Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This E-Book
Title Page
Copyright Page
Dedication Page
Contents
Acknowledgments
About the Author
Introduction
Whiteboards
Who Is This Book For, and What Will You Get Out of It?
How This Book is Organized
Part 1: Virtualization 101: The Basics of Virtualization
Part 2: Virtualization 201: Virtualizing the Data Center (a.k.a. Clouds)
Part 3: Network Functions Virtualized: Why Stop With Servers?
Part 4: Modern Networking Approaches to Virtualization
Part 5: Software Defined Networks: Virtualizing the Network
Part 6: SDN Controllers
Part 7: Virtualized Networks: Connecting It All Together
Part 8: Security: The Security Thing
Part 9: Visibility
Part 10: The Big Picture
Part 1: Virtualization 101: The Basics of Virtualization
1. Primer on Virtualization
Server Proliferation, Massive Power Bills, and Other IT Nightmares
How Servers Work
How VMs Fix the Underutilized Server Problem
Enter the Hypervisor
Why Are Virtual Machines Such a Big Deal?
2. Benefits of Virtual Machines
Reduced Cost
Less Space (Even More Cost Savings)
Availability and Flexibility
Faster Application Spin-Up and Provisioning
Easier Access for Development
Believe the Hype!
3. Hypervisors (VMWare, KVM, and Others)
An Operating System for Operating Systems
A Virtual Machine Monitor
Types of Hypervisors
Hypervisor Vendors
KVM
Xen
VMware ESXi
Microsoft Hyper-V
Choosing a Hypervisor
Summary
4. Managing Virtual Resources
What Is a Workload?
Managing Virtual Resources in the Hypervisor
Virtual Resource Providers and Consumers
So How Do You Manage Virtual Resources?
Part 2: Virtualization 201: Virtualizing the Data Center (a.k.a. Clouds)
5. Virtualized Data Centers (Some Call Them Clouds)
Benefits of Virtualizing the Data Center
Less Heat Buildup
Reduced Hardware Spend
Faster Deployment
Testing and Development
Faster Redeploy
Easier Backups
Disaster Recovery
Server Standardization
Separation of Services
Easier Migration to the Cloud
Is It a Cloud Yet?
The Five Cloud Attributes
On-Demand Self-Service
Ubiquitous Network Access
Pay Per Use
Rapid Elasticity
Location-Independent Resource Pooling
Types of Clouds
Software as a Service
Infrastructure as a Service
Platform as a Service
Cloud Deployment Models
Private Clouds
Shared Multitenant Clouds
Public Clouds
Hybrid Clouds
6. Virtual Machine Connectivity
Networking in Traditional Data Centers
Virtualized Data Center Design
Addressing with Virtual Machines
7. Networking Gear in Virtualized Data Centers
The Evolution of Data Center Switching
Cloud and Data Center Layout and Architecture
Virtualized Aware Network Switches
8. VMware, VSphere, VMotion, and VXLAN
VMware Product Design
vSphere
VMotion
VXLAN
Summary
9. Multitenancy and the Problems of Communal Living
SaaS Multitenancy
Pros and Cons of SaaS Multitenancy
IaaS Multitenancy
Pros and Cons of IaaS Multitenancy
Part 3: Network Functions Virtualized: Why Stop With Servers?
10. How Do You Virtualize a Network?
Network Virtualization
How Does This Fit with NFV and SDN?
Server Virtualization
Network Virtualization
Network Functions Virtualization
Software-Defined Networking
Virtualizing the Network
11. Virtualizing Appliances
Layer 4 Through 7 Network Services
Firewalls
VPNs
SSL Offload
Load Balancer
Fighting Virtualization with Virtualization
What’s the “So What”?
12. Virtualizing Core Networking Functions
Virtualization Recap
Where Core Functions Are Being Virtualized
13. What About Scalability and Performance?
Scalability Versus Performance
Performance in Network Virtualization
Scalability and Performance in Virtual Networks
Scalability and Performance for Virtual Appliances
Scalability and Performance of Virtualized Networks
Summary
Part 4: Modern Networking Approaches to Virtualization
14. From Consumers to Creators
The Emergence of SaaS
Cloud Business Consumer-Creators
15. OpenFlow
OpenFlow History
How OpenFlow Works
16. VMware Nicira
VMware NSX
Network Virtualization with NSX
How VMware Leverages Nicira (NSX)
17. Cisco Insieme
Cisco’s Hybrid SDN Solution
Cisco SDN and Insieme
18. OpenStack
Applications on Modern Networks
Part 5: Software Defined Networks: Virtualizing the Network
19. The Evolution of the Data Center Network
Networks Worked Great, Until They Didn’t
Traditional Data Center Design Goals
High Availability
Low Latency
Scalability
Security
The Cost Model Explodes
How We Got Here
20. What’s Wrong With the Network We Have?
A Brief Review of Networking
Control Planes and Forwarding Planes
The Cost of Complexity
Decoupling Networking Applications from Networking Gear
21. How SDN Works
Understanding SDN
The Application Layer
The Control Layer
The Infrastructure Layer
A Programmable Network
So What’s the “So What?”
22. The Economic Impact of SDN, NFV, and the Cloud
Winners in SDN, NFV, and the Cloud
How the “Little Guy” Wins
How Large Enterprises Win with SDN, NFV, and the Cloud
Losers in the Cloud
The Economic Value of Increased Innovation
Part 6: SDN Controllers
23. SDN Controllers
Centralized Control
Commercial Versus Open Source Controllers
Network Virtualization
24. The OpenDaylight Project
How the ODL Architecture Works
The ODL Controller Platform
25. The Fight to Control Your Network
Separation of Internal Controls
You Can See It, But Who Controls It?
26. What’s the Business Case for SDN?
SDN Use Case Examples
Data Center Optimization
Network Access Control
Network Virtualization
Virtual Customer Edge
Dynamic Interconnects
Virtual Core and Aggregation
Summary
Part 7: Virtualized Networks: Connecting It All Together
27. Goodbye Truck Rolls
Data Center Scale
A New Maintenance Philosophy
Summary
28. What If the Shoe Doesn’t Fit?
Where SDN Does Not Fit
When Should You Adopt SDN?
Stuck in the Middle
29. Service Chaining
Service Chaining in SDN
30. NFV: What Happens to All the Network Appliances?
How Network Appliances Are Different
Replacing Big Hardware Appliances with Many Small Virtual Appliances
When Not to Get Rid of an Appliance
Part 8: Security: The Security Thing
31. Where’s My Data, Exactly?
Storage Virtualization
Storage-Area Networks
Data Location and Security
So What Are the Nontechnical Issues That We Need to Address?
Summary
32. Preventing Data Leakage
Minimizing Data Loss
Data Loss Prevention
33. Logging and Auditing
Where Logging Matters
Summary
34. Encryption in Virtual Networks
Data in Motion
Data at Rest
Key Management
Best Practices
35. Everything Old Is Now New Again
How We Got Here
The Mainframe Model
The Personal Computer Model
The Networked Model
The Internet Model
Grid Computing Model
Cloud Computing Model
What We Have Learned
Retro Security Considerations
Recycled Ideas on Mobile and Web Apps
Part 9: Visibility
36. Overlay Networks
MPLS: The Original Virtual Network
Virtual Layer 2 Designs
Enter SDN
Common Encapsulation Techniques
37. Network Management Tools
What’s in the Tool Bag?
Tapping In
Gaining Visibility
38. Quality of Experience
Deep Packet Inspection
39. Monitoring Traffic Between Virtual Switches
Getting VM Visibility
Monitoring VM-to-VM traffic
How VxLANs Work
Creating a “Visibility Layer”
Part 10: The Big Picture
40. Pulling It All Together
Why the Network Had to Change
How SDN and NFV Tie Together
SDN’s Downside: A Loss of Visibility
SDN Orchestration
41. How SDN and NFV Will Affect You
Operational Domains
Mobility Virtualization
Virtual CPE and Service Chaining
NFV and Service Orchestration
WAN Optimization and Innovation
Network Optimization
Policy-Driven Application Provisioning and Delivery
SDN Use Cases
Network Access Control
Network Virtualization
Data Center Optimization
Direct Inter-Connects
Embracing SDN and NFV
42. What’s Next in Networking?
Separate but Complementary
Virtual Customer Premise Equipment
SDN and NFV Working Together
Summary
Index
← Prev
Back
Next →
← Prev
Back
Next →