You are on page 1of 75

VLAN

VSAN
Hub
• In a hub, a frame is passed along or
"broadcast" to every one of its ports. It
doesn't matter that the frame is only destined
for one port.
• Unable in distinguishing which port a frame
should be sent to. Passing it along to every
port ensures that it will reach its intended
destination.
• This places a lot of traffic on the network and
can lead to poor network response times.
Switch
• In networks, a device that filters and
forwards packets between LAN segments.
Collision Domain

• A collision domain is a part of a network where packet


collisions can occur.
• A collision occurs when two devices send a packet at the same
time on the shared network segment. The packets collide and
both devices must send the packets again, which reduces
network efficiency.
• Collisions are often in a hub environment, because each port
on a hub is in the same collision domain. By contrast, each
port on a bridge, a switch or a router is in a separate collision
domain.
Broadcast domain

• A broadcast domain is a domain in which a broadcast


is forwarded.
• A broadcast domain contains all devices that can
reach each other at the data link layer (OSI layer 2)
by using broadcast.
• All ports on a hub or a switch are by default in the
same broadcast domain.
• All ports on a router are in the different broadcast
domains
Concept of VLAN (Virtual LAN) and
Benefits
• Virtual LAN is a logical segmentation of local area
network (LAN) into different set of broadcasting
domains. Because the segmentation is not
physical it is called virtual. Different Users in same
location or in different locations can use the same
LAN.

• In simple terms, a VLAN is a set of workstations


within a LAN that can communicate with each
other as though they were on a single, isolated
LAN.
Purpose of VLANs
The basic reason for splitting a network into VLANs is to
reduce congestion on a large LAN.

Initially LANs were very flat—all the workstations were


connected to a single piece of coaxial cable, or to sets of
chained hubs. In a flat LAN, every packet that any device
puts onto the wire gets sent to every other device on the
LAN.

As the number of workstations on the typical LAN grew,


they started to become hopelessly congested; there were
just too many collisions, because most of the time when a
workstation tried to send a packet, it would find that the
wire was already occupied by a packet sent by some other
device.
Advantages
i) High Performance:
Generally, switches and routers need more
processing time for incoming traffic because
as the traffic passes through the routers,
latency increases and the network
performance decreases. If VLAN is used, then
there is no need of extra routers since VLAN
creates broadcasting domains.
ii) Virtual workgroups:
In current scenario, most of the
communication within the organization takes
place in small workgroups (e.g. Development
team, marketing team, accounting team) to
manage broadcast and multi-cast functionality
within the workgroups, VLAN can be used to
enable communication.
iii) Cost effective
The cost of routers can be reduced when
VLANs are used like broadcasting domains.
iv) Easy administration
Traditional LAN has many access management
issues, including LAN cabling, new station
setup and addressing, and configuration of
hubs and routers. While using VLAN this
access management effort can be reduced
because user movement within VLAN requires
no reconfiguration of routers and hubs.
v) Enhanced security
VLAN is also used to set firewalls, restrict
access permission for outside access, adding
an extra layer of security for intrusion
detection and controlling broadcasting
domain.
Flow of packets in Traditional LAN
Scenario for VLANs
Types of VLAN’S
VLAN membership can be classified by port, MAC address, and protocol type.

• 1) Layer 1 VLAN: Membership by Port


• Membership in a VLAN can be defined based on
the ports that belong to the VLAN. For example,
in a bridge with four ports, ports 1, 2, and 4
belong to VLAN 1 and port 3 belongs to VLAN 2
(see Figure). Port VLAN
• 1 1
• 2 1
• 3 2
• 4 1
• The main disadvantage of this method is that it does not allow for user mobility. If a
user moves to a different location away from the assigned bridge, the network
manager must reconfigure the VLAN.
2) Layer 2 VLAN: Membership by MAC Address
• Here, membership in a VLAN is based on the MAC address of the
workstation. The switch tracks the MAC addresses which belong to each
VLAN (see Figure). Since MAC addresses form a part of the workstation's
network interface card, when a workstation is moved, no reconfiguration is
needed to allow the workstation to remain in the same VLAN. This is unlike
Layer 1 VLAN's where membership tables must be reconfigured.
• MAC Address VLAN
• 1212354145121 1
• 2389234873743 2
• 3045834758445 2
• 5483573475843 1
The main problem with this method is that VLAN membership must be assigned initially.
In networks with thousands of users, this is no easy task. Also, in environments where
notebook PC's are used, the MAC address is associated with the docking station and not
with the notebook PC. Consequently, when a notebook PC is moved to a different
docking station, its VLAN membership must be reconfigured.
Types of VLAN’S
VLAN membership can be classified by port, MAC address, and protocol type.

• 3) Layer 2 VLAN: Membership by Protocol


Type
• VLAN membership for Layer 2 VLAN's can also
be based on the protocol type field found in the
Layer 2 header (see Figure).
• Protocol VLAN
• IP 1
• IPX 2
4) Layer 3 VLAN: Membership by IP Subnet
Address
• Membership is based on the Layer 3 header. The network IP
subnet address can be used to classify VLAN membership (see
Figure).
• IP Subnet VLAN
• 23.2.24 1
• 26.21.35 2
Although VLAN membership is based on Layer 3 information, this has nothing to do
with network routing and should not be confused with router functions. In this
method, IP addresses are used only as a mapping to determine membership in VLAN's.
No other processing of IP addresses is done.

In Layer 3 VLAN's, users can move their workstations without reconfiguring their
network addresses. The only problem is that it generally takes longer to forward
packets using Layer 3 information than using MAC addresses.
5) Higher Layer VLAN's
• It is also possible to define VLAN membership based on
applications or service, or any combination thereof. For
example, file transfer protocol (FTP) applications can
be executed on one VLAN and telnet applications on
another VLAN.
• The 802.1Q draft standard defines Layer 1 and Layer 2
VLAN's only. Protocol type based VLAN's and higher
layer VLAN's have been allowed for, but are not
defined in this standard. As a result, these VLAN's will
remain proprietary.
Concept of SAN (Virtual SAN) and
Benefits
• When a Logical partition is created within a
physical storage area network (SAN), it is know
virtual storage area network (VSAN).
Virtualization technology enables division and
allocation of entire storage area network into
more logical SANs
When a Logical partition is created within a physical storage
area network (SAN), it is know virtual storage area network
(VSAN).
Benefits of SAN
• Enhanced application availability
• Higher application performance
• Centralized and consolidated storage
• Data transfer and vaulting to remote sites
• Simplified centralized management
VM Migration
• It refers to the movement or transfer between
different physical machines without any
discontinuity
Live migration refers to the process of moving a running virtual machine
or application between different physical machines without disconnecting
the client or application. Memory, storage, and network connectivity of the
virtual machine are transferred from the original guest machine to the
destination.
Advantages of Virtual Machine Migration:
• Workloads keep changing dynamically in servers.
• A scheduled maintenance normally results in some
downtime for the users of the server.
• In case of unscheduled server downtime (due to some
fault in server),
• Migration can also be used for Disaster Recovery.
• Its easier to migrate a Virtual Machine from one server
to another, than migrating the operating system and
application(s) individually.
• Using VM Migration, its possible to migrate operating
systems and applications from older servers to newer
servers easily and without disrupting the services.
VM consolidation and management
Cloud Interoperability standards
• There is a strong need for the development of
integrated interoperability authentication among all
provider.
• Several organizations such as the Cloud Computing
Interoperability Forum (CCIF) have been working on
solutions to address cloud interoperability challenges.
The Cloud standards Customer Council (CSCC)
provides the opportunity to convert and synchronize
client needs and specified requirement into standards
of development cloud firms and also for cloud users.
It provides standard research materials and
documents
Categories of Interoperability

When consumer wish to migrate from one cloud Provider
to another. interoperability falls into these categories:
1. Data and application portability: It means by running
applications and data, consumers should be able to migrate
easily from one cloud provides to another without any lock-
in-issue.
2 Platform portability: It means application development
environment or IDE should be capable enough to run over
any type of cloud infrastructure.
3. Infrastructure portability: it means virtual server or
machine images should have the freedom of portability
They should be able to migrate from one cloud provider to
another.
Open standards for solving cloud
interoperability challenges
• Application solution
Existing implemented cloud APIs need to become interoperable; Unified
cloud interface (UCI) is a developing interface for the unification for various cloud APIs.

• Platform solution
Cloud computing interoperability forum (CCIF), Open cloud computing interface
(OCCI) working group, Storage Networking Industry Association (SNIA)

• Infrastructure solution
Distributed management task force (DMTF), Open Virtualization Format (OVF),
Open Grid Forum (OGF), OCCI, IEEE P2301, P2302.
Open virtualization format
-Open
-Flexible
-Portable
- Optimal
-and Extensible
format for packaging of software that has to be
run in VMs.
Characteristics of OVF
1)Open standard
– Evolved with the collaboration of various key
venders
– Accepted standard of portable VMs
2)Portable VM packaging
Supports all types of virtual hard disk formats that can be associated
with any type of hypervisor, which may or may not be popular

3)Optimized for distribution


– based on latest industry standards
– Integrates content verification and integrity
checking according to public key infrastructure
Characteristics of OVF
4) Multiple VM support
– OVF extends its service offering for both single VM
and multiple VM configuration packages.
– It provides multi-tire services that contain several
independent VMs
5) Vender and platform independent:
– It is not dependent on host machine, any
virtualization platform or guest OS.
QA
• What is VM Migration?
• What is the meaning of VM Consolidation?
• What is the meaning of Cloud Interoperability?
• What are the Cloud Interoperability Standards?
• What are the different Categories of
Interoperability?
• What are the open standards for solving cloud
interoperability challenges?
• What is OVF?
• What are the different characteristics of OVF?

You might also like