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes
Virtual Local Area Networks (VLANs) Part I
Chapter 18 IP Security  IP Security (IPSec)
Securing the Network Perimeter with ISA 2004
Infrastructure Provisioning Kenon Owens Sr
MCSA VCE
Chapter 5: Inter-VLAN Routing
Virtual LANs.
9/15/2018 8:14 PM SAC-442T Building Secure, Scalable Multi-Tenant Clouds using Hyper-V Network Virtualization Murari Sridharan Yu-Shun Wang Principal.
NET323 D: Network Protocols
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
Chapter 8: Subnetting IP Networks
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
* Essential Network Security Book Slides.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Network base Network base.
Data Security for Microsoft Azure
Microsoft Virtual Academy
Goals Introduce the Windows Server 2003 family of operating systems
Extending MPLS/BGP VPNs to End-Systems
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
See your OpenStack Network Like Never Before
TechReady 16 1/12/2019 MDC-B351 How to Design and Configure Networking in Microsoft System Center Part 2 of 2 Greg Cusanza Senior Program Manager, Microsoft.
Chapter 2: Scaling VLANs
AbbottLink™ - IP Address Overview
Delivering the Data.
Cengage Learning: Computer Networking from LANs to WANs
Re-think Networking Windows Server 2012 R2
Greg Cusanza Senior Program Manager Microsoft Corporation
Topic 12: Virtual Private Networks
Presentation transcript:

MICROSOFT NETWORK VIRTUALIZATION VILNIUS UNIVERSITY FACULTY OF MATHEMATICS AND INFORMATICS MICROSOFT NETWORK VIRTUALIZATION Student: Ștefana-Diana Budin TEACHER: TOMAS PLANKIS

summary INTRODUCTION CONCEPTS PACKET ENCAPSULATION MULTI-TENANT DEPLOYMENT EXAMPLE RESOURCES QUESTIONS?

INTRODUction In computing, network virtualization or network virtualisation is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization. Network virtualization is categorized as either external virtualization, combining many networks or parts of networks into a virtual unit, or internal virtualization, providing network-like functionality to software containers on a single network server. Server virtualization enables multiple server instances to run concurrently on a single physical host; yet server instances are isolated from each other. Each virtual machine essentially operates as if it is the only server running on the physical computer. Network virtualization provides a similar capability, in which multiple virtual networks run on the same physical network infrastructure and each virtual network operates as if it is the only virtual network running on the shared network infrastructure. 

Figure 1: Server virtualization versus network virtualization

Concepts In Hyper-V Network Virtualization (HNV), a customer or tenant is defined as the "owner" of a set of IP subnets that are deployed in an enterprise or datacenter. A customer can be a corporation or enterprise with multiple departments or business units in a private datacenter which require network isolation, or a tenant in a public data center which is hosted by a service provider. Each customer can have one or more Virtual networks in the datacenter, and each virtual network consists of one or more Virtual subnets. There are two HNV implementations which will be available in Windows Server 2016: HNVv1 and HNVv2.

HNVV1 HNVv1 is compatible with Windows Server 2012 R2 and System Center 2012 R2 Virtual Machine Manager (VMM).  SET Teaming and HNVv1 are not compatible by platform. To use HA NVGRE gateways users need to either use LBFO team or No team. Or Use Network Controller Deployed gateways with SET teamed switch.

HNVv2 A significant number of new features are included in HNVv2 which is implemented using the Azure Virtual Filtering Platform (VFP) forwarding extension in the Hyper-V Switch. HNVv2 is fully integrated with Microsoft Azure Stack which includes the new Network Controller in the Software Defined Networking (SDN) Stack.

VIRTUAL NETWORK Each virtual network consists of one or more virtual subnets. A virtual network forms an isolation boundary where the virtual machines within a virtual network can only communicate with each other.  With HNV, isolation is enforced using either NVGRE or VXLAN encapsulation to create overlay networks with the possibility of overlapping IP subnets between customers or tenants. Each virtual network has a unique Routing Domain ID (RDID) on the host. 

Virtual subnets A virtual subnet implements the Layer 3 IP subnet semantics for the virtual machines in the same virtual subnet. Each virtual subnet belongs to a single virtual network (RDID), and it is assigned a unique Virtual Subnet ID (VSID) using either the TNI or VNI key in the encapsulated packet header.  A key advantage of the virtual network and routing domain is that it allows customers to bring their own network topologies (for example, IP subnets) to the cloud. Figure 2 shows an example where the Contoso Corp has two separate networks, the R&D Net and the Sales Net. Because these networks have different routing domain IDs, they cannot interact with each other. That is, Contoso R&D Net is isolated from Contoso Sales Net even though both are owned by Contoso Corp. Contoso R&D Net contains three virtual subnets.

Figure 2: Customer networks and virtual subnets

Packet Encapsulation Each virtual network adapter in HNV is associated with two IP addresses: Customer Address (CA) The IP address assigned by the customer, based on their intranet infrastructure. This address allows the customer to exchange network traffic with the virtual machine as if it had not been moved to a public or private cloud. The CA is visible to the virtual machine and reachable by the customer. Provider Address (PA) The IP address assigned by the hosting provider or the datacenter administrators based on their physical network infrastructure. The PA appears in the packets on the network that are exchanged with the server running Hyper-V that is hosting the virtual machine. The PA is visible on the physical network, but not to the virtual machine.

The following diagram shows the conceptual relationship between virtual machine CAs and network infrastructure PAs as a result of network virtualization.

In the diagram, customer virtual machines are sending data packets in the CA space, which traverse the physical network infrastructure through their own virtual networks, or "tunnels". In the example above, the tunnels can be thought of as "envelopes" around the Contoso and Fabrikam data packets with green shipping labels (PA addresses) to be delivered from the source host on the left to the destination host on the right. The key is how the hosts determine the "shipping addresses" (PA's) corresponding to the Contoso and the Fabrikam CA's, how the "envelope" is put around the packets, and how the destination hosts can unwrap the packets and deliver to the Contoso and Fabrikam destination virtual machines correctly. This simple analogy highlighted the key aspects of network virtualization: Each virtual machine CA is mapped to a physical host PA. There can be multiple CAs associated with the same PA. Virtual machines send data packets in the CA spaces, which are put into an "envelope" with a PA source and destination pair based on the mapping. The CA-PA mappings must allow the hosts to differentiate packets for different customer virtual machines. As a result, the mechanism to virtualize the network is to virtualize the network addresses used by the virtual machines.

Network virtualization through address virtualization HNV implements overlay tenant networks using either Network Virtualization Generic Routing Encapsulation (NVGRE) or the Virtual eXtensible Local Area Network (VXLAN). VXLAN is the default. Virtual eXtensible Local Area Network (VXLAN) The Virtual eXtensible Local Area Network (VXLAN) protocol has been widely adopted in the market place, with support from vendors like Cisco, Brocade, Arista, Dell, HP and others. The VXLAN protocol uses UDP as the transport. 

This network virtualization mechanism uses the Generic Routing Encapsulation (NVGRE) as part of the tunnel header. In NVGRE, the virtual machine's packet is encapsulated inside another packet. The header of this new packet has the appropriate source and destination PA IP addresses in addition to the Virtual Subnet ID, which is stored in the Key field of the GRE header, as shown in the figure below.

MULTI-TENANT DEPLOYMENT EXAMPLE The Virtual Subnet ID allows hosts to identify the customer virtual machine for any given packet, even though the PA's and the CA's on the packets may overlap. This allows all virtual machines on the same host to share a single PA. MULTI-TENANT DEPLOYMENT EXAMPLE The following diagram shows an example deployment of two customers located in a cloud datacenter with the CA-PA relationship defined by the network policies.

RESOURCES https://docs.microsoft.com/en-us/ https://www.wikipedia.org

QUESTIONS?