Lecture number 04
Lecture number 04
10/1/2022 1
Network Virtualization
• In computing, network virtualization is the process of combining
hardware and software network resources and network functionality into
a single, software-based administrative entity, a virtual network.
• Network virtualization involves platform virtualization, often combined
with resource virtualization.
• In software testing, software developers use network virtualization to
test software which are under development in a simulation of the
network environments in which the software is intended to operate. As a
component of application performance engineering, network
virtualization enables developers to emulate connections between
applications, services, dependencies, and end users in a test
environment without having to physically test the software on all
possible hardware or system software. The validity of the test depends
on the accuracy of the network virtualization in emulating real hardware
and operating systems.
Network Virtualization
Components
Various equipment and software vendors offer network virtualization by combining any of the
following:
•Network hardware, such as switches and network adapters, also known as network interface
cards (NICs)
•Network elements, such as firewalls and load balancers
•Networks, such as virtual LANs (VLANs) and containers such as virtual machines (VMs)
•Network storage devices
•Network machine-to-machine elements, such as telecommunications devices
•Network mobile elements, such as laptop computers, tablet computers, and smart phones
•Network media, such as Ethernet and Fiber Channel
Network Virtualization Categories
• Both are splitting the entire network systems into several virtual versions.
• Wireless network virtualization is not a subset of network virtualization due to:
• Distinctive properties of the wireless environment
• time-various channels
• Attenuation
• mobility
• Broadcast
• More complicated.
• Specific more access technologies with particular characteristics
Application virtualization
• Is a software technology that encapsulates computer programs from the
underlying operating system on which it is executed.
• Known as process virtualization.
• A fully virtualized application is not installed in the traditional sense, although
it is still executed as if it were.
• The application behaves at runtime like it is directly interfacing with the
original operating system and all the resources managed by it, but can be
isolated or sandboxed to varying degrees.
• Full application virtualization requires a virtualization layer.
• Virtualization layers replace part of the runtime environment normally
provided by the operating system.
• The layer intercepts all disk operations of virtualized applications and
transparently redirects them to a virtualized location.
Application virtualization…
• The application remains unaware that it accesses a virtual resource
instead of a physical one.
• Examples of this technology for the Windows platform include:
• Microsoft App-V
• Turbo (software)
Benefits
• Applications run in environments that do not suit the native application (Wine).
• Low system integration and administration costs
• Lesser integration causes less poorly written or buggy code.
• Side-by-side running of incompatible applications.
• Isolating applications from the operating system has security benefits.
• Simplified operating system migrations.
• Portable software.
• Application virtualization uses fewer resources than a separate virtual machine.
Limitations
• Not all computer programs can be virtualized.
• Some require a device driver
• Some need to run in shared memory space (16 bit applications).
• Some require heavy OS integration (anti-viruses, WindowBlinds or StyleXP .
• Software licensing issues.
Database virtualization
• Database virtualization is the decoupling of the database layer, which lies between the storage
and application layers within the application stack.
• Virtualization of the database layer enables a shift away from the physical, toward the logical or
virtual.
• Virtualization enables compute and storage resources to be pooled and allocated on demand.
This enables both the sharing of single server resources for multi-tenancy, as well as the pooling
of server resources into a single logical database or cluster.
• Database virtualization provides:
• increased flexibility
• more granular and efficient allocation of pooled resources
• more scalable computing
Virtual data partitioning
• Partitioning data stores as a database grows has been in use for several decades.
• Two primary ways to partition data in data management systems:
• Shared-data databases–an architecture that assumes all database cluster nodes
share a single partition. Internode communications is used to synchronize update
activities performed by different nodes on the cluster.
• Shared-Nothing databases–an architecture in which all data is segregated to
internally managed partitions with clear, well-defined data location boundaries.
require manual partition management.
• In virtual partitioning, logical data is abstracted from physical data by autonomously
creating and managing large numbers of data partitions (100s to 1000s). Because
they are autonomously maintained, resources required to manage the partitions are
minimal. This kind of massive partitioning results in:
• partitions that are small, efficiently managed and load balanced
• systems that do not required re-partitioning events to define additional
partitions, even when hardware is changed
Horizontal data partitioning
• Partitioning database sources from consumers
• With greater numbers of database sources, inserting a horizontal data
virtualization layer between the sources and consumers helps address
this complexity.
• The process of
offering data
consumers a data
access interface
that hides the
technical aspects
of stored data, such
as location, storage
structure, API,
access language,
and storage
technology.
Advantages
• Added flexibility and agility for existing computing infrastructure
• Enhanced database performance
• Pooling and sharing computing resources, either splitting them (multi-tenancy) or combining
them (clustering)
• Simplification of administration and management
• Increased fault tolerance
What is VLAN? Types, Advantages, Example
VLAN is a custom network which is created from one or more local area
networks. It enables a group of devices available in multiple networks to
be combined into one logical network. The result becomes a virtual LAN
that is administered like a physical LAN. The full form of VLAN is defined
as Virtual Local Area Network.
The below topology depicts a network having all hosts inside the same
virtual LAN:
What is VLAN? Types, Advantages, Example
• Without VLANs, a broadcast sent from a host can easily reach all
network devices. Each and every device will process broadcast
received frames. It can increase the CPU overhead on each device and
reduce the overall network security.
• In case if you place interfaces on both switches into separate VLAN, a
broadcast from host A can reach only devices available inside the
same VLAN. Hosts of VLANs will not even be aware that the
communication took place. This is shown in the below picture:
What is VLAN? Types, Advantages, Example
Host A can reach only devices available inside the same VLAN
How VLAN works
Range Description
LAN VLAN
LAN can be defined as a group of computer A VLAN can be defined as a custom network
and peripheral devices which are connected in which is created from one or more local area
a limited area. networks.