Internet As Virtual Network 2
Internet As Virtual Network 2
• Network where all devices, servers, virtual machines, and data centers
that are connected are done so through software and wireless technology
• Enables communication between multiple computers, virtual machines
• Enables devices across many locations to function with the same
capabilities as a traditional physical network.
• This allows for data centers to stretch across different physical locations,
and gives network administrators new and more efficient options, like
the ability to easily modify the network as needs change, without having
to switch out or buy more hardware;
• Greater flexibility in provisioning the network to specific needs and
applications
• The capacity to move workloads across the network infrastructure
without compromising service, security, and availability.
Virtual Network: How it Works
• A virtual network uses modern technology to create an extended
network that works wirelessly. This includes:
• vSwitch Software: Virtualization software on host servers that
allows you to set up and configure a virtual network.
• Virtual network adapter: Creates a gateway between networks.
• Physical network: Required as a host for the virtual network
infrastructure.
• Virtual machines and devices: Instruments that connect to the
network and allow various functionality.
• Servers: Part of the network host infrastructure.
• Firewalls and security: Designed for monitoring and stopping
security threats.
Classes of Virtual Network
There are three classes of virtual networks:
1) VPN
2) VLAN
3) VXLAN
VPN
• virtual private network
• uses the internet to connect two or more
existing networks
• This internet-based virtual network allows
users to log in from anywhere to access the
physical networks that are connected.
• VPNs are also used for masking internet use on
public WiFi and ensuring secure browsing
VPN
• A VPN is created when data attached to packets
defines routing information that takes users to
the applicable address.
• a tunnel of addresses is created, encrypting the
browsing history and making it possible to
access information remotely
• VPNs provided a small-scope, fully virtual
network that uses the internet to allow for
people to connect.
VLAN
• Uses partitions to group devices on a LAN network
into domains with resources and configurations that
are applied to each
• Using a VLAN allows for better security,
monitoring, and management of the devices and
servers within a specific domain
• This is especially true for large networks that may
be more vulnerable to attack when domains are not
used and monitored individually.
VXLAN
• VXLAN means virtual extensible local area
network.
• In this network, your level 3 network
infrastructure provides a tunnel into level 2.
• Virtual switches create endpoints for each
tunnel, and another piece of technology, called
a physical or virtual base case, can route data
between endpoints.
Benefits of Virtual Networking
• Remote work capabilities
• Digital security
• Streamlines hardware
• Flexibility and scalability
• Cost savings
• Productivity
Virtual Network
Network where all devices, servers, virtual
machines, and data centers that are connected are
done so through software and wireless technology
Enables communication between multiple
computers, virtual machines
Enables devices across many locations to function
with the same capabilities as a traditional physical
network.
Internet Architecture And Philosophy
Application Services
• Betwe en 1-'ayers
[ Appncat1on
I Messa ges or Stream s
[ Trans port
I .. , port Protoc ol Packe ts
Trans
l
Intern et
I ... /
, IP_ Datag rams
• .
lNetwork rnterfacej //
/
.........
. ......... ......... .. Netwo rk-Spe cific Frame s
.
.. Hardw are
_,/
Figure 11.S The· 4 con·ceptual layers of TCP/IP software above the hardware
layer, and, the form of objects passed between layers. The layer
1
' . \
• Applicat~on Layer. •At th~ highest layer, users invoke application programs that
access services available across a TCPDP internet. An application interacts with one of
I
the transport layer protocols ·~o send or receive data. Each application program chooses
'
f
.
•
.
I
I
There ar~ two subtle and imp.~rtant differe nces betwe en the TCP/IP layeri ng
at-
scheme and the ISO/X.25. scheme. The first difference revolves around the focus of
the
tention on reliability, while .the 8eCond invqlves' the location of intelligence in
overall system.
One major'ditference between the TCP/IP protocols and the X.25 protocols lies in
'
their appro,aches to· providing reliable data transfer services. In the X.2S model, proto-
1
vide end-to-end reliability ' h avi. ng the source correspond wit h the ultimate destination
Cb~p. 11
to
verify del ive ry.
In con tra st to such a s cheme, TCP/IP bases its protocol layering on the idea that re-
liability is an d-
e nd pro ble m. Th e arc hit ect ura l philosophy is simple: construct the
internet ·t en to-
I the exp ect ed loa d, but allo w individual 1inks or . [Link] to
so can handle le or no
Iose d ata or co rru pt it with out t ry1•ng to repeatedly recover. In fact, there 1s htt
r18b 1·r . net wo rk int erf ace layer software. Instead, the tran $pm :t layer
re •ty •n mo st TC P AP -
recovery problems.
handles mo st e'! or detection ahd er verification makes TC P/I P sof
tware
s ·freedo m fro m int erf ace lay
Th e ~ uit ing rectly. Intermediate routers can
discard
un der sta nd and im ple me nt cor
much <easter to transmission errors or tha t ean
no t be
be co me co ~p ted bec aus e of
d a ~ s tha t wh en the arrival rate exc eed s ma chi
ne capacity,
ey can dis car d dat agr am s
delivered. Th ut informing
ou te· dat itg ram s thr ou gh pat hs with ~horter or lon ger delay witho
an d can rer
the sou rce or des tin ati on . am s do no t arrive. De tec tio n and
ks me ~s - tha t· som e dat agr
Ha vin g un rel iab le .lin the sou rce ho st and the ultimate desti-
car rie d ou t bet we en
rec ov ery of da tag ram ,loss is ver ific ati on . Th e end -to -en d sof tw are loc ate
d
cal led en· d~t o-e nd
na tio n and, ·is, the ref 9re , no wl ed ge me nts ,an d timeouts to co n-
e~, :us es· che cks um s, ack .
in the TCP/IP tra nsp ort lay n-o rie nte d :X.25 pro toc ol lay eri ng , the •
/
lik e the "co ~n ect 1o
trol tra nsm iss ion . ··Thus, un
its reliability~control i~ on e lay er.
'TCP/IP so ftw are focuse~ mo st ~f , ..
d·D~cision Making
11~6.2 Locus of lntellig'encean
1
tw een the X.2 5 mo del and the TCPAP model emerges when
An oth er difference be
au tho rity and co ntr ol. As a .general ru l~ networks us ing
one considers the locus of that provides a transport service.
Th e
ide a tha t a,n etw ork is a uti lity
X.2 5 ad he re ta the acc ess and monitors tra ffi c to keep
vic e co ntr ols ne tw 0rk
vendor that offers the ser ork ve nd or als o ha nd les pro ble ms like
g. Th e ne tw
records ·.for ac co un tin g and billin int ern ally, making transfers reliable. This
ack no wl ed ge me nts
routirtg, flow control, an d
do . In short, the network is a complex,
le that the hosts can (or nee d to)
ves litt
1vJew lea nt,system to which one can attach relatively simple host computers; tlte hosts
independe
network operation.
(themselves participate minimally in the participate in almost all of the network proto-
to
. In contrast, 'ECPAP requires hosts ely im ple ment end-to-end error detec-
me ntion ed tha t ho sts a:ctiv
,- cols. We have already rou tin g because they must choose .a router
. Th ey also pa rticipa te in
tion and recovery ipa te in ne tw ork co ntrol because they must
d the y pa rtic
when sending datagrams, an mp are d to an X.25 network, a TCPAP
ssa ges. Th us, wh en co
handle ICMP control me et de liv ery system to which intelligent
as a rel ative ly sim ple pa ck
:~ internet can be viewed
.i ~(!~ts attach.
• ' I
·I
) If
4 ,,
187
':!flePn«[Link]
,1
17
• ,~';, ~- ·•, •
{ '(''
inciple
1( 7 Th 8. Pr ot oc ol Layering Pr
layers,
of the par tic ula r lay eri ng sch eme used or the functions of the
lnde~endent idea, called the
n of lay ere d pro toc ols is bas ed on a fundamental idea. Th e
the operatio
layering principle, can be sum
marized succinctly:
re-
ed pro toc ols are des ign ed so that layer n at the destination
La yer
sen t by lay er n at the source.
ceives exa ctl y the sam e object
a. It allows the
pri nc ipl e exp lai ns wh y layering is such a powerful ide
Th e lay eri ng
att ent ion on on e lay er at a tim e, without wo rry ing about how
protocol de sig ne r to focus en bu ild ing a file tra nsf er ap pli cat ion
, the
. Fo r ex am ple , wh
oth er layers perfonn pli cat ion pro gra m ex ecu tin g on tw o
co m-
ly tw o ·co pie s of the ap
de sig ne r co nsi de rs on the y need to ex ch an ge for file transf
er. Th e
tra tes on the me ssa ge s
pu ter s, and co nc en e host receives ex act ly the da ta
tha t the ap-
tha t the ap pli cat ion on on
de sig ne r ass um es
ds.
pli cat ion on the oth er ho st sen
layering pri nc ipl e works:
Fig ure 11.6 illustrates ·how the
, I
Ho ste
Ho st A
AppHcation..
Ap pli ca tio n. ,; 1/,
,'
I
----------
1-• ' i )I
· identical
·'•
message•\
II
tra ns po rt
Tr an sp ort • I
f'
'
----------
I
identical
packet
I I Int er ne t
·Internet,
identical
-----------., datagra") .
-- . - . .,..,
Ne tw or k·
.,
Ne tw or~· k
Int er fac e
Int er fac e
--- jratM
----
',
identical
-- -- -- -- --
1
..
Physical Ne t
t I
11.7.1 Layering In a TCPnP Internet Environmen
e, and the illustration in
. Our stat e~e nt of the layering principle is somewhat vagu distinguish between
use it fails to
Figu re 11.6 skim s ove r an important issue beca
transfers across multiple networks.
transfers from sour ce to ultimate destination and
of a message sent from an appli-
Fi~ure 11.7 illustrates the dist ~cti on, showing the path
her through a router.
cati on program on one host to an application on anot
network frames, one for
As the figure shows, message delivery uses two separate R to host B. The net-
from router
the tran smis sion from host A to router R, and another
d to R is identical to the frame sent
wor k layering principle states that the frame delivere
layers deal with end-to-end issues
by host A. By contrast, the [Link] transport
municates with its peer at the ulti-
and are desi gned so the software at the source com
s that the packet received by the
mat e destination. Thus, the layering principle state
to the packet sent by the transport
tran spor t laye r at the ultimate destination is identical
laye r at the original source.
HostB
HostA
identical Application
-- ---. -- --- ---- --- --
_ #
Apple Ilio n
I
identical • Transport
Tra nsp ort
pack et
,RouterR
'
Inte rnet
(
Inte rnet
Inte rnet
- - - -- datagram -- ....
identical
- - - identical
data gram
--- - -
I
mteme ~ the layering principle only applies to datagrams across single machine
transfers. To be accurate~ we should not view the Internet layer as providing end-to-end
service.
'
I .i
11.8 Laye ring In The Pr~sence•Of·Network Subs tructu re
~ecall from Chapte r 2 that some wide area networks contain multiple packet
switches. For example, a WAN can consist of routers that connect to a local network at
a
' each site as well as to oth~r routers using leased serial lines. When a router receives
clatawam, it either delivers the datag~am to .its destination on the local network, or
transfe rs the datagra m across a serial li~e to· ane~er
,,,,, touter. The question arises: ''H~w
do the protoco ls used on serial l~qe~ fit into the TCP/IP layering scheme ?'' The answer
depend s on how the designe r views the serial lip.e interconnections.
From the perspective of IP, the set of point-to-point connec tions among routers can
either function like a set of independent .physical networks, or they can functio n collec-
tively like a single physical network. In· the first ~ase, each physica l link is treated ex-
actly like any other networ k in t;he ,internet. The link is assigne d a unique network
number, and the two hosts that share the link each have a uriique IP address assigned
for their connecµont. Routes are ad<;fed to the IP routiqg table as they would be for any
other network. A new softwar~ module is added at the network interface layer to con-
trol the new link hardware, but no substantial changes are made to the layering scheme.
The main disadvantage of the independent network approach is that it proliferates net-
work numbers (one for each connection between two machines) and causes routing
t'flbles to be, larger than necessary. ·Both $!._riql Line IP (SLIP) and the Point to Point
Protocol (PPP) treat each serial link as a separate network.
-- '
The second approach to accommodating point-to-point connections avoids assign-
l
ing· ·multiple IP addresses to the physical wires. Instead, it treats all the connections col-
lectively as a single, independent IP network with its .own frame format, hardware ad-
dressing scheme, and data link protocols. Routers that use the second approach need
only one IP network number for all point-to-point connections.
Using the single network approach means extending the protocol layering scheme
to add a new intranetwork routing layer between the network interface layer and the
tlbe only exception arises when using the anonymous network scheme described in Chapter 10; leaving
the link unnumbered does not change the layering.
190
IP Module
• I
' Internet
Network
I
Interface Interface 1 Interface 2
'
Point-To-Point
'
Intranet (Intranet)
(a) (b)
The difference between an internet routing table and an •intranet routing table is
that intranet routing tables are quite small. They only contain routing information for
hosts directly attached to the point-to-point network. The reason is simple: the Internet
layer maps an arbitrary destination address to a specific router address before passing
r
Sec. 11.8 • I Layering lb The p
{. I I l"eSence or Network Su~ture
the· datagratn t . 1s1
• • '' o a network interface Th .
among ~achmes . enetwork.
on a single poinHo~point as ed only to distinguish
mtranet laye7is
, '. , I •
• ' . I ' I
,,
I
I
,• • • I
I ,' '.
J •
• I
•, , ,Hardware ..•
,.
'' ••••..• , ••• ~···••1
'•'.,
'·"••1•••\ • ) '
I I
• • I
.Figure 11 9
software th . • shows anoth ,
. at is geheral I .er important bound
not. WhtJe each imp! ary as well, the division betw
y considered Part of th
the. scheme hernentation of
follbw.
[Link]
ak
and
TcP/IP ch e system s o f t w a r e thaete.n
• • I
'sen ~ac pack~t across the internet. To optimize transfer, the tran-
I • , J
SPQrt l~yer sh~uld choose the larges,t: ~[Link],I~ Pa¢ket size that will allow one packet to
travel m one network frame. ,In. partic4,lil,r;tif:~e destillation machine attaches directly
to one of the same .netw~rks as the ,~o,urc'~, onl~hone physical net will involved in the be
traq~fer, so the sender c~ ·optimize :packet,1:1siz~ for that network. If the software
preserves strict layering, hc;>wever,. the···transpcirt layer cannot know how the Internet
rnodµJe will route traffic or·,.~hi<?h '·n,etworks attach directly. Furthermore, the transport
' layer will 1not understand 'the tlatagram dr fhu;n-e' formats nor 'will it be able to determine
1
·how .many octets of header·wiJI be added to a ~acket. Thus, strict layering will prevent
the transport layer from [Link] tran~fers .
Usually, implementors [Link] the strict layering scheme when building protocol
software. They allow information like route selection and network MTU to propagate
upward .• When: ~)locating buffers, they often leave space for headers that will be added
by lower layer protocols and may retain headers on incoming frames when passing them
to higher layer protocols. Such optimizations can ,make dramatic improvements in effi-
ciency while retaining the basic layered structure.
' I I
IP Module
ARP [Link]. RARPMoclule
' I
·[Link]~itiplexlng -ased
I 1 1 On. Ffit1n1t' typ
..
e
I
I
I
•
I II
•~ I
1,
., , I
I
j
l ,' ,f
'f
. ,,, '
,, . 'I ' ' I
I ' ,,, I·
am.·e·•· rv
1
1. 1 1
1 11
J i.
1 1,
'•: '
·"r ,,,',1,
,l I I. l I! ' ' ' .
~1., ' I '
'
.
Il I
; ,: '
., I 1
'
j f } \
,,
J
II
I
, I .,
\
I/•
I )
'
type field
o~f~~i'."fra~~s based' o~· the
) fl
,,
bem uit i~l e~i llg i·,, ~f; l~~
t I
' 'F igu re 11 .10 ·.-:.. t,11 .,.
fou nd in,
1he fraI me ,bea11' 11t~
l
• , i ·, , • 1' \
1
f
I
•
,•'!•~ '"
, .£.
• ,~ '
. . ·t
,, I l ' I '
I ' ''I/
so ~a re in ·~he
Th e ~g ur e ill us tra tes ho w tha t the network interface
1
transmission. Th us , each
1
IP Module
Pisiure [Link] De . .
DlUltiplcxmg at the Inte
prop nate J)roced met layer. IP software chooses an ap-
col
field in th udretato handle a datagram b~sed on the proto
e a gram heade r.
L
. i ..
l
!
Protocols ar~ the 'standards that spedify how data . is represented when being
I
specify how the transfer occurs
• transferred ,from one machine to another. !Protocols
passed. To simplify protocoi
ho~ errors '!1'e detected1. and how ackn?wledgements are segregated into subproblems
desi gn and 1mplementat1on, communication prob
lems are I
ned a separate protocol. •f
that, can [Link] independently. Each subproblem is assig a conceptual framework
The idea· of layering is' fundamental because it provides
les one part of the cQmmunica-
for protocol design. In a layered model? e3.9~ layer hand Protocots follow tbe layering
I
tion problem and •usually correspond~· to· C>tie protocol.
layer n on the destination
principle, which states that the software iqtplementing
layer n on the source machine
machine receives exactly what the software implementing
sends. well as the older ISO 7-layer
We examined the 5-layer Internet reference model as
only a conceptual frame-
reference model. In both cases, the layering mooel provides the ISO reference model
s follow
work fur protocol software. The ITU X.25 protocol
offered by a commercial util-
and• provide an example iof reliable communication service
a different ~aye~g sche~~- .
ity, ~bile the TCP/IP protocols provide an ex~ pl~ of demultiplexmg to dtstingwsh
Jn practice, protocol software uses multiplexmg and
protocol software more complex
among multiple protocols within a given layer, making
than the layering model suggests.
• I
.
I
- •.
-~~--:
,
/
I
~ '
~ - •
_/ j ~
V ,..,,._\ v~
-t& /
aJ1 ~'\A
,,Q,
C-
U4Q_.. a_
0- I d
1-
~;;;;:=
'
..
~- CL
--..
--..r
-~A
· ~
-
~
.
~,
'
~f-'- c S > .. _ ~
. L$AA : -
• ~o..cltik I
,
(V"-,,
:- r ,t L - t- .
4
\.
_
• ~v4Q.
;..
'~
--
~ "'"""~
I
I,
, I r
\
\
L~L
L~l
L~l
*i~.~~ •
---
J'
/ L·
lP M ~
• \f \__,
r I
7 (
:} . .
·,.,
\
.
r'\
'
6 /
I
j
.
; ' \
I
5· '\s~· l
\v.- ]
\
I