Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP3

Total Page:16

File Type:pdf, Size:1020Kb

Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP3 SUSE Linux Enterprise Server 15 SP3 Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP3 This guide describes virtualization technology in general. It introduces libvirt—the unied interface to virtualization—and provides detailed information on specic hypervisors. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents Preface xvii 1 Available documentation xvii 2 Improving the documentation xvii 3 Documentation conventions xviii 4 Support xx Support statement for SUSE Linux Enterprise Server xx • Technology previews xxi I INTRODUCTION 1 1 Virtualization technology 2 1.1 Overview 2 1.2 Virtualization benefits 2 1.3 Virtualization modes 3 1.4 I/O virtualization 4 2 Virtualization scenarios 6 2.1 Server consolidation 6 2.2 Isolation 7 2.3 Disaster recovery 7 2.4 Dynamic load balancing 7 3 Introduction to Xen virtualization 8 3.1 Basic components 8 3.2 Xen virtualization architecture 9 iii Virtualization Guide 4 Introduction to KVM virtualization 11 4.1 Basic components 11 4.2 KVM virtualization architecture 11 5 Virtualization tools 13 5.1 Virtualization console tools 13 5.2 Virtualization GUI tools 14 6 Installation of virtualization components 18 6.1 Specifying a system role 18 6.2 Running the yast2-vm module 19 Installing KVM 19 • Installing Xen 19 6.3 Patterns 20 6.4 Installing UEFI support 20 6.5 Enable nested virtualization in KVM 22 7 Virtualization limits and support 24 7.1 Architecture support 24 KVM hardware requirements 24 • Xen hardware requirements 25 7.2 Hypervisor limits 25 KVM limits 26 • Xen limits 26 7.3 Supported host environments (hypervisors) 27 7.4 Supported guest operating systems 28 Availability of paravirtualized drivers 29 7.5 Supported VM migration scenarios 30 Offline migration scenarios 30 • Live migration scenarios 32 7.6 Feature support 34 Xen host (Dom0) 34 • Xen paravirtualized guest (DomU) 35 • Fully virtualized guest 36 iv Virtualization Guide 7.7 Nested virtualization 37 II MANAGING VIRTUAL MACHINES WITH libvirt 38 8 Starting and stopping libvirtd 39 9 Preparing the VM Host Server 41 9.1 Configuring networks 41 Network bridge 41 • Virtual networks 45 9.2 Configuring a storage pool 55 Managing storage with virsh 57 • Managing storage with Virtual Machine Manager 63 10 Guest installation 69 10.1 GUI-based guest installation 69 Configuring the virtual machine for PXE boot 71 10.2 Installing from the command line with virt-install 72 10.3 Advanced guest installation scenarios 75 Memory ballooning with Windows guests 75 • Including add-on products in the installation 75 11 Basic VM Guest management 77 11.1 Listing VM Guests 77 Listing VM Guests with Virtual Machine Manager 77 • Listing VM Guests with virsh 78 11.2 Accessing the VM Guest via console 78 Opening a graphical console 78 • Opening a serial console 80 11.3 Changing a VM Guest's state: start, stop, pause 81 Changing a VM Guest's state with Virtual Machine Manager 82 • Changing a VM Guest's state with virsh 82 11.4 Saving and restoring the state of a VM Guest 83 Saving/restoring with Virtual Machine Manager 84 • Saving and restoring with virsh 85 v Virtualization Guide 11.5 Creating and managing snapshots 85 Terminology 85 • Creating and managing snapshots with Virtual Machine Manager 86 • Creating and managing snapshots with virsh 88 11.6 Deleting a VM Guest 90 Deleting a VM Guest with Virtual Machine Manager 90 • Deleting a VM Guest with virsh 91 11.7 Migrating VM Guests 91 Migration requirements 91 • Migrating with Virtual Machine Manager 93 • Migrating with virsh 94 • Step-by-step example 96 11.8 Monitoring 98 Monitoring with Virtual Machine Manager 98 • Monitoring with virt- top 99 • Monitoring with kvm_stat 100 12 Connecting and authorizing 102 12.1 Authentication 102 libvirtd authentication 103 • VNC authentication 107 12.2 Connecting to a VM Host Server 111 “system” access for non-privileged users 112 • Managing connections with Virtual Machine Manager 113 12.3 Configuring remote connections 114 Remote tunnel over SSH (qemu+ssh or xen+ssh) 115 • Remote TLS/SSL connection with x509 certificate (qemu+tls or xen+tls) 115 13 Advanced storage topics 123 13.1 Locking disk files and block devices with virtlockd 123 Enable locking 123 • Configure locking 124 13.2 Online resizing of guest block devices 125 13.3 Sharing directories between host and guests (file system pass- through) 126 13.4 Using RADOS block devices with libvirt 127 vi Virtualization Guide 14 Configuring virtual machines with Virtual Machine Manager 128 14.1 Machine setup 129 Overview 129 • Performance 130 • Processor 131 • Memory 132 • Boot options 134 14.2 Storage 134 14.3 Controllers 136 14.4 Networking 137 14.5 Input devices 139 14.6 Video 140 14.7 USB redirectors 142 14.8 Miscellaneous 142 14.9 Adding a CD/DVD-ROM device with Virtual Machine Manager 143 14.10 Adding a floppy device with Virtual Machine Manager 144 14.11 Ejecting and changing floppy or CD/DVD-ROM media with Virtual Machine Manager 145 14.12 Assigning a host PCI device to a VM Guest 146 Adding a PCI device with Virtual Machine Manager 146 14.13 Assigning a host USB device to a VM Guest 147 Adding a USB device with Virtual Machine Manager 147 15 Configuring virtual machines with virsh 149 15.1 Editing the VM configuration 149 15.2 Changing the machine type 150 15.3 Configuring hypervisor features 151 15.4 Configuring CPU 152 Configuring the number of CPUs 152 • Configuring the CPU model 154 vii Virtualization Guide 15.5 Changing boot options 155 Changing boot order 156 • Using direct kernel boot 156 15.6 Configuring memory allocation 157 15.7 Adding a PCI device 158 PCI Pass-Through for IBM Z 161 15.8 Adding a USB device 162 15.9 Adding SR-IOV devices 163 Requirements 163 • Loading and configuring the SR-IOV host drivers 164 • Adding a VF network device to a VM Guest 167 • Dynamic allocation of VFs from a pool 170 15.10 Listing attached devices 171 15.11 Configuring storage devices 172 15.12 Configuring controller devices 173 15.13 Configuring video devices 175 Changing the amount of allocated VRAM 175 • Changing the state of 2D/3D acceleration 175 15.14 Configuring network devices 176 Scaling network performance with multiqueue virtio-net 176 15.15 Using macvtap to share VM Host Server network interfaces 177 15.16 Disabling a memory balloon device 178 15.17 Configuring multiple monitors (dual head) 179 15.18 Crypto adapter pass-through to KVM guests on IBM Z 180 Introduction 180 • What is covered 180 • Requirements 180 • Dedicate a crypto adapter to a KVM host 181 • Further reading 183 16 Managing virtual machines with Vagrant 184 16.1 Introduction to Vagrant 184 Vagrant concepts 184 • Vagrant example 185 viii Virtualization Guide 16.2 Vagrant boxes for SUSE Linux Enterprise 185 16.3 Further reading 186 17 Xen to KVM migration guide 187 17.1 Migration to KVM using virt-v2v 187 Introduction to virt-v2v 187 • Installing virt-v2v 188 • Preparing the virtual machine 188 • Converting virtual machines to run under KVM managed by libvirt 189 • Running converted virtual machines 194 17.2 Xen to KVM manual migration 194 General outline 194 • Back up the Xen VM Guest 195 • Changes specific to paravirtualized guests 195 • Update the Xen VM Guest configuration 198 • Migrate the VM Guest 202 17.3 More information 203 III HYPERVISOR-INDEPENDENT FEATURES 204 18 Disk cache modes 205 18.1 Disk interface cache modes 205 18.2 Description of cache modes 205 18.3 Data integrity implications of cache modes 207 18.4 Performance implications of cache modes 208 18.5 Effect of cache modes on live migration 208 19 VM Guest clock settings 209 19.1 KVM: using kvm_clock 209 Other timekeeping methods 210 19.2 Xen virtual machine clock settings 210 20 libguestfs 211 20.1 VM Guest manipulation overview 211 VM Guest manipulation risk 211 • libguestfs design 212 ix Virtualization Guide 20.2 Package installation 212 20.3 Guestfs tools 213 Modifying virtual machines 213 • Supported file systems and disk images 213 • virt-rescue 214 • virt-resize 214 • Other virt-* tools 216 • guestfish 218 • Converting a physical machine into a KVM guest 219 20.4 Troubleshooting 221 Btrfs-related problems 221 • Environment 222 • libguestfs-test- tool 222 20.5 More information 222 21 QEMU guest agent 223 21.1 Running QEMU GA commands 223 21.2 virsh commands that require QEMU GA 223 21.3 Enhancing libvirt commands 224 21.4 More information 225 22 Software TPM emulator 226 22.1 Introduction 226 22.2 Prerequisites 226 22.3 Installation 226 22.4 Using swtpm with QEMU 226 22.5 Using swtpm with libvirt 228 22.6 TPM measurement with OVMF
Recommended publications
  • QEMU Version 4.2.0 User Documentation I
    QEMU version 4.2.0 User Documentation i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 Features :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 QEMU PC System emulator ::::::::::::::::::: 2 2.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Quick Start::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.3 Invocation :::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.3.1 Standard options :::::::::::::::::::::::::::::::::::::::::: 3 2.3.2 Block device options :::::::::::::::::::::::::::::::::::::: 12 2.3.3 USB options:::::::::::::::::::::::::::::::::::::::::::::: 23 2.3.4 Display options ::::::::::::::::::::::::::::::::::::::::::: 23 2.3.5 i386 target only::::::::::::::::::::::::::::::::::::::::::: 30 2.3.6 Network options :::::::::::::::::::::::::::::::::::::::::: 31 2.3.7 Character device options:::::::::::::::::::::::::::::::::: 38 2.3.8 Bluetooth(R) options ::::::::::::::::::::::::::::::::::::: 42 2.3.9 TPM device options :::::::::::::::::::::::::::::::::::::: 43 2.3.10 Linux/Multiboot boot specific ::::::::::::::::::::::::::: 44 2.3.11 Debug/Expert options ::::::::::::::::::::::::::::::::::: 45 2.3.12 Generic object creation :::::::::::::::::::::::::::::::::: 54 2.3.13 Device URL Syntax ::::::::::::::::::::::::::::::::::::: 66 2.4 Keys in the graphical frontends :::::::::::::::::::::::::::::::: 69 2.5 Keys in the character backend multiplexer ::::::::::::::::::::: 69 2.6 QEMU Monitor ::::::::::::::::::::::::::::::::::::::::::::::: 70 2.6.1 Commands :::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • How to Configure the NFX250
    How to Configure the NFX250 Published 2021-07-12 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. How to Configure the NFX250 Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. iii Table of Contents About This Guide | ix 1 Overview NFX250 Overview | 2 JDM
    [Show full text]
  • The X-Bone & Its Virtual Internet Architecture
    The X-Bone & its Virtual Internet Architecture 10 Years Later Joe Touch, Greg Finn, Lars Eggert, Amy Hughes and Yu-Shun Wang Workshop on Overlay and Network Virtualization 16th GI/ITG Conference on Kommunikation in Verteilten Systemen Kassel, Germany March 6, 2009 March 6, 2009 Copyright 2009, USC/ISI. All rights reserved. 1 History X-Bone was a series of research projects at USC/ISI 1997-2005+ initial funding from DARPA, follow-on funding from the NSF http://www.isi.edu/xbone/ key results an architecture (the “Virtual Internet” architecture) a deployment/management system (the “X-Bone”) follow-on work using virtual nets March 6, 2009 Copyright 2009, USC/ISI. All rights reserved. 2 X-Bone Overlay System Web GUI Multiple views IP Base Star Overlay B A C D ring-ovl star-ovl B B A A Ring Overlay C D C D xd GUI Overlay Manager Resource Base IPv4 Resource Daemon Daemon Network Resource Daemon link host router X-Bone system Automated monitoring March 6, 2009 Copyright 2009, USC/ISI. All rights reserved. 3 X-Bone Timeline 1997 – first whitepaper 2001-2003 – NetFS (NSF) 1998-2001 – X-Bone (DARPA) File system configuration of IP overlays with revisitation, network properties recursion (LISP) 2002-2005 – X-Tend (NSF) 2000 – running code (FreeBSD, X-Bone for testbed uses Linux) 2003-2005 – DataRouter (int.) 2000 – application deployment Support for overlay P2P 2001 – TetherNet “NAT-buster” forwarding to support demos 2005-2006 – Agile Tunnels (NSA) 2001-2004 – DynaBone Partial overlays for DDOS safety (DARPA) 2006-2009 – RNA (NSF) 800-way spread-spectrum Extending X-Bone Choices model parallel overlays to general protocol stack 15-level deep overlays architecture March 6, 2009 Copyright 2009, USC/ISI.
    [Show full text]
  • Multihoming with ILNP in Freebsd
    MULTIHOMING WITH ILNP IN FREEBSD Bruce Simpson A Thesis Submitted for the Degree of PhD at the University of St Andrews 2016 Full metadata for this item is available in St Andrews Research Repository at: http://research-repository.st-andrews.ac.uk/ Please use this identifier to cite or link to this item: http://hdl.handle.net/10023/8681 This item is protected by original copyright This item is licensed under a Creative Commons Licence Multihoming with ILNP in FreeBSD Thesis by Bruce Simpson In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy University of St Andrews School of Computer Science 2016 (Defended 17th December 2015) Declaration I, Bruce Simpson, certify that this thesis, which is approximately 40,000 words in length, has been written by me, that it is the record of work carried out by me, or principally by myself in collaboration with others as acknowledged, and that it has not been submitted in any previous application for a higher degree. I was admitted as a research student in October, 2011 and as a candidate for the degree of Doctor of Philosophy in November, 2014; the higher study for which this is a record was carried out in the University of St Andrews between 2011 and 2015. Date ................ Signature of candidate ............................... I hereby certify that the candidate has fulfilled the conditions of the Resolution and Regulations appropriate for the degree of Doctor of Philosophy in the University of St Andrews and that the candidate is qualified to submit this thesis in application for that degree.
    [Show full text]
  • IP Flow Mobility Support for Proxy Mobile Ipv6 Based Networks
    UNIVERSIT A` DEGLI STUDI DI PADOVA Facolt`adi Ingegneria Corso di Laurea in Ingegneria delle Telecomunicazioni Tesi di Laurea IP Flow Mobility support for Proxy Mobile IPv6 based networks Relatori: Prof. Michele Zorzi Dott. Telemaco Melia Candidato: Fabio Giust Anno accademico 2010-2011 Summary The ability of offloading selected IP data traffic from 3G to WLAN access networks is considered a key feature in the upcoming 3GPP specifications, being the main goal to alleviate data congestion in cellular networks while delivering a positive user experience. Lately, the 3GPP has adopted solutions that enable mobility of IP-based wireless devices relocating mobility functions from the terminal to the network. To this end, the IETF has standardized Proxy Mobile IPv6 (PMIPv6), a protocol capable to hide often complex mobility procedures from the mobile devices. This thesis, in line with the mentioned offload requirement, further extends PMI- Pv6 to support dynamic IP flow mobility management across access wireless net- works according to operator policies. In this work, we assess the feasibility of the proposed solution and provide an experimental analysis based on a prototype net- work setup, implementing the PMIPv6 protocol and the related enhancements for flow mobility support. La capacit`adi spostare flussi IP da una rete di accesso 3G ad una di tipo WLAN `econsiderata una caratteristica chiave nelle specifiche future di 3GPP, essendo il principale metodo per alleviare la congestione nelle reti cellulari mantenendo al contempo una ragionevole qualit`apercepita dall’utente. Recentemente, 3GPP ha adottato soluzioni di mobilit`aper dispositivi con accesso radio basato su IP, tra- slando le funzioni di supporto dal terminale alla rete, e, a questo scopo, IETF ha standardizzato Proxy Mobile IPv6 (PMIPv6), un protocollo studiato per nascondere le procedure di mobilit`aai sistemi mobili.
    [Show full text]
  • Ipv6 for Ipv4 Experts
    IPv6 for IPv4 Experts Yar Tikhiy December 31, 2013 DRAFT License cbnd This draft is licensed under the Creative Commons Attribution-NonCommercial- NoDerivs license. DRAFT 1 Contents Preface 9 1 Defining the Problem 11 2 IPv6 Address 19 2.1 TheIPv6AddressLengthIssue . 19 2.2 TextRepresentationofanIPv6Address . 29 2.3 IPv6AddressTypes ....................... 38 2.4 IPv6AddressScopeandZone . 42 2.5 Well-known Applications of IPv6 Link-local Addresses . 59 2.6 IPv6UnicastAddressStructure . 61 2.7 IPv6InterfaceIDsandEUI-64. 66 2.8 IPv6MulticastAddressStructure . 72 2.9 IPv6 Multicast Addressing Extensions Based on Unicast Ad- dresses . 78 2.10 Site-Local Address Problem and Its Solution . 85 2.11 IPv6AddressesinDNS. 89 3IPv6Packet 92 3.1 IPv6 Packet Layout . 92 3.2 IPv6Header............................ 96 3.3 ExtensionHeaders ........................ 104 3.3.1 A Header That Isn’t There: No Next Header . 104 3.3.2 IPv6DRAFT Options . 105 3.3.3 RoutingHeader ..................... 111 3.3.4 Fragment Header. IPv6 Fragmentation and Reassembly 119 3.3.5 IPSecurityHeaders. 134 3.3.6 ExtensionHeaderOrdering . 142 3.3.7 UnsupportedHeaderHandling. 144 2 CONTENTS 3 4 IPv6 in the Protocol Stack 147 4.1 Link-Level Encapsulation . 147 4.1.1 Ethernet . 148 4.1.2 PPP . 151 4.2 InteractionwithUpper-LayerProtocols . 158 4.3 Control . 162 5 Neighbor Discovery Protocol 172 5.1 Neighbor Discovery and IPv6 Address Resolution . 172 5.2 TheHost,theLink,andtheSubnetinIPv6 . 207 5.3 IPv6AddressingModesRevised. Anycast . 239 5.4 IPv6Autoconfiguration. 247 5.4.1 Interface ID Selection and Duplicate Address Detection 247 5.4.2 Prefix and Router Discovery . 255 6 Advanced IPv6 277 6.1 AnycastingtotheRoutersoftheSubnet . 277 6.2 PrivacyExtensionsforSLAAC .
    [Show full text]
  • Appliance Quick Start Guide V7.0
    Appliance Quick Start Guide v7.0 Copyright © 2002 - 2010 Loadbalancer.org Ltd 1 Table of Contents Loadbalancer.org terminology......................................................................................................................4 What is a virtual IP address?..................................................................................................................4 What is a floating IP address?................................................................................................................4 What are your objectives?...........................................................................................................................5 What is the difference between a one-arm and a two-arm configuration?...................................................5 What are the different load balancing methods supported?.........................................................................6 High-availability configuration of two Loadbalancer.org appliances........................................................8 Network diagram: One-Arm – DR Direct Routing (clustered pair) ..........................................................8 Network diagram: Two-Arm - NAT Network Address Translation (clustered pair)...................................9 Network diagram: One-Arm – DR Direct Routing (single unit)..............................................................10 Network diagram: Two-Arm - NAT Network Address Translation (single unit).......................................11 Un-packing and setting up the
    [Show full text]
  • QEMU Version 4.1.0 User Documentation I
    QEMU version 4.1.0 User Documentation i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 Features :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 QEMU PC System emulator ::::::::::::::::::: 2 2.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Quick Start::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.3 Invocation :::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.3.1 Standard options :::::::::::::::::::::::::::::::::::::::::: 3 2.3.2 Block device options :::::::::::::::::::::::::::::::::::::: 12 2.3.3 USB options:::::::::::::::::::::::::::::::::::::::::::::: 21 2.3.4 Display options ::::::::::::::::::::::::::::::::::::::::::: 22 2.3.5 i386 target only::::::::::::::::::::::::::::::::::::::::::: 28 2.3.6 Network options :::::::::::::::::::::::::::::::::::::::::: 29 2.3.7 Character device options:::::::::::::::::::::::::::::::::: 37 2.3.8 Bluetooth(R) options ::::::::::::::::::::::::::::::::::::: 41 2.3.9 TPM device options :::::::::::::::::::::::::::::::::::::: 42 2.3.10 Linux/Multiboot boot specific ::::::::::::::::::::::::::: 43 2.3.11 Debug/Expert options ::::::::::::::::::::::::::::::::::: 43 2.3.12 Generic object creation :::::::::::::::::::::::::::::::::: 52 2.3.13 Device URL Syntax ::::::::::::::::::::::::::::::::::::: 63 2.4 Keys in the graphical frontends :::::::::::::::::::::::::::::::: 66 2.5 Keys in the character backend multiplexer ::::::::::::::::::::: 67 2.6 QEMU Monitor ::::::::::::::::::::::::::::::::::::::::::::::: 67 2.6.1 Commands :::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Appliance Quick Start Guide V7.4
    Appliance Quick Start Guide v7.4 Copyright © 2002 – 2013 Loadbalancer.org, Inc. Table of Contents Loadbalancer.org Terminology.....................................................................................................................4 What is a Virtual IP Address?.................................................................................................................4 What is a Floating IP Address?...............................................................................................................4 What are Your Objectives?.......................................................................................................................... 5 What is the Difference Between a One-Arm and a Two-Arm Configuration?...............................................6 What Load Balancing Methods are Supported?..........................................................................................6 Direct Routing (DR)................................................................................................................................ 8 Network Address Translation (NAT)........................................................................................................9 Source Network Address Translation (SNAT) ......................................................................................10 High-Availability Configuration of two Loadbalancer.org Appliances..........................................................11 Clustered Pair Configuration Methods..................................................................................................11
    [Show full text]
  • High Speed Networks Study Guide
    High-Speed Networks 1 High Speed Networks Study Guide Dr. Wanlei Zhou and Dr. Weijia Jia High-Speed Networks 2 Contents 0. UNIT OUTLINE .................................................................................................9 0.1. Objective 9 0.2. Text Books 9 0.2.1. Main Text Book 9 0.2.2. Reference Books 9 0.3. Assessment 9 1. INTRODUCTION: THE NEED FOR SPEED AND QUALITY OF SERVICE...10 1.1. Study Points 10 1.2. A Brief Networking History 10 1.3. Milestones 11 1.4. The Need for High Speed and Quality of Service (QoS) 12 1.5. Advanced TCP/IP and ATM Networks 12 1.5.1. IP-based Internet 13 1.5.2. ATM Networks 13 1.6. Review Questions 13 2. DATA NETWORKS AND COMMUNICATION PROTOCOLS........................15 2.1. Study Points 15 2.2. Packet-Switch Networks 15 2.2.1. Basic Concepts 15 2.2.2. Switching and Routing Techniques 16 2.2.3. X.25 16 2.3. Frame Relay Networks 17 2.3.1. Why Frame Relay? 17 2.3.2. Frame Relay Architecture 18 2.4. Congestion in Data Network and Internets 18 2.4.1. Effect of Congestion 19 2.4.2. Congestion Control 19 2.4.3. Traffic Management 20 High-Speed Networks 3 2.5. Communication Protocol Architectures 20 2.5.1. The OSI Protocol Architecture 20 2.5.2. Internet Architecture 21 2.5.3. Bridges and Routers 22 2.6. Review Questions 23 3. FAST ETHERNET: IEEE 802.3 100BASE-T ..................................................24 3.1. Study Points 24 3.2. Classical Ethernet 24 3.2.1.
    [Show full text]
  • The X-Bone & Its Virtual Internet Architecture 10 Years Later
    The X-Bone & its Virtual Internet Architecture 10 Years Later Lars Eggert Dagstuhl Seminar on Network Virtualization for the Future Internet Schloss Dagstuhl, Germany September 18-19, 2008 September 18, 2008 Lars Eggert | Nokia © 2008 1 Talk Outline history Virtual Internets why what architecture highlights related projects at ISI (time permitting…) X-Bone, DynaBone, TetherNet September 18, 2008 Lars Eggert | Nokia © 2008 2 History X-Bone was a series of research projects at USC/ISI X-Bone, DynaBone, TetherNet, X-Tend, NetFS, GeoNet, … 1997-2005+ initial funding from DARPA, follow-on funding from the NSF http://www.isi.edu/xbone/ key results an architecture (the “Virtual Internet” architecture) a deployment/management system (the “X-Bone”) follow-on work using virtual nets: DynaBone spread-spectrum virtual networks TetherNet rent real Internet behind firewall + NAT GeoNet geographically-routed virtual networks September 18, 2008 Lars Eggert | Nokia © 2008 3 Prior & Related Work new services & protocols Cronus, M/6/Q/A-Bone multi/other layers Cronus, Supranet, MorphNet, VANs partial solutions VPN, VNS, RON, Detour, PPVPN, SOS virtualization, revisitation, recursion X-Bone, Spawning, Netlab/Emulab OS virtualization VMware, jails, vserver, XEN, PlanetLab September 18, 2008 Lars Eggert | Nokia © 2008 4 Virtual Internet – Why “network equivalent of virtual memory” protection separate topology, optionally secured test + deploy new protocol/service sharing increase utility of infrastructure abstraction adapt topology to application September 18, 2008 Lars Eggert | Nokia © 2008 5 Virtual Internet – What network = hosts + routers + links virtual network = virtual host → packet src/sink + virtual router → packet gateway + virtual link → tunnel X over Y virtual Internet – ”network of networks” use Internet as physical media virtual virtual Internet IP link IP network IP payload create virtual link & network layers header header header strong L2 vs.
    [Show full text]
  • Red Hat Openstack Platform 13 Instances and Images Guide
    Red Hat OpenStack Platform 13 Instances and Images Guide Managing Instances and Images Last Updated: 2021-09-24 Red Hat OpenStack Platform 13 Instances and Images Guide Managing Instances and Images OpenStack Team [email protected] Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]