Cloud Computing - Network Architecture and Virtual Network in Virtualization (Book at the end of the article)

  • About the author: A cloud computing network operation and maintenance personnel, sharing the technology and dry goods of network and operation and maintenance every day. 

  • Official account: Network Dou

  •  Motto: Keep your head down and hurry on your way, be respectful

  • Personal homepage:  Homepage of Netdou

Table of contents

 Early review

foreword

1. NIC virtualization

1. NIC virtualization method:

(1) Software NIC virtualization:

 (2) Hardware network card virtualization

2. Virtualized software switch

3. Network architecture in virtualization

 4. Key network resources in virtualization

5. Data forwarding path in virtualization

 6. Virtual network

1. Virtual network technology

2. Virtual network

 3. Cascade network

 4.VXLAN

 5. Virtual private network


 Early review

Cloud Computing - An Introduction to Network Virtualization


foreword

This chapter will explain the network architecture in cloud computing virtualization.


1. NIC virtualization

1. NIC virtualization method:

(1) Software NIC virtualization:

It is mainly realized through software control that each virtual machine shares the same physical network card. The network card virtualized by the software can have a separate MAC address and IP address.

The virtual network cards of all virtual machines are connected to the physical switch through the virtual switch and the physical network card. The virtual switch is responsible for forwarding the data packets on the virtual machine from the physical network port.

 Virtual machine - "virtual network card - "virtual switch - "physical switch

 (2) Hardware network card virtualization

The main technology used is single root I/O virtualization (Single Root I/O Virtulization, SR-IOV), which is I/O pass-through technology. With the assistance of hardware, virtual machines can directly access physical devices without going
through VMM. This technology can directly virtualize
128-512 network cards, allowing virtual machines to get an independent network card and directly use I/O resources. SR-IOV can allow network transmission
to bypass the software simulation layer and directly distribute to virtual machines, thus reducing the I/O overhead in the software simulation layer.


2. Virtualized software switch

OVS (Open vSwitch) open virtualization software switch is an open source virtual Ethernet switch based on software. It uses the open source Apache2.0 license agreement and is mainly used in the virtual machine VM environment.

Integrate with many open source virtualization platforms (support Xen, KVM and VirtualBox multiple virtualization technologies), there are two main functions:

  • Pass traffic between virtual machines.
  • Realize the communication between the virtual machine and the external network.


3. Network architecture in virtualization

A network architecture in virtualization usually uses a virtual switch to connect a virtual machine and a physical switch to realize communication between virtual machines.


 4. Key network resources in virtualization

The key network resources in virtualization can be roughly divided into:

  • Physical resources: physical servers (providing physical network cards). A physical switch (provides the physical network).
  • Virtual resources: virtual machines (providing virtual network cards), virtual switches (providing virtual switching ports (groups) and uplinks)

The virtual switch plays a connecting role in the virtualized network.


5. Data forwarding path in virtualization

  • The communication between virtual machines in different servers in the same port group needs to go through the physical network.
  • Communication between virtual machines in the same server on the same port group does not need to go through the physical network.
  • The communication between the virtual machines of the same server with different port groups needs to pass through the physical network.


 6. Virtual network

1. Virtual network technology

Link Virtualization: Virtual Link Aggregation

VPC virtual link aggregation is the most common Layer 2 virtualization technology.

Link aggregation bundles multiple physical ports together and virtualizes them into one logical port. However, traditional link aggregation cannot cross devices. VPC solves this problem very well. It can not only cross devices, but also increase link bandwidth and achieve high availability of the link layer.

 Link Virtualization: Tunnel Virtualization

The tunneling protocol refers to the interconnection of multiple networks with different protocols through the tunneling protocol. The data passed through the tunnel can be data frames or packets of different protocols. The tunnel can force the data flow to a specific address, hide the network address of the intermediate node, and provide the function of encrypting data as needed.

Typical tunneling protocols:

  • GRE (Generic Routing Encapsulation) general routing encapsulation.
  • IPsec (Internet Protocol Security) Internet protocol security.


2. Virtual network

Virtual network: A network composed of virtual links.

The connection between virtual network nodes is not connected by physical cables, but by specific virtualized links.

Typical virtual networks include:

  • Laminated network (virtual Layer 2 extended network)
  • VPN network


 3. Cascade network

Overlay Network: build another network on the basis of the existing network.

Cascaded networks allow information to be routed to hosts whose destinations are not identified by IP addresses.

A cascaded network can make full use of existing resources and provide more services without increasing costs. (For example, the ADSL internet access line is implemented based on the existing PSTN network)


 4.VXLAN

VXLAN (Virtual eXtensible Local Area Network) Virtual Extended Local Area Network: It solves the problem that the existing VLAN technology cannot meet the needs of large Layer 2 networks.

VXLAN technology is a large Layer 2 virtual network technology.

The principle is to introduce an outer tunnel in UDP format as the data link layer, and the content of the original data message is transmitted as the payload of the tunnel.


 5. Virtual private network

VPN (Virtual Private Network): It is a communication method commonly used to connect private networks between medium and large enterprises or between groups.

Intranet information is delivered through a common network infrastructure such as the Internet.

The encrypted tunnel protocol is used to achieve security effects such as confidentiality, terminal authentication, and information accuracy. This technology can transmit reliable and secure information over an insecure network.


  • Books in this issue: "In-depth explanation of SSD: solid-state storage core technology, principle and practice"
  • Book donation rules: comment area: like, bookmark, leave a message
  • Deadline for the event: September 2
  • Number of donated books: 4
  • After winning the prize, if the blogger does not reply within three days of the private message notification, it will be regarded as an automatic waiver
  • Lottery draw time: September 2, 2023
    Announcement method: comment area, article published here, private message notification
  • Chunren.  , no one loves anyone with their hands in their pockets♡ , Jiang Chijun, conquering bugs

In recent years, the state has vigorously supported the semiconductor industry and encouraged independent innovation. China's SSD technology and industry have developed soundly. The industrial chain is constantly improving, and the gap with international manufacturers is gradually narrowing. However, judging from the development trend of the industry, there is still room for substantial improvement in SSD-related technologies, and SSD-related technologies are indeed making continuous progress. With the advancement of the flash memory chip manufacturing process and the increase in the number of stacked layers, SSDs are facing the problem of large pages of flash memory, performance problems caused by write amplification, and reliability problems caused by 3D stacking. Therefore, we still need to continue to overcome core technologies. Through Various methods such as software and hardware collaboration can improve the performance and lifespan of SSDs, so as to meet the growing application requirements.

In terms of SSD technology, China can only gradually establish its core competitiveness and occupy a higher market share only by facing the international frontier and strengthening enterprise R&D and independent innovation.

The first edition of "In-depth SSD" was launched in 2018, and immediately became a best-selling book for SSD practitioners, including researchers, designers, producers and users, to understand the working principle and technology of SSD. Almost 5 years have passed, SSD technology is constantly developing, and standards are also constantly being updated. A series of new technologies or standards have emerged, such as Computable Storage, ZNS, NVMe protocol standards, NVMe over Fabrics, NAND new protocol standards, etc. Therefore, This book was born. This book has added a lot of new content on the basis of the first edition, covering a wider range. The author team of this book is still from the technical elites in the solid-state storage industry. They have many years of experience and write books in a professional, popular and easy-to-understand style. I believe this book will continue to give readers a good experience and help the development of SSD technology and industry.

brief introduction

As an upgraded version of the classic bestseller, this book adds a lot of new knowledge (such as flash memory, UFS, testing, file system, etc.) on the basis of the first edition, and rewrites or deletes many outdated or inapplicable contents The total modification amount exceeds 60%. This book is jointly completed by the core team members of SSDFans, an SSD technology community, and experts from the industry and universities in SSD. Compared with the first edition, the content is more comprehensive, updated, and more in-depth.

This book expands from the three dimensions of product, technology and application, comprehensively and in detail explains the development history, product form, working principle, overall structure of SSD, as well as the principle and use of each functional module, from the front-end interface protocol of SSD to the FTL algorithm , and then to back-end flash memory and error correction, and testing, this book covers them all. This book can be used as an introductory book to help readers get started quickly, and it can also be used as a reference book for readers to refer to when needed.

  • Product market chapter: Introduces the comparison between SSD and HDD, the development history and product form of SSD, the solid-state storage market, the dynamics of NAND manufacturers and the development trend of flash memory, as well as computing storage and aerospace storage products, etc.

  • Core technology: focuses on the composition and working principle of the main control internal modules, the realization principle, practical application, characteristics and data integrity of flash memory, FTL mapping management, wear leveling, garbage collection, bad block management and other functions, and LDPC Decoding principles, etc.

  • Protocol articles: In-depth interpretation of NVMe, PCIe, UFS, etc. from multiple dimensions such as implementation principles, practical applications, and development trends, so that readers can understand both what they are and why.

  • Test chapter: Describes in detail the commonly used test software, test process, equipment, industry certification and professional test standards related to SSD.

  • Extension: From the traditional EXT4 file system to the F2FS file system that is more friendly to flash memory, it has been fully interpreted. 

About the Author

SSDFans was founded in 2014 by Dandan (Duan Xinghui, chief software engineer of Longsys), Duan (Zhao Zhanxiang, partner and CTO of Yunxiu Capital), Marx (Wang Sheng, senior manager of firmware development at CNEXLABS), and SSD Siege Lion. Common dreams and pursuits come together. The original intention of SSDFans was to popularize knowledge about solid-state storage and contribute to the solid-state storage business in the motherland. SSDFans is an influential SSD solid-state drive technology community in China and even in Chinese circles around the world.

Hu Bo graduated from the Control Department of Huazhong University of Science and Technology. He has worked in the solid-state storage industry for 15 years. He is now working in Solidigm for enterprise-level SSD-related work. He has worked for Micron, Dell, Maxio, etc., responsible for R&D, PM, marketing, sales, and quality. , AE/FAE, etc. The products involved include NAND, DRAM, SSD, UFS, controllers, etc. In his spare time, he is keen on writing and sharing, hoping to contribute to the promotion of domestic solid-state storage ecology and technology development.

Shi Liang is a professor/doctoral supervisor of East China Normal University, a "Science and Technology Star" in Shanghai. Research directions include storage medium reliability, storage control algorithms, storage file systems, and system-wide software and hardware collaboration technologies. Published many papers in top international conferences such as FAST, ATC, MICRO, and HPCA. He has made high academic and corporate contributions in the field of storage.

Cen Biao,  founder of Shanghai Luanqi Technology, Fudan BI MBA. He used to work for AMD, Seagate (LSI), CNEXLABS and other companies. Currently, Shanghai Luanqi Technology is a technology company that focuses on the development of storage product testing equipment. With more than 10 years of experience in SSD master control and module testing, he is one of the earliest engineers engaged in SSD research and development in China. The products he has participated in include SandForce's SATA master control, CNEXLABS PCIe series master control, DPU and other products. SSD product testing experience.


 Creation is not easy, please pay attention, like, collect, thank you~ 

Guess you like

Origin blog.csdn.net/yj11290301/article/details/132556374