虛擬化技術 Virtualization Techniques

Slides:



Advertisements
Similar presentations
Internetworking II: MPLS, Security, and Traffic Engineering
Advertisements

Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
IP: The Internet Protocol
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
雲端計算 Cloud Computing Network Virtualization. Agenda Introduction External network virtualization  What to be virtualized ? Network device virtualization.
1 Chapter 8 Local Area Networks - Internetworking.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
1 Chapter 8 Local Area Networks - Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
WAN Technologies.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
For more notes and topics visit: eITnotes.com.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
虛擬化技術 Virtualization Techniques
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Data Communications & Computer Networks, Second Edition1 Chapter 8 Local Area Networks: Internetworking.
Protocol Layering Chapter 11.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Local Area Networks Honolulu Community College
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Data Communication Network Models
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
Advanced Computer Networks
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
COMPUTER NETWORKS CS610 Lecture-15 Hammad Khalid Khan.
Instructor Materials Chapter 1: LAN Design
Local Area Networks Honolulu Community College
Networking Devices.
The Underlying Technologies
Chapter 4 Data Link Layer Switching
Virtual LANs.
IS3120 Network Communications Infrastructure
NTHU CS5421 Cloud Computing
Presentation transcript:

虛擬化技術 Virtualization Techniques Network Virtualization Introduction

Agenda Introduction External network virtualization What to be virtualized Network device virtualization Network data path virtualization How to be virtualized Protocol approach Internal network virtualization KVM approach Xen approach Case study

Network virtualization Introduction External network virtualization Internal network virtualization Network virtualization

Introduction What is computer network ? Why should we study network ? A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Why should we study network ? Computer networks are used for communication and coordination, as well as commerce by large as well as small organizations. Computer networks and the Internet is a vital part of business infrastructure.

Network Protocol and Model Rules and procedures governing transmission between computers Used to identify communicating devices, secure attention of intended recipient, check for errors and re-transmissions All computers using a protocol have to agree on how to code/decode the message, how to identify errors, and steps to take when there are errors or missed communications Computer System Protocol Packaging Protocol Delivery Protocol

Network Protocol and Model

Network Topologies Topologies Topology refers to the physical or logical layout of the computers in a particular network. Commonly used topologies are star, bus and ring.

Network Types LANs and WANs Local area network Wide area network Network of computers and other devices within a limited distance Use star, bus or ring topologies Network interface cards in each device specifies transmission rate, message structure, and topology Network operating system routes and manages communications and coordinates network resources Wide area network Network of computers spanning broad geographical distances Switched or dedicated lines Firms use commercial WANs for communication

Network Architecture Packet switching Message/Data is divided into fixed or variable length packets Each packet is numbered and sent along different paths to the destination Packets are assembled at the destination Useful for continued message transmission even when part of the network path is broken

Network Architecture Connect two networks

Network Architecture Connect multiple networks

Network Architecture Connect multiple networks

Network Architecture Connect multiple networks

Network Architecture The simple view of Internet

Network Design Rules Hierarchical approach Traffic is aggregated hierarchically from an access layer into a layer of distribution switches and finally onto the network core. A hierarchical approach to network design has proven to deliver the best results in terms of optimizing scalability, improving manageability, and maximizing network availability.

Network Virtualization What is network virtualization ?

Network Virtualization What is network virtualization ? In computing, network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Two categories : External network virtualization Combine many networks, or parts of networks, into a virtual unit. Internal network virtualization Provide network-like functionality to the software containers on a single system.

Network Virtualization Desirable properties of network virtualization : Scalability Easy to extend resources in need Administrator can dynamically create or delete virtual network connection Resilience Recover from the failures Virtual network will automatically redirect packets by redundant links Security Increased path isolation and user segmentation Virtual network should work with firewall software Availability Access network resource anytime

Network Virtualization External network virtualization in different layers : Layer 1 Seldom virtualization implement in this physical data transmission layer. Layer 2 Use some tags in MAC address packet to provide virtualization. Example, VLAN. Layer 3 Use some tunnel techniques to form a virtual network. Example, VPN. Layer 4 or higher Build up some overlay network for some application. Example, P2P.

Network Virtualization Internal network virtualization in different layers : Layer 1 Hypervisor usually do not need to emulate the physical layer. Layer 2 Implement virtual L2 network devices, such as switch, in hypervisor. Example, Linux TAP driver + Linux bridge. Layer 3 Implement virtual L3 network devices, such as router, in hypervisor. Example, Linux TUN driver + Linux bridge + iptables. Layer 4 or higher Layer 4 or higher layers virtualization is usually implemented in guest OS. Applications should make their own choice.

Network virtualization Introduction External network virtualization Internal network virtualization Network virtualization

Network Virtualization Two virtualization components : Device virtualization Virtualize physical devices in the network Data path virtualization Virtualize communication path between network access points Data Path Router Switch

Network Virtualization Device virtualization Layer 2 solution Divide physical switch into multiple logical switches. Layer 3 solution 3 VRF technique ( Virtual Routing and Forwarding ) Emulate isolated routing tables within one physical router.

Network Virtualization Data path virtualization Hop-to-hop case Consider the virtualization applied on a single hop data-path. Hop-to-cloud case Consider the virtualization tunnels allow multi-hop data-path.

Network Virtualization Protocol approach Protocols usually use for data-path virtualization. Three implementations 802.1Q – implement hop to hop data-path virtualization MPLS ( Multiprotocol Label Switch ) – implement router and switch layer virtualization GRE (Generic Routing Encapsulation ) – implement virtualization among wide variety of networks with tunneling technique.

Network Virtualization 802.1Q Standard by IEEE 802.1 Not encapsulate the original frame Add a 32-bit field between MAC address and EtherTypes field ETYPE(2B): Protocol identifier Dot1Q Tag(2B): VLAN number, Priority code CE: Customer Edge router PE: Provider Edge router

Network Virtualization Example of 802.1Q VN 1 Source destination Physical Network VN 2 Source destination

Network Virtualization MPLS ( Multiprotocol Label Switch ) Also classified as layer 2.5 virtualization Add one or more labels into package Need Label Switch Router(LSR) to read MPLS header

Network Virtualization Example of MPLS VN 1 5 4 2 7 9 8 LSR Physical Network LER LER CE LSR CE LER CE VN 2 5 4 2 7 9

Network Virtualization GRE ( Generic Routing Encapsulation ) GRE is a tunnel protocol developed by CISCO Encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol internetwork Stateless property This means end-point doesn't keep information about the state Built Tunnel

Network virtualization Introduction External network virtualization Internal network virtualization Network virtualization

Internal Network Virtualization A single system is configured with containers, such as the Xen domain, combined with hypervisor control programs or pseudo-interfaces such as the VNIC, to create a “network in a box”. This solution improves overall efficiency of a single system by isolating applications to separate containers and/or pseudo interfaces. Virtual machine and virtual switch : The VMs are connected logically to each other so that they can send data to and receive data from each other. Each virtual network is serviced by a single virtual switch. A virtual network can be connected to a physical network by associating one or more network adapters (uplink adapters) with the virtual switch.

Internal Network Virtualization Properties of virtual switch A virtual switch works much like a physical Ethernet switch. It detects which VMs are logically connected to each of its virtual ports and uses that information to forward traffic to the correct virtual machines. Typical virtual network configuration Communication network Connect VMs on different hosts Storage network Connect VMs to remote storage system Management network Individual links for system administration

Internal Network Virtualization Network virtualization example form VMware

KVM Approach In KVM system KVM focuses on CPU and memory virtualization, so IO virtualization framework is completed by QEMU. In QEMU, network interface of virtual machines connect to host by TUN/TAP driver and Linux bridge. Virtual machines connect to host by a virtual network adapter, which is implemented by TUN/TAP driver. Virtual adapters will connect to Linux bridges, which play the role of virtual switch.

KVM Approach TUN/TAP driver TUN and TAP are virtual network kernel drivers : TAP (as in network tap) simulates an Ethernet device and operates with layer 2 packets such as Ethernet frames. TUN (as in network TUNnel) simulates a network layer device and operates with layer 3 packets such as IP. Data flow of TUN/TAP driver Packets sent by an operating system via a TUN/TAP device are delivered to a user-space program that attaches itself to the device. A user-space program may pass packets into a TUN/TAP device. TUN/TAP device delivers (or "injects") these packets to the operating system network stack thus emulating their reception from an external source.

KVM Approach

KVM Approach Linux bridge Bridging is a forwarding technique used in packet-switched computer networks. Unlike routing, bridging makes no assumptions about where in a network a particular address is located. Bridging depends on flooding and examination of source addresses in received packet headers to locate unknown devices. Bridging connects multiple network segments at the data link layer (Layer 2) of the OSI model.

KVM Approach TAP/TUN driver + Linux Bridge

Xen Approach In Xen system Since implemented by para-virtualization, guest OS loads modified network interface drivers. Modified network interface drivers, which act as TAP in KVM approach, communicate with virtual switches in Dom0. Virtual switch in Xen can be implemented by Linux bridge or work with other approaches.

Xen Approach Detail in Xen System

Xen Approach Some performance issues : Page remapping Hypervisor remaps memory page for MMIO. Context switching Whenever packets sent, induce one context switch from guest to Domain 0 to drive real NIC. Software bridge management Linux bridge is a pure software implementation. Interrupt handling When interrupt occur, induce one context switch again.

Xen Approach Improve Xen performance by software Large effective MTU Fewer packets Lower per-byte cost

Xen Approach Improve Xen performance by hardware CDNA (Concurrent Direct Network Access) hardware adapter Remove driver domain from data and interrupts Hypervisor only responsible for virtual interrupts and assigning context to guest OS

Case Study VMware offer a hybrid solution of network virtualization in Cloud. Use redundant links to provide high availability. Virtual switch in host OS will automatically detect link failure and redirect packets to back-up links.

Network Virtualization Summary Virtualization in layers Usually in Layer 2 and Layer 3 External network virtualization Layer 2 802.1q Layer 3 MPLS, GRE Internal network virtualization Traditional approach TAP/TUN + Linux bridge New technique Virtual switch

Reference Books : Web resources : Papers : Kumar Reddy & Victor Moreno, Network Virtualization, Cisco Press 2006 Web resources : Linux Bridge http://www.ibm.com/developerworks/cn/linux/l-tuntap/index.html Xen networking http://wiki.xensource.com/xenwiki/XenNetworking VMware Virtual Networking Concepts http://www.vmware.com/files/pdf/virtual_networking_concepts.pdf TUN/TAP wiki http://en.wikipedia.org/wiki/TUN/TAP Network Virtualization wiki http://en.wikipedia.org/wiki/Network_virtualization Papers : A. Menon, A. Cox, and W. Zwaenepoel. Optimizing Network Virtualization in Xen. Proc. USENIX Annual Technical Conference (USENIX 2006), pages 15–28, 2006.