What is Virtualization? An Explanation
Most people are familiar with cloud computing - at the very least in its form as cloud storage. iCloud, Dropbox, and Google Drive are some of the most well-known cloud storage solutions, replacing the need for an external, physical extra hard-drive. Cloud computing is only as successful as it is, however, due to virtualization. All techniques used in cloud computing are based on IT-resource virtualization, which, simply put, is creating an equivalent for computing components such as software and networks, but without replicating their physical form. We will take a look the main uses of different virtualization types, and compare their advantages and disadvantages.
- What is Virtualization?
- Distinguishing between virtualization, simulation, and emulation
- How does virtualization work?
- Types of virtualization
What is Virtualization?
Virtualization is the process of creating a virtual version of physical computing components. Hardware and software components can be virtualized. An IT component created as part of virtualization technology is called a virtual or logical component, and can be used in the same way as its physical equivalent. Virtualization should be distinguished from the (partly very similar) concepts of simulation and emulation, and in order to understand what exactly virtualization is we will now look at the differences between virtualization, simulation and emulation.
Virtualization takes the essential functions of physical IT resources such as hardware, software, storage, and network components, and abstracts them into virtual forms of the same thing. The aim is to make these resources available virtually, and to be able distribute them to various customers flexibly, adhering to individual requirements. It should help optimize how IT resources are used.
Distinguishing between virtualization, simulation, and emulation
If you are familiar with virtualization technology, you’ll inevitably come across the terms simulation and emulation. These terms are often used synonymously but differ both from each other, and from the concept of virtualization.
- Simulation: Simulation is the complete simulation of a system using software. In this case, “complete” means not only imitating the functions in interaction with other systems, but also simulating all system components and their internal logic. Simulators are used to compile programs that were actually developed for a specific system for analysis purposes on another system. Simulation makes it possible to run software for old mainframes on modern computing platforms, for example. In contrast to emulation, simulation is not intended for practical use. A popular simulator is the iPhone Simulator in XCode. It is used to test the design of mobile websites on desktop computers.
- Emulation: While simulation aims to replicate systems, emulation provides the functions of hardware or software components, but not their internal logic. The aim of emulation is to achieve the same results with the simulated system, as with its real counterpart. In contrast to the simulator, an emulator can therefore completely replace the simulated system. A flight simulator that actually takes the pilot to the desired destination would therefore be a flight emulator. A prominent software project that fits this concept is the Android emulator in android studio.
Simulators and emulators are used in three scenarios:
- A hardware environment is simulated so that an operating system can be run that was actually developed for another processor platform.
- An operating system is simulated so that applications can be executed that were actually written for other systems.
- A hardware environment for outdated software must be simulated, since the original components are no longer available.
Emulators and simulators must be distinguished from software solutions that merely provide a compatibility layer to bridge incompatibilities between different hardware and software components. With this concept, not the entire system, rather only a part of a system is simulated - an interface, for example. Known examples are Wine and Cygwin.
Wine establishes a compatibility layer on POSIX-compatible operating systems (Linux, Mac, Solaris or BSD) that allow Windows programs to run. The software is based on a reconstruction of the non-public Windows source code. The reconstruction was not based on dismantling the copyrighted software, but on reverse engineering as part of black-box testing. Technically, Wine does not replicate the internal logic of the entire Windows operating system, but only the Windows API (Application Programming Interface). Windows software system calls are received by Wine, converted to POSIX calls without delay and forwarded to the underlying system.
How does virtualization work?
Virtualization is similar to simulation and emulation, but serves a different purpose. Simulators and emulators implement the software model of a computer system to bridge incompatibilities. The aim is to run applications on a system that it does not actually support. This approach has two disadvantages, in that emulation and simulation are very complex, and in addition, both approaches inevitably result in a loss in performance. Ideally, virtualization should therefore be designed in such a way that as little simulation or emulation as possible is required. Instead, virtualization technology is only intended to establish an abstraction layer that makes it possible to provide IT resources independent of their original physical form.
An example could be as follows: a user wants to run one or more virtual versions of Windows 7 on a Windows 7 computer for test purposes, and therefore virtualization software is needed. If the same user wants to run two virtual versions of Ubuntu on the same computer, then virtualization software is needed, so that it is possible to bridge the incompatibilities between the underlying Windows system and the Linux systems running on it by emulation.
Numerous software solutions used in virtualization contain emulators. In practice, therefore, the two concepts often overlap, but are nevertheless different.
Types of virtualization
The term “virtualization” was coined in the 1960s, and initially referred to the creation of virtual machines - essentially hardware virtualization. Today, modern IT contains various forms of virtualization that refer to the abstraction of IT resources such as software, storage, data or network components. A distinction is made between the following types of virtualization, each of which we will look at in closer detail:
- Hardware virtualization
- Software virtualization
- Storage virtualization
- Data virtualization
- Network virtualization
The term hardware virtualization refers to virtualization technology that makes it possible to provide hardware components using software regardless of their physical form. A good example of hardware virtualization is a virtual machine (VM for short).
A VM behaves like a physical machine including hardware and operating system. Virtual machines run as virtual guest systems on one or more physical systems called hosts. The abstraction layer between the physical basis and the virtual system is created by a so-called hypervisor during hardware virtualization.
A hypervisor (also called Virtual Machine Monitor, VMM) is software that allows multiple guest systems to run on one host system. There are two types of hypervisors: A Type 1 hypervisor is based directly on the hardware of the host system. Hypervisors of this type are called bare metal hypervisors. Type 2 hypervisors, on the other hand, run in the host’s operating system and use the device drivers provided by the system to access the hardware. This is called a hosted hypervisor.
Hypervisors manage the hardware resources provided by the host system such as CPU, RAM, hard disk space and peripherals and distribute them to any number of guest systems. This can be done via full virtualization or para-virtualization.
- Full virtualization: In full virtualization, the hypervisor creates a complete hardware environment for each virtual machine. Each VM thus has its own contingent of virtual hardware resources assigned by the hypervisor, and can run applications on this basis. The physical hardware of the host system, on the other hand, remains hidden from the guest operating system. This approach allows the operation of unmodified guest systems. Popular full virtualization software solutions include Oracle VM VirtualBox, Parallels Workstation, VMware Workstation, Microsoft Hyper-V and Microsoft Virtual Server.
- Para-virtualization: While full virtualization provides a separate virtual hardware environment for each VM, the hypervisor provides only a programming interface (API) for para-virtualization, allowing the guest operating systems to directly access the physical hardware of the host system. Para-virtualization thus offers a performance advantage compared to full virtualization. However, this requires that the kernel of the guest operating system has been ported to the API. This means that only modified guest systems can be paravirtualized. Providers of proprietary systems - such as Microsoft Windows - generally do not allow such modifications. Hypervisors that enable paravirtualization include Xen and Oracle VM Server for SPARC. The concept is also used in IBM’s mainframe operating system z/VM.
For the end user, the virtual machine is indistinguishable from a physical machine. Hardware virtualization is therefore the concept of choice when it comes to providing a variety of virtual servers for different users based on a powerful computing platform - the basis of the popular shared hosting model.
In shared hosting a hosting provider operates and maintains the physical machine in an optimized data center and provides its customers with virtualized hardware resources as closed guest systems.
Another use for hardware virtualization is server consolidation in the corporate environment. Virtualization is used with the aim of increasing the utilization of server hardware. Hardware components such as processors are expensive to purchase. To prevent expensive CPU resources from remaining unused, companies avoid IT systems in which separate computing machines are used for different server applications. Instead, different servers are operated as separate guest systems on the same hardware platform. This has three main advantages:
- Improved server processor utilization
- Effective distribution of storage media
- Lower power consumption for operation and cooling
This approach is particularly efficient when the servers operate with staggered performance peaks. However, if the host system hardware is used by all guest systems simultaneously, it must be ensured that sufficient resources are available for all workloads. Otherwise, a resource-intensive application in one virtual machine could reduce the performance of other applications in other VMs on the same host system.
Server consolidation is one of the main applications of hardware virtualization in the enterprise context. The operation of virtual machines is therefore also referred to as server virtualization.
Hardware virtualization is considered a comparatively secure virtualization type. Each guest system runs in an isolated virtual hardware environment. If one of the guest systems is infiltrated by hackers, or its functions are affected by malware, this usually has no influence on other guest systems on the same host system. An exception are attacks where hackers exploit vulnerabilities in the hypervisor software to gain access to the underlying host system. This is called a virtual machine escape. How secure virtual machine operation is always depends on the virtualization software and how quickly vulnerabilities are detected and closed.
Recently, hardware virtualization has been faced with strong competition from other virtualization concepts. One reason for this is the so-called overhead of virtual machines. Container technology, for example - a form of software virtualization - does not require a hypervisor. Operating system virtualization, where applications run in isolated containers, is therefore much more resource-efficient. Containers, however, offer a significantly lower degree of isolation compared to VMs. It is therefore unlikely that one virtualization technology will completely replace the other.
Advantages and disadvantages of hardware virtualization:
✔ Server consolidation allows hardware resources to be allocated dynamically and used more efficiently.
✘ Simulating a hardware environment including the operating system leads to an overhead.
✔ Consolidated hardware is more energy efficient than separate computers.
✘ The performance of a virtual machine can be affected by other VMs on the same host system.
✔ VMs offer a comparatively high degree of isolation and thus security for workload isolation.
Common approaches of software virtualization technology are:
- Application virtualization
- Desktop virtualization
- Operating system virtualization
Application virtualization is the abstraction of individual applications from the underlying operating system. Application virtualization systems such as VMware ThinApp, Microsoft App-V, or Citrix XenApp allow programs to run in isolated runtime environments and distribute across different systems without requiring changes to local operating or file systems and the respective registry.
For example, when using VMware ThinApp, Windows Installer package files (such as MSI files) of complex programs can be converted to standalone EXE files. These include all libraries and configuration files needed to run the application on any Windows operating system environment.
Application virtualization is suitable for local use, and protects the underlying operating system from possible malware. Alternatively, virtualized applications can be provided on a server to multiple clients on the network. In this case, users can access virtualized applications via application streaming, for example. The desired application including all dependencies from the server is copied to the respective client device and run there in an isolated runtime environment - without the software having to be installed on the target system.
The goal of application virtualization is to separate programs from the operating system so that they can be easily ported and centrally maintained. In a business context, this is useful for providing office applications such as word, for example.
Advantages and disadvantages of application virtualization:
✔ Application software can be provided, managed and maintained centrally.
✘ Applications that are tightly integrated with the operating system or require access to specific device drivers cannot be virtualized.
✔ By isolating the application, the underlying system is protected against malware.
✘ Application virtualization raises licensing issues.
✔ The software can be completely removed from the system.
Desktop virtualization is a concept in which desktop environments can be centrally provided and accessed via a network. This approach is primarily applied business contexts.
Modern companies usually provide their office employees with their own workstation including a PC. Each of these stand-alone computers must be set up and maintained. Local administration, however, is time-consuming.
Desktop virtualization is based on a client-server structure. Data transfer between server and client takes place via so-called remote display protocols. Depending on where the computing power is used to provide a virtual desktop, a distinction is made between host and client-based approaches.
- Host-based desktop virtualization: Host-based desktop virtualization includes all approaches that run virtual desktops directly on the server. With this type of desktop virtualization, the entire computing power for providing the desktop environment and for operating applications is provided by the server hardware. Users access host-based virtual desktops with any client device over the network. Fully equipped PCs or notebooks (thick clients), end devices with reduced hardware (thin clients) or completely minimalized computers (zero clients) as well as tablets and smartphones can be used. Usually a permanent network connection is required. Host-based desktop virtualization can be implemented using the following approaches:
- Host-based virtual machine: With this virtualization approach, each user connects to their own virtual machine on the server via a client device. A distinction is made between persistent desktop virtualization, in which a user connects to the same VM at each session, and non-persistent approaches, in which virtual machines are assigned randomly. When host-based virtual machines are used in desktop virtualization, they are called Virtual Desktop Infrastructure (VDI). Persistent host-based VMs offer users a large scope for individualization. Virtual desktops deployed as part of this approach can be personalized like local desktops with custom applications and custom display options.
- Terminal service: If the client is only used as a display device for centrally hosted desktop environments, it is referred to as terminal services or presentation virtualization. These are provided by a so-called terminal server. This approach of host-based desktop virtualization offers users only minimal scope for individualization and is therefore suitable for scenarios in which a large number of standardized workstations with limited functions are to be made available. Terminal services are used in retail, for example. Here, thin clients allow employees to check stock levels and retrieve product information. Customers use terminals of this type to individually configure goods and place orders.
- Blade servers: If users need to remotely access separate physical machines, this is usually done using a blade server. This is a modular server or server housing containing several single-board computers - so-called blades. In desktop virtualization, each desktop environment runs on a separate blade. The advantage of this approach is that server blades are stand-alone physical calculating machines, but share the power and cooling facilities of the housing, and are managed centrally.
- Client-based desktop virtualization: If desktop virtualization works well in client-based form, the resources for operating the desktop environment must be provided by the respective client device. This approach therefore requires a thick client with appropriate hardware. In practice, client-based desktop virtualization is implemented using virtual machines or as OS streaming.
- Client-based virtual machines: With this approach to virtualization, the desktop environment runs in a virtual machine on the client device. A hypervisor is usually used. Each virtual desktop synchronizes at regular intervals with an operating system image on the server. This enables centralized management and image-based backup cycles. Another advantage of this virtualization approach is that applications are available locally even if the connection to the server is interrupted.
- OS streaming: During OS streaming, the operating system of the desktop environment runs on the local hardware. Only the boot process takes place remotely. OS streaming is therefore suitable when entire desktop groups are to be provided on the basis of a single operating system. This has the advantage that administrators only need to manage one image on the server to make adjustments on all streamed desktops. OS streaming works without a hypervisor. However, it requires a constant network connection between the server and the client device.
Desktop virtualization has a big advantage primarily due to its centralized administration, meaning that administrative and maintenance costs can be significantly reduced, especially in standardized work environments.
Desktop virtualization requires powerful servers. Depending on the virtualization approach, high bandwidth is also required for data transfer in the network. As a result of the associated acquisition costs, desktop virtualization often only pays off in the long run.
Advantages and disadvantages of desktop virtualization
✔ Desktop virtualization enables central administration of desktop environments.
✘ Desktop virtualization is primarily suitable for homogeneous infrastructures.
✔ Users can access their virtual desktop from a variety of devices.
✘ Some approaches require a constant network connection.
✔ Desktop virtualization enables centralized back-ups.
✘ High demands on server performance, storage capacity and network bandwidth.
✔ Thin clients enable cost savings in acquisition and operation.
Operating system virtualization
Operating system virtualization concepts use native kernel functions of unix operating systems. Unlike hardware virtualization, no complete guest system including the kernel is simulated. Instead, virtualized applications share the kernel of the host system – its operating system.
Modern operating systems distinguish between two virtual memory areas for security reasons - kernel space and user space. While processes used to run the kernel and other core components run in kernel space, the user space is available to user applications. On unix operating systems, it is possible to execute several virtual user space instances in parallel. This feature is the basis of operating system virtualization.
Each user space represents a self-contained virtual runtime environment, which is called a container, partition, virtualization engine (VE) or jail, depending on the technology used.
User space instances are virtualized using native chroot mechanisms that provide all unixoid operating systems. Chroot (short for “change root”) is a system call that allows you to change the root directory of a running process. Processes that are stored in a virtual root directory can only access files within this directory if implemented correctly. However, chroot alone does not encapsulate processes sufficiently. Although the system call provides basic virtualization functions, it was never intended as a concept for securing processes. Container technologies therefore combine chroot with other native kernel functions such as groups and namespaces to provide processes with an isolated runtime environment with limited access to hardware resources. This is called containerized processes.
- Cgroups: Cgroups are resource management control groups that allow processes to limit access to hardware resources.
- Namespaces: Namespaces are namespaces for system and process identification, interprocess communications (IPCs), and network resources. Namespaces can be used to restrict a process and its child processes to a desired section of the underlying system.
A software container contains an application including all dependencies such as libraries, utilities or configuration files. Applications can then be transferred from one system to another without further adaptations. The container approach therefore shows its strengths in providing applications in the network.
If containers are used in the context of microservice architectures, users also benefit from high scalability. In microservice architectures, complex applications are realized through the interaction of independent processes - for example in a separate container. This is called a multi-container app. This kind of software structure has several advantages. Firstly, microservices facilitate the deployment of applications in server clusters, since containerized processes can be executed on the same system or distributed across different systems as needed. Secondly, each microservice can be scaled individually. Users simply start another instance of the respective microservice in a new container.
Central cluster managers and orchestration tools are used to manage microservice architecture. A selection of the most popular container tools can be found in this article: the Docker-Ecosystem.
Compared to hardware virtualization, container technology is characterized by having minimal virtualization “shrinkage”. The overhead of the hypervisor software is removed, and while each VM requires its own operating system to be virtualized, container technology allows several thousand microservices to run in isolated runtime environments on the same operating system.
Advantages and disadvantages of operation system virtualization:
✔ Operating system level virtualization concepts do not require a hypervisor and are therefore associated with minimal virtualization shrinkage.
✘ Virtualization at the operating system level is geared towards microservice architectures. Container technology loses advantages (for example in terms of scalability) when operating monolithically structured applications.
✔ When containers are used in applications based on a combination of different microservices, users benefit from high scalability.
✘ Unlike VMs, containers run directly in the kernel of the host operating system. This requires certain technical conditions. These dependencies limit the portability of containers: Linux containers cannot run on Windows systems without emulation.
✔ Containers can be provided immediately without complex installation processes.
✘ Containers offer significantly less insulation than VMs. Container virtualization is therefore not suitable for implementing security concepts.
✔ Software can be completely removed.
✔ A large number of prefabricated containers are available online for the most important platforms.
Storage virtualization aims to virtually map a company’s various storage resources such as hard drives, flash memory or tape drives and make them available as a coherent storage pool. A virtualization solution establishes an abstraction layer between the various physical storage media and the logical level at which the combined storage resources can be managed centrally using software.
Virtual memory can also be divided into contingents and allocated to selected applications. Users can access stored data via the same file paths even when the physical location changes despite virtualization. This is ensured by an assignment table managed by the virtualization software. This is known as mapping the physical storage media to a logical disk (also called volumes).
Logical drives are not bound to the physical capacity limits of the underlying individual storage media. Storage virtualization thus offers significantly more flexibility in the allocation of storage resources. The hardware available for data storage can be used more effectively. For companies, this means that storage capacities in data centers can be provided more cost-effectively.
In business contexts, storage virtualization is usually implemented block-based. In block storage, data is divided into blocks of the same size. Each data block has a unique address. This is stored by the virtualization software in the central mapping table. The assignment table therefore contains all metadata required to locate the physical location of a data block. This mapping makes it possible to manage data virtually, independent of the respective controller of the physical storage medium and therefore possible to move, copy, mirror or replicate it.
In practice, block-based virtualization can be implemented using three different approaches:
- Host based
- Device based
- Network based
Host based virtualization
Host based virtualization of storage resources is an approach to storage virtualization that is typically used in combination with virtual machines. In this concept, a host system presents one or more guest systems (see hardware virtualization) with virtual disks on an abstraction level, which is implemented either by an internal operating system volume manager, or by separate software (a so-called storage hypervisor). Access to the hardware (hard disks and other storage media) is via the device drivers of the host system. The volume manager or storage hypervisor is used as a software layer above the device drivers and manages input and output (I/O), I/O mapping tables and metadata search.
Native functions that make it possible to create virtual drives are available in almost all modern operating systems.
- Windows: Logical Disk Manager (LDM)
- macOS: CoreStorage (from OS X Lion onwards)
- Linux: Logical Volume Manager (LVM)
- Solaris and FreeBSD: zPools of the Z File Systems (ZFS) file system
Host-based storage virtualization requires no additional hardware, supports any storage device and can be implemented with little effort. In addition, the approach offers the best performance compared to other concepts, since each storage device is addressed immediately and thus without latency time. However, users have to accept that storage virtualization - and thus the possibility of optimizing storage utilization - is limited to the respective host.
Device based virtualization
Disk arrays - mass storage devices that can be used to provide hard disks in the network - also offer the possibility of virtualizing storage resources. So-called RAID schemes are used here. For RAID (short for: Redundant Array of Independent Disks) is a concept of data storage in which several physical drives are combined into a virtual storage platform. The goal of storage virtualization is reliability through redundancy. For this purpose, the data is mirrored in a disk array and distributed to different hard disks.
Further information about disk arrays and RAID schemes can be found in our article on Network Attached Storage (NAS).
Modern disk arrays also offer the ability to connect other storage devices and thus combine and centrally manage the storage resources of multiple disk arrays on a virtual level. The storage controllers of the connected storage devices are subordinated to a primary controller, which takes over the central administration of the mapping table, and the forwarding of I/O requests.
Device-based storage virtualization also offers good performance due to low I/O latency. Apart from the disk arrays to be merged, no other hardware components are required. However, in order to be able to integrate external memory, these devices must have the appropriate interfaces. Data migration or replication across different systems may fail because many manufacturers of storage devices rely on proprietary protocols. It should also be noted that the primary storage controller can bottleneck under heavy use.
Network based virtualization
Network-based storage virtualization is particularly useful if storage resources of heterogeneous systems are to be combined into a virtual storage pool. In business contexts, this approach is usually used as part of a Storage Area Network (SAN).
The core component of network-based storage virtualization is a central network device (such as a switch) that establishes the abstraction layer between the physical storage media of the embedded systems, and the virtual storage contingent, which takes over metadata mapping and redirects I/O requests. Virtualization devices of this type are now implemented directly in the data path using an “in-band method” (symmetrical virtualization). In this case, all I/O requests pass the virtualization device. There is no direct interaction between the requesting host and the physical storage device. Therefore, no special drivers for the storage hardware must be available on the host.
Symmetric virtualization contrasts with asymmetric virtualization (also out-of-band) of storage resources. In this case, the virtualization device merely functions as a metadata server that provides information about where a requested data block is located. This is followed by a direct I/O request to the storage device.
The biggest advantage of the network-based approach is that storage resources of heterogeneous systems can be managed from a central interface. If network-based storage virtualization is implemented using the out-of-band method, host-side special software must be implemented for accessing the storage devices available in the SAN. The in-band method does without such software, but is more complex to implement and usually associated with a higher I/O latency.
Well-known vendors of storage virtualization solutions are EMC, HP, IBM, LSI and Oracle.
Advantages and disadvantages of storage virtualization:
✔ Physical storage resources are used more effectively.
✘ Central mapping tables create a single, easily targeted weak point.
✔ The use of storage resources is not bound to the physical limits of the underlying storage media.
✘ Storage virtualization is always associated with an overhead resulting from the need to generate and process metadata.
✔ Physical storage resources combined into a logical drive can be managed centrally.
✘ Processing I/O requests can become a bottleneck that slows down the entire storage system during heavy use.
✔ Physical storage resources can be expanded and restructured independently of the virtual storage pool.
Data virtualization combines different virtualization approaches in the context of Data-Warehouse-Analysen, which aim at providing applications with access to data abstracted from physical conditions.
Data virtualization is therefore a type of information integration that differs from classical methods such as the ETL process in that an abstraction layer is established between the physical data sources and the virtual representation of the data.
ETL (Extract, Transform, Load) is used for information integration in order to extract data from differently structured sources and merge them in a uniform form in a target database. Data virtualization also allows data to be read and manipulated from different sources, but physically remains in place (unlike ETL). Data virtualization software solutions thus integrate data on a virtual level only and provide real-time access to the physical data source.
With data virtualization technologies, data distributed across multiple data warehouses, data marts, or data lakes can be effectively merged without the need to create a new physical data platform. This primarily reduces the storage space required for analyzing large amounts of data. In addition, less data has to be transmitted over the network. The virtual image of the entire data stock can be made available to various applications. Business Intelligence (BI) provides self-service tools for reporting and analysis without the need to work with IT professionals.
Leading providers of this kind of virtualization technology include Denodo, TIBCO, IBM and Informatica.
Advantages and disadvantages of data virtualization:
✔ The storage requirement for physical data copies is reduced.
✘ In contrast to the data warehouse approach, data virtualization is not suitable for recording and maintaining historical snapshots of a database.
✔ Time-consuming data extraction (e.g. via ETL) is no longer necessary.
✔ New data sources can be connected via self-service BI tools without any technical knowledge.
✔ Virtualized data can be processed with a variety of data management tools.
Network virtualization comprises various approaches in which network resources at hardware and software level are abstracted from their physical basis. This type of virtualization technology is usually used in security tech. There are two main goals:
- Physical network resources should be combined into a logical unit by means of virtualization.
- Physical network resources should be divided into different virtual units by means of virtualization.
An illustrative example of network virtualization is the Virtual Private Network (VPN). A VPN is a virtual network based on a physical network. In practice, VPNs are used to establish secure connections over unsecure lines - for example, if an employee wants to access a company’s private network outside of the office.
As a public network, the internet does not enable a secure connection between two computers. To ensure the confidentiality of data during transmission, it is therefore advisable to use virtualization. Various software manufacturers offer virtualization solutions with which virtual networks can be abstracted from physical networks and secured using encryption and authentication methods. Data transmission from one computer to another takes place in a private network, also known as a tunnel.
Another example of network virtualization are so-called Virtual Local Area Networks (VLANs). VLANs are virtual subnetworks based on a physical computer network. VLANs are realized via hardware components such as virtualizing switches or routers. Devices connected to a VLAN can only communicate with devices in the same VLAN. There is no data connection to devices in other VLANs, even if all devices are on the same physical network. Network virtualization thus offers the possibility of providing, managing and allocating network resources on a virtual level regardless of physical conditions.
One concept that allows virtual network resources to be centrally controlled without having to manually access physical network components is Software-Defined Networking (SDN). SDN is based on the separation of the virtual control plane from the physical network plane responsible for forwarding the data packets (Data Plane). The core component of the Control Plane is a network controller. This manages the network components of the Data Plane such as routers and switches and controls how data packets are forwarded The network controller is responsible for network management, routing specifications, access rights and the implementation of security concepts. Data Plane network components receive instructions from the network controller, and are responsible for transporting the data packets to the desired receiving device.
Advantages and disadvantages of network virtualization:
✔ Cost savings through multiple use of the physical network infrastructure.
✘ Running multiple virtual subnets on a physical network requires powerful hardware components.
✔ Virtual network resources can be centrally managed, easily scaled and dynamically allocated.
✘ A redundant physical network infrastructure may be required to ensure resilience.
✔ Network virtualization offers various approaches with which security concepts at network level can be implemented on the software side and thus more cost-effectively.