Ch07. Virtualization and Cloud Computing (PPT Slides)
Ch07. Virtualization and Cloud Computing (PPT Slides)
Ch07. Virtualization and Cloud Computing (PPT Slides)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
classroom use. 1 distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Virtualization (1 of 5) Virtualization (2 of 5)
• Virtualization
• A virtual, or logical, version of something rather than the actual, or physical, version
• Host
• Physical computer “hosting” a virtual machine
• Guest
• Each virtual machine
• Hypervisor
• Creates and manages a VM
• Manages resource allocation and sharing between a host and any of its guest VMs
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4
Virtualization (3 of 5) Virtualization (4 of 5)
• Two types of hypervisors: • A VM’s software and hardware characteristics are assigned when it is created in
• Type 1—Installs on a computer before any OS and is called a bare-metal hypervisor they hypervisor
• Type 2—Installs in a host OS as an application and is called a hosted hypervisor • You can customize the VM with:
• A guest OS
• Amount of memory
• Hard disk size
• Processor type and other options
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8
Network Connection Types (2 of 9) Network Connection Types (3 of 9)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10
• Bridged mode:
• vNIC accesses physical network using host machine’s NIC
• Obtains own IP address, default gateway, and netmask from DHCP server on physical
LAN
• VM appears to other nodes as just another client or server on the network
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12
Network Connection Types (6 of 9) Network Connection Types (7 of 9)
• NAT mode:
• vNIC relies on host machine to act as NAT device
• Obtains IP addressing information from host
• Hypervisor acts as a DHCP server
• Appropriate for VMs that do not need to be accessed at a known address by other
network nodes
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14
• Host-only mode:
• VMs on one host can exchange data with each other and the host
• Cannot communicate with nodes beyond the host
• Never receive or transmit data with host’s physical NIC
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16
Pros and Cons of Virtualization NFV (Network Functions Virtualization) (1 of 2)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20
SDN (Software-Defined Networking) (2 of 4) SDN (Software-Defined Networking) (3 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22
• Primary advantage to separating the control plane from the data plane • Internet is frequently pictured as a cloud
• To provide network technicians with more centralized control of network settings and • Cloud computing
management
• Flexible provision of data storage, applications, and services to multiple clients over a
• SDN creates the potential to implement more sophisticated network functions network
while using less-expensive devices • Cloud computing features:
• SDN architecture has been expanding to include management of network • On-demand service
resources hosted in places other than an organization’s own network
• Support for multiple platforms
• Resource pooling and consolidation
• Metered service
• Elastic services and storage
- Storage capacity can quickly or automatically be scaled up or down
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24
Cloud Computing (2 of 3) Cloud Computing (3 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28
Cloud Computing Categories (3 of 4) Cloud Computing Categories (4 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30
• Cloud services are delivered in a variety of deployment models • Potential risks and limitations:
• Public cloud • ISP’s uptime
• Service provided over public transmission lines • ISP-imposed bandwidth limitations
• Private cloud • Cloud provider’s uptime
• Service established on an organization’s own servers in its own data center • Cloud provider’s backup and security systems
• Community cloud • Misconfiguration that exposes one client’s data to another client
• Service shared between multiple organizations • Unauthorized access to data by cloud provider employees or illegitimate users
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32
Cloud Connectivity and Security (2 of 2) Encryption Protocols
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 34
• Key encryption can be separated into two categories: • Public key encryption:
• Private key encryption • Data encrypted using two keys
• Public key encryption • Private key: user knows
• Public key: anyone may request
• Public key server:
• Publicly accessible host
• Freely provides users’ public keys
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 35 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 36
Key Encryption (3 of 3) IPsec (Internet Protocol Security)
• Requires two different keys • IPsec creates secure connections in five steps:
• Digital certificate • IPsec initiation
• Holds identification information and the user’s public key • Key management
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 37 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 38
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) (1 of 2) SSL (Secure Sockets Layer) and TLS (Transport Layer Security) (2 of 2)
• Both are methods of encrypting TCP/IP transmissions • DTLS (Datagram Transport Layer Security)
• Including Web pages and data entered into Web forms • A variant of TLS
• Both protocols work side by side and are widely known as SSL/TLS or TLS/SSL • Designed specifically for streaming communications
• When a client and server establish a SSL/TLS connection, they establish a • Applications using DTLS must provide their own means of:
unique session • Packet reordering
• Association between client and server • Flow control
- Defined by agreement • Reliability assurance
- Specific set of encryption techniques
• DTLS includes security levels that are compatible to TLS
• Created by SSL handshake protocol
• DTLS is commonly used by delay-sensitive applications
• Handshake protocol
• Such as VoIP and tunneling applications
• Allows client and server to authenticate
• Similar to a TCP three-way handshake
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 39 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 40
Remote Access (1 of 4) Remote Access (2 of 4)
• Remote access:
• Service that allows a client to connect with and log on to a server, LAN, or WAN in a
different geographical location
• Requires a type of RAS (remote access server)
• Two types of remote access servers:
• Dedicated devices
• Software running on a server
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 42
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44
Point-to-Point Remote Access Protocols Terminal Emulation (1 of 7)
• An older protocol known as SLIP has been replaced by PPP as the preferred • Terminal emulation (remote virtual computing)
communications protocol for remote access point-to-point connections
• Allows a user on one computer to control another computer across a network
• PPP (Point-to-Point Protocol) connection
• A Data Link layer protocol that directly connects two WAN endpoints • Examples of command-line software:
• PPP can: • Telnet and SSH
• Negotiate and establish a connection between two computers • Examples of GUI-based software:
• Use an authentication protocol to authenticate a client to a remote system • Remote Desktop for Windows
• Support several types of Network layer protocols • join.me
• Encrypt the transmissions, although PPP encryption is considered weak by today’s • VNC
standards
• Team Viewer
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 45 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 46
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 47 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 48
Terminal Emulation (4 of 7) Terminal Emulation (5 of 7)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 49 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 50
• Relies on a dedicated connection between the network administrator’s computer and - TFTP (Trivial FTP)
each network device
• A remote management card is attached to the network device’s console port
- Or sometimes it is built into the device
• A single device, such as a console server or console router, provides centralized
management of all linked devices
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 51 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 52
VPNs (Virtual Private Networks) (1 of 6) VPNs (Virtual Private Networks) (2 of 6)
• VPN:
• A network connection encrypted from end to end that creates a private connection to
a remote network
• Sometimes referred to as a tunnel
• VPNs can be classified according to three models:
• Site-to-site VPN
• Client-to-site VPN
- Also called host-to-site VPN or remote-access VPN
• Host-to-host VPN
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 53 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 54
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 55 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 56
VPNs (Virtual Private Networks) (5 of 6) VPNs (Virtual Private Networks) (6 of 6)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 57 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 58
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 59 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 60
VPN Tunneling Protocols (3 of 4) VPN Tunneling Protocols (4 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 61 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 62
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 63 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 64
Chapter Summary (1 of 4) Chapter Summary (2 of 4)
• Virtualization is a virtual, or logical, version of something rather than the actual, • Cloud computing covers a broad range of services from hosting websites and
or physical, version database servers to providing virtual servers for collaboration or software
• VMs can go through a virtual switch on the host computer to reach the physical development
network and can communicate with physical or virtual routers, other network • Cloud computing service models are categorized by the type of services they
devices, and other hosts on the local or another network provide
• A bridged vNIC obtains its own IP address, default gateway, and subnet mask • Cloud services are delivered in a variety of deployment models, depending on
from a DHCP server on the physical LAN who manages the cloud and who has access to it
• NFV (Network Functions Virtualization) provides flexible, cost-saving options for • One way to reduce the inherent risks of cloud computing is to use encryption
many types of network devices • The most popular kind of encryption encodes the original data’s bits using a key,
• SDN (software-defined networking) is a centralized approach to networking or a random string of characters to scramble the data and generate a unique
that removes most of the decision-making power from network devices and consistently sized data block called ciphertext
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 65 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 66
• IPsec (Internet Protocol Security) is an encryption protocol suite that defines a • SSH (Secure Shell) is a collection of protocols that does both authentication and
set of rules for encryption, authentication, and key management for TCP/IP encryption
transmissions • RDP (Remote Desktop Protocol) is a Microsoft proprietary protocol used by
• SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are both methods Windows Remote Desktop and Remote Assistance client/server utilities to
of encrypting TCP/IP transmissions en route between the client and server connect to and control a remote computer
using public key encryption technology
• Three remote file access technologies related to FTP include FTPS, SFTP, and TF
• As a remote user, you can connect to a network and its resources via remote TP
access • A VPN is a network connection encrypted from end to end that creates a
• PPP (Point-to-Point Protocol) is a Data Link layer protocol that directly connects private connection to a remote network
two WAN endpoints
• Terminal emulation allows a user on one computer to control another
computer
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license © 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 67 distributed with a certain product or service or otherwise on a password-protected website for classroom use. 68