Chapter 10 - Review



Network+ Guide to Networks, Chapter 10 Review
Virtual Networks and Remote Access

Virtualization

Virtualization is the emulation of a computer, operating system environment, or application on a physical system. It’s a broad term that encompasses many possibilities. In the following sections, you will learn about a type of virtualization that allows you to, for example, create a logically defined Linux client on your Windows 7 workstation or a virtual Windows Server 2008 R2 server on your UNIX server. In fact, using a virtualization program, you can create dozens of different VMs (virtual machines), whether virtual workstations or virtual servers, on one computer. Together, all the VMs on a single computer share the same CPU, hard disk, memory, and network interfaces. Yet each VM functions independently, with its own logically defined hardware resources, operating system, applications, and network interfaces.
A VM can be configured to use not only a different operating system, but also a different type of CPU, storage drive, or NIC than the physical computer it resides on. VMs exist as files on the hard disk of the physical computer. These files contain the operating system, applications, data, and configurations for the VMs. Meanwhile, to users, a VM appears and acts no differently from a physical computer running the same software. For example, suppose you are the network administrator at an ISP and you establish separate virtual mail servers for five companies on one physical computer. When an employee at one company checks his e-mail, he has no idea that he is accessing the same physical computer that an employee at another company uses to check her e-mail. In this type of virtualization, the physical computer is known as a host while each VM is known as a guest. The software that allows you to define VMs and manages resource allocation and sharing among them is known as a virtual machine manager, or, more commonly, a hypervisor. Figure 10-1 on page 447 illustrates some of the elements of virtualization.

Virtualization offers several advantages, including the following:

Efficient use of resources—Physical clients or servers devoted to one function typically use only a fraction of their capacity. Without virtualization, a company might purchase six computers to run six different services—for example, mail server, DNS server, DHCP server, file server, remote access server, and database server. Each service might demand no more than 15% of its computer’s processing power and memory. Using virtualization, however, a single, powerful computer can support all six services.

Cost and energy savings—Organizations save money by purchasing fewer physical machines. They also save electricity because there are fewer computers drawing power and less demand for air conditioning in the computer room. Some institutions with thousands of users, such as Stanford University, are using virtualization as a way to conserve energy and are promoting it as part of campuswide sustainability efforts.

Fault and threat isolation—In a virtual environment, the isolation of each guest system means that a problem with one guest does not affect the others. For example, an instructor might create multiple instances of an operating system and applications on a single computer that’s shared by several classes. That allows each student to work on his own instance of the operating system environment. Any configuration errors or changes he makes on his guest machine will not affect other students.


In another example, a network administrator who wants to try a beta version of an application might install that application on a guest machine rather than his host, in case the untested software causes problems. Furthermore, because a VM is granted limited access to hardware resources, security attacks on a guest may have little effect on a host or the physical network to which it’s connected.

Simple backups, recovery, and replication—Virtualization software enables network administrators to save snapshots, or images, of a guest machine. The images can later be used to re-create that machine on another host or on the same host. This feature allows for simple backups and quick recovery. It also makes it easy to create multiple, identical copies of one VM. Some virtualization programs even allow you to save snapshot files of VMs that can be imported into a competitor’s virtualization program.

Not every type of client or server is a good candidate for virtualization, however. Potential disadvantages to creating multiple guests on a single host machine include the following:

Compromised performance—When multiple virtual machines contend for finite physical resources, one virtual machine could monopolize those resources and impair the performance of other virtual machines on the same computer. In theory, careful management and resource allocation should prevent this. In practice, however, it is unwise to force a critical application—for example, a factory’s real-time control systems or a hospital’s emergency medical systems—to share resources and take that risk. Imagine a brewery that uses computers to measure and control tank levels, pressure, flow, and temperature of liquid ingredients during processing. These functions are vital for product quality and safety. In this example, where specialty software demands real-time, error-free performance, it makes sense to devote all of a computer’s resources to this set of functions, rather than share that computer with the brewery’s human resources database server, for example. In addition to multiple guest systems vying for limited physical resources, the hypervisor also requires some overhead.

Increased complexity—Although virtualization reduces the number of physical machines to manage, it increases complexity and administrative burden in other ways. For instance, a network administrator who uses virtual servers and switches must thoroughly understand virtualization software. In addition, managing addressing and switching for multiple VMs is more complex than doing so for physical machines. (You will learn more about these techniques later in this chapter.) Finally, because VMs are so easy to set up, they may be created capriciously or as part of experimentation, and then forgotten. As a result, extra VMs may litter a server’s hard disk, consume resources, and unnecessarily complicate network management. By contrast, abandoned physical servers might only take up rack space.

Increased licensing costs—Because every instance of commercial software requires its own license, every VM that uses such software comes with added cost. In some cases, the added cost brings little return. For example, an instructor might want to create four instances of Windows 7 on a single computer to supply four students with their own operating system environment. To comply with Microsoft’s licensing restrictions, the instructor will have to purchase four copies of Windows 7. Depending on the instructor’s intentions, it might make more sense, instead, to share one copy of Windows 7 and separate each student’s files and settings by using four different logon IDs.


Single point of failure—If a host machine fails, all its guest machines will fail, too. For example, an organization that creates VMs for its mail server, DNS server, DHCP server, file server, remote access server, and database server on a single physical computer would lose all of those services if the computer went down. Wise network administrators implement measures such as clustering and automatic failover to prevent that from happening. You’ll learn more about these techniques in Chapter 14.

Most of the potential disadvantages in this list can be mitigated through thoughtful network design and virtualization control. You can choose from several virtualization programs to create and manage VMs. VMware is the most widely implemented virtualization software today. The company provides several different products, some designed for managing virtual workstations on a single host and others capable of managing hundreds of virtual servers across a WAN. Competing virtualization products include Microsoft’s Hyper-V, KVM (Kernel-based Virtual Machine), Oracle’s VirtualBox, and Citrix’s Xen. All provide similar functionality, but differ in features, interfaces, and ease of use. In this chapter, you will see sample screen shots from some of these virtualization programs and get a sense for how they function. In the Hands-On Projects at the end of this chapter, you will have the chance to install a popular virtualization program and create and network VMs.

Virtual Network Components

It is possible to create a virtual network that consists solely of virtual machines on a physical server. More practical and common, however, are networks that combine physical and virtual elements. Earlier you were introduced to VMs. In this section, you will learn how VMs connect to each other and to a physical network.

Virtual Machines and Adapters
AVM’s software and hardware characteristics are assigned when it is created in the virtualization program. As you have learned, these characteristics can differ completely from those of the host machine. Popular virtualization programs offer step-by-step wizards that make creating VMs easy. One of the first steps is choosing an image of the guest’s operating system. Operating system images are available for download online or can be obtained on a disc from software vendors. For example, if you are running a virtualization program on your Windows 7 workstation, you might choose to install a guest machine based on an Ubuntu Linux image you download from Ubuntu’s Web site. After choosing the guest operating system, you can customize characteristics of the VM, including memory and hard disk size, processor type, and NIC type, to name a few. Figure 10-2 on page 450 shows a screen from the VMware VM creation wizard that allows you to specify the amount of memory allocated to a VM. To connect to a network, a virtual machine requires a virtual adapter, or vNIC (virtual network interface card). Just like a physical NIC, a vNIC operates at the Data Link layer and provides the computer with network access. Each VM can have several vNICs, no matter how many NICs the host machine has. The maximum number of vNICs on a VM depends on the limits imposed by the virtualization program. For example, VirtualBox allows up to eight vNICs per virtual machine. Figure 10-3 on page 451 shows a dialog box from the VMware wizard that allows you to customize properties of a virtual workstation’s vNIC. One of many options you can configure for each NIC is its inbound and outbound transmission speeds. For example, you could select transmission speeds that simulate a T1 or broadband cable connection. Upon creation, each vNIC is automatically assigned a MAC address. Also, by default, every virtual machine’s vNIC is connected to a port on a virtual switch, as described next.

Virtual Switches and Bridges
As soon as the first virtual machine’s vNIC is selected, the hypervisor creates a connection between that VM and the host. Depending on the virtualization software, this connection might be called a bridge or a switch. (Recall that every port on a physical switch can be considered a bridge; thus, a switch is essentially a collection of bridges.) A virtual switch is a logically defined device that operates at the Data Link layer to pass frames between nodes. Virtual bridges, or ports on a virtual switch, connect vNICs with a network, whether virtual or physical. Thus, a virtual switch or bridge allows VMs to communicate with each other and with nodes on a physical LAN or WAN. When virtual switches or bridges are used to connect vNICs with physical NICs for physical network access, the physical NIC can be considered an uplink. Just like an uplink connection between two physical switches, the physical NIC connects a group of switched nodes to another network segment. Virtual switches or bridges reside in the RAM of the physical computers that act as their hosts, while their configuration resides in a separate file on the host’s hard disk. One host can support multiple virtual switches. The hypervisor controls the virtual switches and its ports, or bridges. Figure 10-4 on page 452 illustrates a host machine with two physical NICs that supports several virtual machines and their vNICs. A virtual switch connects the vNICs to the network. Recall from Chapter 6 that physical switches exchange traffic through routers. The same holds true for virtual switches. Suppose you created two virtual switches, switch A and switch B, on one host machine. Traffic between VMs on switch A and VMs on switch B could not pass directly between switches A and B. Instead, the virtual switches would have to exchange data through a router, whether virtual or physical, as shown in Figure 10-5 on page 453. In fact, the router could simply be another virtual machine on the host configured to forward packets. Naturally, virtual switches on different host machines also have to communicate through routers. Virtual switches offer many possibilities for customizing and managing network traffic, as you will discover later in this chapter. First, however, it’s necessary to understand the different ways in which virtual interfaces can appear on and communicate with a network.

Network Connection Types
Earlier you learned that when creating a virtual interface on a VM, you choose its characteristics, such as speed. In addition, you are asked to identify what type of network connection, or networking mode, the vNIC will use. In the VMware or VirtualBox virtualization programs, you make this choice when you create or reconfigure a vNIC. In Hyper-V, you make the choice through the Virtual Network Manager. The most frequently used network connection types include bridged, NAT, and host-only, as described next.

Bridged - In bridged mode, a vNIC accesses a physical network using the host machine’s NIC, as shown in Figure 10-6 on page 454. In other words, the virtual interface and the physical interface are bridged. If your host machine contains multiple physical adapters—for example, a wireless NIC and a wired NIC—you can choose which physical adapter to use as the bridge when you configure the virtual adapter. Although a bridged vNIC communicates through the host’s adapter, it obtains its own IP address, default gateway, and netmask from a DHCP server on the physical LAN. For example, suppose your DHCP server is configured to assign addresses in the range of 192.168.1.128 through 192.168.1.253 to nodes on your LAN. The router might assign your host machine’s physical NIC an IP address of 192.168.1.131. A guest on your host might obtain an IP address of 192.168.1.132. A second guest on that host might obtain an
IP address of 192.168.1.133, and so on. When connected using bridged mode, a VM appears to other nodes as just another client or server on the network. Other nodes communicate directly with the machine without realizing it is virtual.


In VMware and VirtualBox, you can choose the bridged connection type when you create or configure the virtual adapter. In KVM, you create a bridge between the VM and your physical NIC when you modify the vNIC’s settings. In Hyper-V, you create a bridged connection type by assigning VMs to an external network switch. Figure 10-7 on page 454 shows the Hardware dialog box that appears while creating a virtual machine in VMware with the Bridged networking connection type selected. VMs that must be available at a specific address, such as mail servers or Web servers, should be assigned bridged network connections. VMs that other nodes do not need to access directly can be configured to use the NAT networking mode.


NAT - In the NAT networking mode, a vNIC relies on the host machine to act as a NAT device. In other words, the VM obtains IP addressing information from its host, rather than a server or router on the physical network. To accomplish this, the virtualization software acts as a DHCP server. A vNIC operating in NAT mode can still communicate with other nodes on the network and vice versa. However, other nodes communicate with the host machine’s IP address to reach the VM; the VM itself is invisible to other nodes. Figure 10-8 on page 455 illustrates a VM operating in NAT mode. NAT is the default network connection type selected when you create a VM in VMware, VirtualBox, or KVM. In Hyper-V, the NAT connection type is created by assigning VMs to an internal network. Figure 10-9 on page 456 shows the networking modes dialog box in VirtualBox, with the NAT option selected. Once you have selected the NAT configuration type, you can configure the pool of IP addresses available to the VMs on a host. For example, suppose, as shown in Figure 10-8, your host machine has an IP address of 192.168.1.131. You might configure your host’s DHCP service to assign IP addresses in the range of 10.1.1.128 through 10.1.1.253 to the VMs you create on that host. Because these addresses will never be evident beyond the host, you have flexibility in choosing their IP address range. The NAT network connection type is appropriate for VMs that do not need to be accessed at a known address by other network nodes. For example, virtual workstations that are mainly used to check e-mail, share files, or surf the Web are good candidates for NAT network connections.

Host-Only - In host-only networking mode, VMs on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host. In other words, the vNICs never receive or transmit data via the host machine’s physical NIC. In host-only mode, as in NAT mode, VMs use the DHCP service in the host’s virtualization software to obtain IP address assignments. Figure 10-10 on page 456 illustrates how the host-only option creates an isolated virtual network. Host-only mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system. For example, suppose a project requires you to create diagrams in Microsoft Visio and your workstation runs Red Hat Linux. You could install a Windows 7 VM solely for the purpose of installing and running Visio. Obviously, because host-only mode prevents VMs from exchanging data with a physical network, this choice cannot work for virtual servers that need to be accessed by clients across a LAN. Nor can it be used for virtual workstations that need to access LAN or WAN services, such as e-mail or Web pages. Host-only networking is less commonly used than NAT or bridged mode networking. You can choose host-only networking when you create or configure a VM in VMware or VirtualBox. In Hyper-V, the host-only connection type is created by assigning VMs to a private virtual network. In KVM, host-only is not a predefined option, but must be assigned to a vNIC via the command-line interface. Virtualization software gives you the flexibility of creating several different networking types on one host machine. For example, on one host you could create a host-only, or private, network to test multiple versions of Linux.
On the same host, you could create a group of Windows Server 2008 R2 servers that are connected to your physical LAN using the bridged connection type. Or, rather than specifying one of the four networking connection types described previously, you could also create a VM that contains a vNIC but is not connected to any nodes, whether virtual or physical. Preventing the VMfrom communicating with other nodes keeps it completely isolated. This might be desirable when testing unpredictable software or an image of untrusted origin.

Virtual Appliances
Imagine you’re a busy network administrator, and your company’s IT director has asked you to provide a complete e-mail and collaboration solution for everyone connected to the WAN. Traditionally, someone in your situation would research and obtain trial versions of the leading software, install the software on test machines, and evaluate each program over a period of weeks. You might struggle to get your hardware and operating system to work correctly with the software. Or you might wonder whether certain problems with the new software are related to the way you configured it. However, virtualization offers an alternative. Instead of installing the program on a test server, you could install a virtual appliance, or an image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for the package to run properly. Virtual appliances may be virtual workstations, but more commonly they are virtual servers. Each virtual appliance varies in its features and complexity. Popular functions include firewall and other security measures, network management, e-mail solutions, and remote access. Other virtual appliances are customized instances of operating systems designed to suit the needs of particular users. Now that you are familiar with the elements that make up a virtual network, you are ready to learn techniques for managing them as part of an enterprise-wide network.


Virtual Networks and VLANs

Ask a networking professional about his virtual network and he’ll probably wonder exactly what you’re talking about. The term could be shorthand for a VLAN defined on a physical switch or a VPN (discussed later in this chapter), or it could simply refer to any network that connects virtual machines. For example, in its Hyper-V offering, Microsoft refers to network connection types as virtual networks. In this section, virtual network is used generally to refer to ways in which virtual machines can be connected with other virtual and physical network nodes. Virtual networks resemble physical networks in many aspects. The same concerns regarding addressing, performance, security, and fault tolerance apply. In some cases—for example, when it comes to backups, troubleshooting, and software updates—virtual network management is nearly identical to physical network management. In other cases, management differs only slightly. For example, in the previous section, you learned that a DHCP server is part of virtualization software. Running on a host, it dynamically assigns IP addresses for virtual machines in NAT and host-only modes just as a DHCP server on a physical network assigns addresses for its physical clients. However, despite all the similarities between physical and virtual networks, an important difference arises when managing virtual machines in VLANs. Recall from Chapter 6 that VLANs are subnets, or broadcast domains, logically defined on a physical switch. VLANs allow network administrators to separate network traffic for better performance, customized address management, and security. On a network that uses virtual machines, VLANs will typically include those VMs. You also know that to create a VLAN you modify a physical switch’s configuration. However, to add VMs to a VLAN defined on a physical network, you modify a virtual switch’s configuration. In other words, VMs are not added to a preexisting VLAN on the physical switch that manages that VLAN. The following example describes a common way of incorporating VMs in VLANs.
Because virtualization programs vary, the steps required and the nomenclature used will differ depending on what program you use. However, the concepts are the same. Suppose you work at a small company whose network consists of four VLANs defined on its primary backbone switch. The VLANs subdivide traffic by group as follows: Management, Research, Test, and Public. On the network, they are defined as VLAN 120, VLAN 121, VLAN 122, and VLAN 123, respectively. To consolidate resources, your company is migrating its five physical file servers to virtual file servers on a single host using a VMware program called vSphere. The hypervisor portion of vSphere and the interface that allows you to manage virtual machines and the virtual networks they belong to is called VMware ESXi Server. As you create the five virtual servers on your new host server, you configure each of their vNICs to operate in bridged mode. Furthermore, you decide to assign each virtual server a static IP address. After creation, the five virtual servers are connected to the same virtual switch. By default, each vNIC is assigned a single port, or bridge, on the virtual switch. (If you create multiple vNICs for your servers, each vNIC would connect to a separate port.) Because the vNICs operate in bridged mode, the virtual servers can access the physical network through the host’s physical interface. Likewise, nodes on the physical network can access the virtual servers through the host’s physical interface. Next, you install applications on your virtual servers and customize software and NOS parameters. Finally, you are ready to add the servers to the appropriate VLANs. In this example, suppose all five servers belong to the Management, Research, and Test VLANs, and only one of them belongs to the Public VLAN. In VMware, vNICs can be assigned to port groups. Grouping ports allows you to apply certain characteristics to multiple vNICs easily and quickly. Notably, all the vNICs in a port group can be assigned to one VLAN with a single command. For example, the vNICs for all five file servers will be assigned to port groups 120, 121, and 122. The vNIC for one file server will also be assigned to port group 123. Next, you associate each of the port groups with a VLAN. For example, you would associate port group 120 with VLAN 120, port group 121 with VLAN 121, and so on. Notice that multiple vNICs can be assigned to a single port group. Also, a single vNIC can be assigned to multiple port groups. (Depending on your network management strategy, however, you might find it simpler to create multiple vNICs so that each vNIC is associated with a different port group, or VLAN.) In other virtualization programs, vNICs are assigned to VLANs by associating them directly with a VLAN number or with a bridge that is, in turn, associated with a VLAN. Recall from Chapter 6 that a single physical interface can carry the traffic of multiple VLANs through trunking. Therefore, the host’s physical NIC must be configured to operate in trunking mode for VLAN information to pass through. In other words, it must be capable of carrying the traffic of multiple VLANs. Virtualization software refers to the physical NIC, acting as an interface for VLANs, as a trunk.
Now that you have created virtual servers connected to a virtual switch, created port groups on the switch and assigned vNICs to those port groups, associated those port groups with VLANs, and ensured that your host’s physical NIC is configured to act as a trunk, all traffic tagged for VLAN 120 will be transmitted to all five file servers, for example, and all traffic tagged for VLAN 123 will only be seen by one file server. Figure 10-11 on page 459 illustrates this example of multiple virtual servers connected to multiple VLANs. The virtual network for a company that manages multiple virtual file servers and multiple VLANs would likely be more complicated than the example described in this section. For instance, as a network administrator you might ensure high performance by using two physical NICs on the host and associating a virtual server’s vNIC with both. You might instruct the virtualization software to balance loads between multiple vNICs on a busy server. You might create multiple virtual switches on the host to further separate traffic. You might even create duplicates of your virtual servers on a second physical host to ensure availability. For now, however, it is enough to understand the essential concepts of using VLANs in a combined virtual and physical network.


Remote Access and Virtual Computing

In Chapter 7, you learned about connecting nodes over long distances to form WANs. Most of the connectivity examples in that chapter assumed that the WAN locations had continuous, dedicated access to the network. For example, when a user in Phoenix wants to open a document on a server in Dallas, she needs only to find the Dallas server on her network, open a directory on the Dallas server, and then open the file. The server is available to her at any time because the Phoenix and Dallas offices are always connected and sharing resources over the WAN. However, this is not the only way to share resources over a WAN. For remote users, such as employees on the road, distance learning students, telecommuters, military personnel overseas, or staff in small, branch offices, intermittent access with a choice of connectivity methods is often more appropriate. As a remote user, you can connect to a network via remote access, a service that allows a client to connect with and log on to a LAN or WAN in a different geographical location. After connecting, a remote client can access files, applications, and other shared resources, such as printers, like any other client on the LAN or WAN. To communicate via remote access, the client and host need a transmission path plus the appropriate software to complete the connection and exchange data. Many remote access methods exist, and they vary according to the type of transmission technology, clients, hosts, and software they can or must use. Popular remote access techniques, including dial-up networking, Microsoft’s RAS (Remote Access Service) or RRAS (Routing and Remote Access Service), and VPNs (virtual private networks), are described in the following sections. You will also learn about common remote access protocols.

Dial-Up Networking
In Chapter 7, you learned about the PSTN and ways in which it connects users to networks, including dial-up. Dial-up networking refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network. Dial-up clients can use PSTN, X.25, or ISDN transmission methods. However, the term dial-up networking usually refers to a connection between computers using the PSTN—that is, regular telephone lines. To accept client connections, the remote access server is attached to a group of modems, all of which are associated with one phone number. The client must run dial-up software (normally available with the operating system) to initiate the connection. At the same time, the remote access server runs specialized software to accept and interpret the incoming signals. When it receives a request for connection, the remote access server software presents the remote user with a prompt for his credentials—typically, his username and password. The server compares his credentials with those in its database, in a process known as authentication. If the credentials match, the user is allowed to log on to the network. Thereafter, the remote user can perform the same functions he could perform while working at a client computer in the office. With the proper server hardware and software, a remote access server can offer multiple users’ simultaneous remote access to the LAN. Though far less popular than it was in the 1990s, some Internet subscribers still use dial-up networking to connect to their ISP. In the Hands-On Projects at the end of this chapter, you will have the opportunity to configure a dial-up networking connection. Dial-up networking technology is proven reliable and its software comes with virtually every operating system. Within the United States, the dial-up configuration for one location differs little from the dial-up configuration in another location. However, a dial-up connection via the PSTN comes with significant disadvantages, with the worst being its low throughput. Currently, manufacturers of PSTN modems advertise a connection speed of 56 Kbps. But the 56-Kbps maximum is only a theoretical threshold that assumes a pristine connection between the initiator and the receiver. Splitters, fax machines, or other devices that a signal must navigate between the sender and receiver all reduce the actual throughput.
The number of switching facilities and modems through which your phone call travels also affects throughput. Each time the signal passes through a switch or is converted from analog to digital or digital to analog, it loses a little throughput. If you’re surfing the Web, for example, by the time a Web page returns to you, the connection may have lost from 5 to 30 Kbps, and your effective throughput might have been reduced to 30 Kbps or less. In addition, the FCC (Federal Communications Commission), the regulatory agency that sets standards and policy for telecommunications transmission and equipment in the United States, limits the use of
PSTN lines to 53 Kbps to reduce the effects of cross talk. Thus, you will never actually achieve full 56-Kbps throughput using a dial-up connection over the PSTN. Nor can traditional dial-up networking provide the quality required by many network applications. The quality of a WAN connection is largely determined by how many data packets it loses or that become corrupt during transmission, how quickly it can transmit and receive data, and whether it drops the connection altogether. Dial-up networking compares unfavorably with other WAN connection methods on all accounts. To compensate for its relatively poor quality, most protocols employ error-checking techniques. For example, TCP/IP depends on acknowledgments of the data it receives. In addition, newer PSTN links are digital and digital lines are more reliable than the older analog lines. Such digital lines reduce the quality problems that once plagued purely analog PSTN connections. From a network administrator’s point of view, dial-up networking also requires a significant amount of maintenance to make sure clients can always connect to a pool of modems. One way to limit the maintenance burden is for an organization to contract with an ISP to supply remote access services. In this arrangement, clients dial into the ISP’s remote access server, and then the ISP connects the incoming clients with the organization’s network.
The dial-up networking software that Microsoft provided with its Windows 95, 98, NT, and
2000 client operating systems is called RAS (Remote Access Service). RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In the Windows 2000 Server, XP, Vista, Server 2003, Server 2008, and Server 2008 R2 operating systems, RAS is part of a more comprehensive remote access package called the RRAS (Routing and Remote Access Service). RRAS is described in the following section.

Remote Access Servers
The preceding section described dial-up networking, a type of remote access method defined by its direct, PSTN-based connection method. However, users who previously depended on dial-up connections are increasingly adopting broadband connections, such as DSL and cable. This section and following sections describe services that can accept remote access connections from a client, no matter what type of Internet access it uses. As you have learned, remote access allows a client that is not directly attached to a LAN or WAN to connect and log on to that network. A remote client attempting to connect to a LAN or WAN requires a server to accept its connection and grant it privileges to the network’s resources. Many types of remote access servers exist. Some are devices dedicated to this task, such as Cisco’s AS5800 access servers. These devices run software that, in conjunction with their operating system, performs authentication for clients and communicates via dial-up networking protocols. Other types of remote access servers are computers running special software that enables them to accept incoming client connections and grant clients access to resources. RRAS (Routing and Remote Access Service) is Microsoft’s remote access software, available with the Windows Server 2003, Server 2008, and Server 2008 R2 network operating systems and the Windows XP, Vista, and 7 desktop operating systems. RRAS enables a computer to accept multiple remote client connections over any type of transmission path. It also enables the server to act as a router, determining where to direct incoming packets across the network.


Further, RRAS incorporates multiple security provisions to ensure that data cannot be intercepted and interpreted by anyone other than the intended recipient and to ensure that only authorized clients can connect to the remote access server. Figure 10-12 on page 462 illustrates how clients connect with a remote access server to log on to a LAN. Remote access servers depend on several types of protocols to communicate with clients, as described in the following section.

Remote Access Protocols
To exchange data, remote access servers and clients require special protocols. The SLIP
(Serial Line Internet Protocol) and PPP (Point-to-Point Protocol) are two protocols that enable a workstation to connect to another computer using a serial connection (in the case of dial-up networking, serial connection refers to a modem). Such protocols are necessary to transport Network layer traffic over serial interfaces, which belong to the Data Link layer of the OSI model. Both SLIP and PPP encapsulate higher-layer networking protocols, such as TCP and IP, in their lower-layer data frames. SLIP is an earlier and less-sophisticated version of the protocol than PPP. For example, SLIP can carry only IP packets, whereas PPP can carry many different types of Network layer packets. Because of its primitive nature, SLIP requires significantly more setup than PPP. When using SLIP, you typically must specify the IP addresses for both your client and for your server in your dial-up networking profile. PPP, on the other hand, can automatically obtain this information as it connects to the server. PPP also performs error correction and data compression, but SLIP does not. In addition, SLIP does not support data encryption, which makes it less secure than PPP. For all these reasons, PPP is the preferred communications protocol for remote access communications. Another difference between SLIP and PPP is that SLIP supports only asynchronous data transmission, whereas PPP supports both asynchronous and synchronous transmission. As you learned earlier, in synchronous transmission, data must conform to a timing scheme, whereas asynchronous transmission may stop and start sporadically. In fact, asynchronous transmission was designed for communication that happens at random intervals, such as sending the keystrokes of a person typing on a remote keyboard. Thus, it is well suited for use on modem connections. When PPP is used over an Ethernet network (no matter what the connection type), it is known as PPPoE (PPP over Ethernet). PPPoE is the standard for connecting home computers to an ISP via DSL or broadband cable. When you sign up for broadband cable or DSL service, the ISP supplies you with connection software that is configured to use PPPoE. Figure 10-13 on page 464 illustrates how the protocols discussed in this section and commonly used to establish a broadband Internet connection fit in the OSI model. (The Application layer protocol RDP, discussed in the following section, is only used when remotely controlling computers. Several different Application layer protocols, including HTTP or FTP, could be substituted for RDP in Figure 10-13.)

Remote Virtual Computing
So far, you have learned about dial-up networking and remote access servers, which are designed to allow many clients to log on to a network from afar. Sometimes, however, it’s necessary for one workstation to remotely access and control another workstation. For example, suppose a traveling salesperson must submit weekly sales figures to her home office every Friday afternoon. While out of town, she discovers a problem with her spreadsheet program, which should automatically calculate her sales figures (for example, the percentage of a monthly quota she’s reached for any given product) after she enters the raw data. She calls the home office, and a support technician attempts to resolve her issue on the phone. When this doesn’t work, the technician may decide to run a remote virtual computing program and “take over” the salesperson’s laptop (via a WAN link) to troubleshoot the spreadsheet problem. Every keystroke and mouse click the technician enters on his workstation is then issued to the salesperson’s laptop.
After the problem is resolved, the technician can disconnect from the salesperson’s laptop.
Remote virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection. The connection could be a dedicated WAN link (such as a T1), an Internet connection, or even a dial-up connection established directly between the client’s modem and the host’s modem. Also, the host must be configured to allow access from the client by setting username or computer name and password credentials. A host may allow clients a variety of privileges, from merely viewing the screen to running programs and modifying data files on the host’s hard disk. After connecting, if the remote user has sufficient privileges, she can send keystrokes and mouse clicks to the host and receive screen output in return. In other words, to the remote user, it appears as if she is working on the LAN- or WAN-connected host. Remote virtual computing software is specially designed to require little bandwidth. A workstation that uses such software to access a LAN is often called a thin client because very little hard disk space or processing power is required of the workstation. Advantages to using remote virtual computing are that it is simple to configure and can run over any type of connection. This benefits anyone who must use dial-up connections or who must run processor-intensive applications such as databases. In this scenario, the data processing occurs on the host without the data having to traverse the connection to the remote workstation. Another advantage to remote virtual computing is that a single host can accept simultaneous connections from multiple clients. For example, a presenter can use this feature to establish a virtual conference in which several attendees log on to the host and watch the presenter manipulate the host computer’s screen and keyboard. Many types of remote virtual computing software exist, and they differ marginally in their capabilities, security mechanisms, and supported platforms. Three popular programs, discussed next, are Microsoft Remote Desktop, VNC (Virtual Network Computing), and Citrix’s ICA (Independent Computing Architecture).

Remote Desktop
Remote Desktop is the remote virtual computing software that comes with Windows client and server operating systems. Remote Desktop relies on RDP (Remote Desktop Protocol), which is an Application layer protocol that uses TCP/IP to transmit graphics and text quickly. RDP also carries session, licensing, and encryption information. RDP clients also exist for other operating systems, such as Linux, so you can connect from those clients to a Windows computer running Remote Desktop. Older versions of Windows operating systems, including Vista, may require additional software for Remote Desktop to work properly.

VNC (Virtual Network Computing)
VNC (Virtual Network Computing) is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation. Open source is the term for software whose code is publicly available for use and modification. As a result, anyone can change the software to enhance it or fix problems and share their modified version with others. As with Remote Desktop’s protocols, VNC’s protocols operate at the Application layer.
VNC packages have been developed for multiple computer platforms, including all modern versions of Windows, UNIX, Linux, and Mac OS X. In addition, VNC functions across platforms. That is, you can use a VNC client (or viewer, as it’s known in VNC terms) on a Windows 7 workstation to access a VNC server running Ubuntu Linux. VNC is unique among remote virtual networking systems in this ability. Besides its open source status, VNC boasts the ability to support multiple sessions on a single computer. One drawback of VNC compared with Remote Desktop is that its screen refresh rate is somewhat slower.
However, software engineers have modified VNC to use compression techniques that expedite its data transmission. In addition, security has historically been a concern with VNC, but techniques have also evolved to mitigate this concern. Some popular versions of VNC include RealVNC, Tight VNC, and UltraVNC. ICA (Independent Computing Architecture) Another system for remote virtual computing that supports multiple simultaneous server connections is Citrix System’s XenApp. With the Citrix option, remote workstations rely on proprietary software known as an ICA (Independent Computing Architecture) client to connect with a remote access server and exchange keystrokes, mouse clicks, and screen updates. Running XenApp, the remote access server makes applications available to clients and manages their connections. Citrix’s ICA client can work with virtually any operating system or application. Its ease of use and broad compatibility make the ICA client a popular method for supplying widespread remote access across an organization. Potential drawbacks to this method include the relatively high cost of Citrix’s products and the complex nature of its server software configuration.

VPNs (Virtual Private Networks)

VPNs (virtual private networks) are wide area networks that are logically defined over public transmission systems. To allow access to only authorized users, traffic on a VPN is isolated from other traffic on the same public lines. For example, a national insurance provider could establish a private WAN that uses Internet connections but serves only its agent offices across the country. By relying on the public transmission networks already in place, VPNs provide a way of constructing a convenient and relatively inexpensive WAN. In the example of a national insurance provider, the company gains significant savings by having each office connect to the Internet separately rather than leasing point-to-point connections between each office and the national headquarters. The software required to establish VPNs is usually inexpensive, and in some cases is included with other widely used software. For example, in Windows Server 2008 R2, RRAS allows you to create a simple VPN. It turns a Windows server into a remote access server and allows clients to dial into it. Alternately, clients could dial into an ISP’s remote access server, and then connect with the VPN managed by RRAS. Third-party software companies also provide VPN programs that work with Windows, UNIX, Linux, and Macintosh OS X Server network operating systems. Or VPNs can be created simply by configuring special protocols on the routers or firewalls that connect each site in the VPN. This is the most common implementation of VPNs on UNIX-based networks. Two important considerations when designing a VPN are interoperability and security. To ensure a VPN can carry all types of data in a private manner over any kind of connection, special VPN protocols encapsulate higher-layer protocols in a process known as tunneling. You can say that these protocols create the virtual connection, or tunnel, between two VPN endpoints. Based on the kinds of endpoints they connect, VPNs can be classified according to two models: site-to-site and client-to-site. In a site-to-site VPN, tunnels connect multiple sites on a WAN, as shown in Figure 10-14 on page 466. At each site, a VPN gateway encrypts and encapsulates data to exchange over the tunnel with another VPN gateway. Meanwhile, clients, servers, and other hosts communicate with the VPN gateway and do not have to run special VPN software. They simply send and receive data to and from the VPN gateway. In a client-to-site VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway, as shown in Figure 10-15 on page 467. Each client on a client-to-site VPN must run VPN software to create the tunnel for, and encrypt and encapsulate data. This is the type of VPN typically associated with remote access. An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. The beauty of VPNs is that they are tailored to a customer’s distance, user, and bandwidth needs, so, of course, every one is unique.


However, all share the characteristics of privacy achieved over public transmission facilities using encryption and encapsulation. As you have learned, encapsulation involves one protocol adding a header to data received from a higher-layer protocol. A VPN tunneling protocol operates at the Data Link layer and encapsulates Network layer packets, no matter what Network layer protocol is used. Two major types of tunneling protocols are used on contemporary VPNs: PPTP or L2TP.

PPTP (Point-to-Point Tunneling Protocol) is a Layer 2 protocol developed by Microsoft that expands on PPP by encapsulating it so that any type of PPP data can traverse the Internet masked as an IP transmission. PPTP supports the encryption, authentication, and access services provided by RRAS. Users can either dial directly into an RRAS access server that’s part of the VPN, or they can dial into their ISP’s remote access server first, and then connect to a VPN. Either way, data is transmitted from the client to the VPN using PPTP. Windows, UNIX, Linux, and Macintosh clients are all capable of connecting to a VPN using PPTP. PPTP is easy to install, and is available at no extra cost with Microsoft networking services. However, it provides less-stringent security than other tunneling protocols.

Another VPN tunneling protocol is L2TP (Layer 2 Tunneling Protocol), based on technology developed by Cisco and standardized by the IETF. It encapsulates PPP data in a similar manner to PPTP, but differs in a few key ways. Unlike PPTP, L2TP is a standard accepted and used by
multiple different vendors, so it can connect a VPN that uses a mix of equipment types—for example, a Juniper router, a Cisco router, and a Netgear router. Also, L2TP can connect two routers, a router and a remote access server, or a client and a remote access server. Another important advantage to L2TP is that tunnel endpoints do not have to reside on the same packet-switched network. In other words, an L2TP client could connect to a router running L2TP on an ISP’s network. The ISP could then forward the L2TP frames to another VPN router or gateway, without interpreting the frames. This L2TP tunnel, although not direct from node to node, remains isolated from other traffic. Because of its many advantages, L2TP is more commonly used than PPTP. PPTP and L2TP are not the only protocols that can be used to carry VPN traffic. For networks in which security is critical, it is advisable to use protocols that can provide both tunneling and data encryption. Such protocols are discussed in detail in Chapter 11, which focuses on network security.

Cloud Computing

On network diagrams, the Internet is frequently depicted as a cloud. This representation arose from the packet-switched nature of data transmission over the Internet. In packet switching, as you know, each datagram can follow one of many paths to reach its destination. More recently, the cloud on networking diagrams has grown to take on new meanings, thanks in large part to the marketing efforts of network service providers. Cloud computing refers to the flexible provision of data storage, applications, or services to multiple clients over a network. The term includes a broad range of offerings, from hosting Web sites to delivering specialized applications to providing virtual servers for collaboration or software development. However, all cloud computing is distinguished by the following:

Self-service and on demand—Services, applications, and storage in a cloud are available to users at any time, upon the user’s request. For example, if you subscribe to Google’s Gmail or Google Docs service, you can log on and access your mail and documents whenever you choose.

Elastic—The term elastic in cloud computing means that services and storage capacity can be quickly and dynamically—sometimes even automatically—scaled up or down.
For example, if your database server on the cloud grows and needs additional hard disk space, it can expand without you having to alert the service provider. In fact, your server can be configured in such a way as to require no intervention in this case. The amount of space you can add and the flexibility with which it can be added depend on your agreement with the service provider. Elastic also means that storage space can be reduced, and that applications and clients can be added or removed, upon demand.

Support for multiple platforms—Clients of all types, including smartphones, laptops, desktops, thin clients, and tablet computers, can access services, applications, and storage in a cloud, no matter what operating system they run or where they are located, as long as they have a network connection.

Resource pooling and consolidation—In the cloud, as on host computers that contain multiple virtual machines, resources such as disk space, applications, and services are consolidated. That means one cloud computing provider can host hundreds of Web sites for hundreds of different customers on just a few servers. This is an example of a multitenant model, in which multiple customers share storage locations or services without knowing it. In another example of resource pooling, a single backup program might ensure that the Web sites are backed up several times a day.

Metered service—Whether the cloud provides applications, desktops, storage, or services, its use is measured. A service provider might limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers.

An organization that develops software might choose to keep its test platform on a server in the cloud, rather than on a server in its computer room. Suppose it employs dozens of developers on one project, and these developers, half of them working from home, are located in six different countries. By contracting with a cloud services organization to host its server, the software company can ensure continuous, easy access for its developers, no matter where they are or what type of computer they use. Developers can load any kind of software on the server and test it from afar. If more hard disk space is needed, that can be dynamically allocated. In addition, the cloud services provider can make sure the development server is secure and regularly backed up. In this case, cloud computing removes the burden of managing the server from the company’s IT personnel. Figure 10-16 on page 469 illustrates this type of cloud computing. You probably recognize that the characteristics of cloud computing resemble those associated with virtualization. In fact, most cloud service providers use virtualization software to supply multiple platforms to multiple users. For example, industry leaders Rackspace and Amazon (in its Elastic Compute Cloud, or EC2, service) use Xen virtualization software to create virtual environments for their customers. In addition to virtual servers, cloud computing can provide virtual desktops, which are desktop operating environments hosted virtually, on a different physical computer from the one the user interacts with. The term cloud computing also includes NaaS (Network as a Service), in which a service provider offers its customers a complete set of networking services. For example, the owner of a start-up specialty foods company with few employees and zero technical expertise might choose to outsource all of the company’s networking functions, such as mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity, to a cloud computing service provider. Some IT professionals use a term with even broader meaning, XaaS, which stands for Anything as a Service, or sometimes Everything as a Service. In that model, the cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Cloud services may be managed and delivered by a service provider over public transmission lines, such as the Internet, on a public cloud. Most of the examples in this section take place in public clouds. However, an organization with sufficient technical expertise on staff might establish a private cloud on its own servers in its own data center. This arrangement allows an organization to use existing hardware and connectivity, potentially saving money. It might also be preferable where network administrators want to ensure that resources are secure. Despite public cloud service providers’ warranties of privacy and security, these remain significant concerns for many potential customers.

Chapter Summary

·         Virtualization is the emulation of a computer, operating system environment, or application on a physical system. One host computer can support many VMs (virtual machines). VMs, also called guests, share the physical computer’s CPU, hard disk, memory, and network interfaces. Yet each functions independently, with its own logically defined hardware resources, operating system, applications, and network interfaces.

·         VMs exist as files on the hard disk of the physical computer. These files contain the operating system, applications, data, and configurations for the VMs.

·         The software that allows you to define VMs and manages resource allocation and sharing among them is known as a virtual machine manager, or, more commonly, a hypervisor. Hypervisors are part of all virtualization programs, of which VMware is the most popular. Other virtualization programs include Hyper-V, KVM (Kernel-based Virtual Machine), and VirtualBox.

·         Advantages of virtualization include efficient use of resources; cost and energy savings, which can contribute to sustainability; fault and threat isolation; and simple backups, recovery, and replication.

·         Potential disadvantages of virtualization include compromised performance, increased complexity, increased licensing fees, and a single point of failure.

·         To connect to a network, a virtual machine requires a virtual adapter, or vNIC (virtual NIC). Just like a physical NIC, a vNIC operates at the Data Link layer and provides the computer with network access. Each VM may have several vNICs, no matter how many NICs the host machine has.

·         A virtual switch is a logically defined device that operates at the Data Link layer. Ports on a virtual switch connect vNICs with a network, whether virtual or physical, through the host’s physical NIC. A virtual switch allows VMs to communicate with each other and with nodes on a physical LAN or WAN.

·         Virtual switches reside in the RAM of the physical computers that act as their hosts, while their configuration resides in a separate file on the host’s hard disk. One host can support multiple virtual switches. The hypervisor controls the virtual switches. In Hyper-V, a virtual switch is called a virtual network.

·         When you configure a vNIC, you are asked to identify what type of network connection or networking mode the adapter will use. The most frequently used network connection types include bridged, NAT, and host-only.

·         In bridged mode, a vNIC accesses a physical network using the host machine’s NIC and obtains its own IP address, default gateway, and netmask from a DHCP server on the physical LAN. When connected using bridged mode, a VM appears to other nodes as just another client or server on the network. Bridged mode is best used for VMs that must be available at a specific address, such as mail servers or Web servers.

·         In the NAT networking mode, a VM relies on the host machine to act as a NAT device. It obtains IP addressing information from the DHCP service in the host’s virtualization software. A vNIC operating in NAT mode can still communicate with other nodes on the network and vice versa. However, other nodes communicate with the host machine’s IP address to reach the VM; the VM itself is invisible to other nodes. NAT networking mode is appropriate for clients that do not need to be addressed directly and at a specific address by other nodes.

·         In host-only networking mode, VMs on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host to create an isolated, all-virtual network. In host-only mode, as in NAT mode, VMs use the DHCP service in the host’s virtualization software to obtain IP address assignments. Host-only networking mode is best used for test environments.

·         A virtual appliance is an image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for the package to run properly. Popular uses for virtual appliances include firewall and other security measures, network management, e-mail solutions, and remote access.

·         VLANs are subnets logically defined on a physical switch that allow network administrators to separate network traffic for better performance, customized address management, and security. On a network that uses virtual machines, VLANs will typically include those VMs.

·         To add VMs to a VLAN defined on a physical network, you modify a virtual switch’s configuration. In other words, VMs are not added to a preexisting VLAN on the physical switch that manages that VLAN.

·         In VMware, vNICs are associated with port groups, which can be assigned to VLANs. Multiple vNICs can be assigned to a single port group. Also, a single vNIC can be assigned to multiple port groups. In other virtualization programs, vNICs are assigned to VLANs by associating them directly with a VLAN number or with a bridge that is, in turn, associated with a VLAN.

·         For VLANs to include vNICs, the host machine’s physical NIC must be configured to operate in trunking mode. In other words, it must be capable of carrying the traffic of multiple VLANs. Virtualization software refers to the physical NIC, acting as an interface for VLANs, as a trunk.


·         As a remote user, you can connect to a LAN or WAN in one of several ways: dial-up networking, connecting to a remote access server, remote virtual computing, or through a VPN (virtual private network).

·         Dial-up networking involves a remote client dialing into a remote access server and connecting via a PSTN, X.25, or ISDN connection. The client must run dial-up software to initiate the connection, and the server runs specialized remote access software to accept and interpret the incoming signals.

·         Remote access servers accept incoming connections from remote clients, authenticate users, allow them to log on to a LAN or WAN, and exchange data by encapsulating higher-layer protocols, such as TCP and IP in specialized protocols such as PPP. The Microsoft RRAS (Routing and Remote Access Service) is the remote access software that comes with the Windows operating systems.

·         To exchange data, remote access servers and clients must communicate through special Data Link layer protocols, such as PPP (Point-to-Point Protocol) or SLIP (Serial Line Internet Protocol), that encapsulate higher-layer protocols, such as TCP and IP. PPP is the preferred protocol. When PPP is used on an Ethernet network, as is the case with most modern broadband Internet connections, it is called PPP over Ethernet, or PPPoE.

·         Remote virtual computing uses specialized client and host software to allow a remote user to connect via modem to a workstation that is part of a LAN. Once the connection is made, the remote user can control that workstation, performing functions just as if she were directly connected to the LAN.

·         Remote Desktop is a remote virtual computing client and server package that comes with Windows operating systems. VNC (Virtual Network Computing) refers to an open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. ICA (Independent Computing Architecture) provides the basis for Citrix Systems’ proprietary remote virtual computing software.

·         By creating a VPN (virtual private network), you can construct a WAN from existing public transmission systems. A VPN offers connectivity only to an organization’s users, while keeping the data secure and isolated from other (public) traffic. To accomplish this, VPNs may be software or hardware based. Either way, they depend on secure protocols and transmission methods to keep data private.

·         To make sure a VPN can carry all types of data in a private manner over any kind of connection, special VPN protocols encapsulate higher-layer protocols via tunneling. Common tunneling protocols include PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol). Additional VPN protocols are discussed in Chapter 11, which focuses on network security.

·         Cloud computing refers to the flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and allows users from anywhere using any kind of client to access them. Further, cloud computing is elastic (that is, it can be quickly and easily scaled up or down). It is also metered, meaning that usage can be measured. Finally, it is available on demand.

·         In NaaS (Network as a Service), a service provider offers its customers a complete set of networking services. XaaS, which stands for “Anything as a Service” or sometimes “Everything as a Service,” includes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.

·         Cloud services may be managed and delivered by a service provider over public transmission lines, such as the Internet, on a public cloud, or on an organization’s servers and internal network in a private cloud.

Key Terms

Anything as a Service See XaaS.

authentication The process of comparing and matching a client’s credentials with the credentials in the NOS user database to enable the client to log on to the network.

client-to-site VPN A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway. Each client on a client-to-site VPN must run VPN software to create the tunnel for, and encrypt and encapsulate data.

cloud computing The flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and is elastic, metered, self-service, multiplatform, and available on demand.

credentials A user’s unique identifying characteristics that enable him to authenticate with a server and gain access to network resources. The most common credentials are a username and a password.

 dial-up networking The process of dialing into a remote access server to connect with
a network, be it private or public.

 elastic A characteristic of cloud computing that means services can be quickly and dynamically—sometimes even automatically—scaled up or down.

 Everything as a Service See XaaS.

 guest In the context of virtualization, a virtual machine operated and managed by a virtualization program.

 host In the context of virtualization, the physical computer on which virtualization software operates and manages guests.

 Hyper-V Microsoft’s virtualization software package. Hyper-V operates with Windows
Server 2008 and Windows Server 2008 R2.

 hypervisor The element of virtualization software that manages multiple guest
machines and their connections to the host (and by association, to a physical network).
A hypervisor is also known as a virtual machine manager.


ICA (Independent Computing Architecture) The software from Citrix Systems, Inc., that, when installed on a client, enables the client to connect with a host computer and exchange keystrokes, mouse clicks, and screen updates. Citrix’s ICA client can work with virtually any operating system or application.

Kernel-based Virtual Machine See KVM.

KVM (Kernel-based Virtual Machine) An open source virtualization package designed for use with Linux systems.

L2TP (Layer 2 Tunneling Protocol) A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers’ equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks.

Layer 2 Tunneling Protocol See L2TP.

 multitenant A feature of cloud computing in which multiple customers share storage locations or services without knowing it.

 NaaS (Network as a Service) A type of cloud computing that offers clients a complete
set of networking services—for example, mail, Web, DNS, DHCP, and remote access
services, plus LAN and WAN connectivity.

 Network as a Service See NaaS.

open source The term that describes software whose code is publicly available for use and modification.

Point-to-Point Protocol See PPP.

 Point-to-Point Protocol over Ethernet See PPPoE.

 Point-to-Point Tunneling Protocol See PPTP.

PPP (Point-to-Point Protocol) A communications protocol that enables a workstation to connect to a server using a serial connection; PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation.

 PPPoE (Point-to-Point Protocol over Ethernet) PPP running over an Ethernet network. 

 PPTP (Point-to-Point Tunneling Protocol) A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols.

 private cloud An arrangement in which shared and flexible data storage, applications, or services are managed on and delivered via an organization’s internal network.

 public cloud An arrangement in which shared and flexible data storage, applications, or services are managed centrally by service providers and delivered over public transmission lines, such as the Internet. Rackspace and Amazon (with its EC2 offering) are leading public cloud service providers.

 RAS (Remote Access Service) The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service).

 RDP (Remote Desktop Protocol) An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information.

 remote access A method for connecting and logging on to a LAN from a workstation that is remote, or not physically connected, to the LAN.

 Remote Access Service See RAS.

 Remote Desktop A feature of Windows operating systems that allows a computer to act as a remote host and be controlled from a client running another Windows operating system.

 Remote Desktop Protocol See RDP.

 Routing and Remote Access Service (RRAS) The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients.

 RRAS See Routing and Remote Access Service.

 Serial Line Internet Protocol See SLIP.

 site-to-site VPN A type of VPN in which VPN gateways at multiple sites encrypt and  encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway.

 SLIP (Serial Line Internet Protocol) A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and requires some configuration on the client workstation. SLIP has been made obsolete by PPP.

 thin client A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.

 tunnel A secured, virtual connection between two nodes on a VPN.

 tunneling The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.

 virtual adapter See vNIC.

 virtual appliance An image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for a prepackaged solution to run properly on a virtual machine.

 virtual bridge An interface connecting a vNIC with a virtual or physical network, or a port on a virtual switch.

 virtual desktop A desktop operating environment that is hosted virtually, on a different physical computer from the one the user interacts with.

 virtual machine See VM.

 virtual machine manager See hypervisor.

 Virtual Network Computing See VNC.

 virtual network interface card See vNIC.

 virtual private network See VPN.

 virtual server A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.

 virtual switch A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a virtual switch connect virtual machines with a network, whether virtual or physical, through the host’s physical NIC.

 virtual workstation A workstation that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.

 VirtualBox A virtualization software platform from Oracle.

 virtualization The emulation of a computer, operating system environment, or application on a physical system.

 VM (virtual machine) A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer’s CPU, hard disk, memory, and network interfaces.

 VMware A vendor that supplies the most popular types of workstation and server virtualization software. Used casually, the term VMware may also refer to the virtualization software distributed by the company.

 VNC (Virtual Network Computing) An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.

 vNIC (virtual network interface card) A logically defined network interface associated with a virtual machine.
 VPN (virtual private network) A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated from other (public) traffic.

 XaaS (Anything as a Service, or Everything as a Service) A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.

 Xen An open source virtualization software platform from Citrix Systems.

Review Questions

1. Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine?
a. Virtualization will improve the servers’ performance.
b. Virtualization will conserve resources.
c. Virtualization will make administration easier.
d. Virtualization will save software costs.

2. Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?
a. They can only belong to one VLAN. 
b. They cannot be addressed by clients on a physical LAN.
c. They cannot be assigned Internet-routable IP addresses.
d. They exist as files on the hard drive of their host.

3. You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM’s hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?
a. Virtual switch
b. Virtual adapter
c. Hypervisor
d. Virtual network manager

4. You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address of your host machine’s NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server? 
a. 192.168.25.1
b. 192.168.25.83
c. 192.168.0.0
d. Not enough information to draw a conclusion

5. Which of the following is the default networking type assigned to vNICs in most virtualization programs?
a. Host-only
b. Grouped
c. NAT
d. Bridged
6. You have decided to create four virtual Web servers on a Windows 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet?
a. Private virtual network
b. Host virtual network
c. External virtual network
d. Internal virtual network

7. You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the machine’s operating system to stop working. What happens as a consequence?
a. Your VM’s operating system stops working.
b. The host machine’s operating system stops working.
c. Your VM and the host machine work as usual, but performance of all the VMs is compromised.
d. Nothing changes for your VM.

8. Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?
a. From the host machine’s virtualization software
b. From the DHCP server on the physical network
c. From the router on the physical network
d. From another VM on the host machine that’s configured to act as a DHCP server

9. Which of the following network configuration types is best used for a company’s e-mail server?
a. Host-only
b. Bridged
c. NAT
d. Grouped

10. Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on?
a. Host-only
b. Bridged
c. NAT
d. Grouped

11. You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers? 
a. 1
b. 2
c. 4
d. It depends on the virtualization software.



12. Because of the functions it performs, each port on a virtual switch can also be considered a:
a. Virtual machine
b. Virtual bridge
c. Virtual router
d. Virtual firewall

13. You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker’s virtual machines to the new VLAN?
a. On your host workstation, where you established the new VLAN
b. On the LAN switch, which manages the VLAN
c. On your friend’s host workstation, where the virtual machines reside
d. On the LAN router, which directs traffic between VLANs

14. How must a physical NIC be configured so that it can connect its host’s VMs to multiple VLANs?
a. As a trunk
b. As a port group
c. As a channel
d. As a team

15. To complete its VPN connection, your computer is using RDP. Which of the following VPN types are you participating in?
a. Site-to-link
b. Site-to-site
c. Link-to-client
d. Client-to-site

16. In which of the following situations would you use RDP?
a. To enable someone else to control your workstation, which is running a Windows operating system
b. To establish a VPN between your home workstation and your office LAN
c. To remotely control a distant workstation that's running a UNIX or Linux operating system
d. To manage a pool of modems available for multiple users to log onto your network from a distance

17. You have decided to set up a VPN between your home and your friend's home so that you can run a private digital telephone line over your DSL connections. Each of you has purchased a small Cisco router for terminating the VPN endpoints. Which of the following protocols could you use to create a tunnel between these two routers?
a. L2TP
b. PPTP
c. PP2T
d. SLIP

18. A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP's data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN?
a. At least a fractional T1 connection to the Internet
b. At least a T1 connection to the Internet
c. At least a T3 connection to the Internet
d. Any type of Internet connection

19. Which of the following functions makes VPN protocols unique?
a. The ability to precisely time packet delivery
b. The ability to interpret both frames and datagrams
c. The ability to create tunnels
d. The ability to detect eavesdropping

20. As a business owner, you have decided to outsource all of your company’s IT services to a cloud computing service provider. How can your clients and employees access these services?
a. From a smartphone using cellular signals
b. From a desktop workstation attached to a DSL Internet connection
c. From a server at an office overseas, using a T1
d. All of the above

Practice Test

1. Virtualization is the emulation of a computer, operating system environment, or application on a physical system.
a.       True
b.      False
 
 2. Nbtstat is useful only on networks that run Windows-based operating systems and ____.
NetBIOS

 3. When designing a network to share an Internet connection, most network administrators prefer using a router or switch rather than ICS, because ICS typically requires more configuration.
a.       True
b.      False

4. To calculate a host's network ID given its IPv4 address and subnet mask, you follow a logical process of combining bits known as ANDing.
a.       True
b.      False

5.  ____ identifies each element of a mail message according to content type.
a.       MIME
b.      Multipurpose Internet Mail Extensions


 6. Many remote access methods exist, and they vary according to the type of transmission technology, clients, hosts, and software they can or must use.
a.       True
b.      False

7. Traditional dial-up networking can provide the quality required by many network applications.
a.       True
b.      False

8. DNAT (Dynamic Network Address Translation) may also be called ____.
IP masquerading

 9. Two important considerations when designing a VPN are _____ and security.
a.       reliability
b.      interoperability
c.       availability
d.      performance

10. VMs that must be available at a specific address, such as mail servers or Web servers, should be assigned host-only network connections.
a.       True
b.      False

11. If you use the ____ command without any switches, it will display a list of all the active TCP/IP connections on your machine, including the Transport layer protocol used (UDP or TCP), packets sent and received, IP address, and state of those connections.
a.       ipconfig
b.      nslookup
c.       traceroute
d.      netstat

12. A ____ is one that any user may access with little or no restrictions.
a.       private network
b.      CIDR notation
c.       public network
d.      core gateway

13. When working on a UNIX or Linux system, you can limit the maximum number of router hops the traceroute command allows by using the -m switch.
a.       True
b.      False

14. Many types of remote virtual computing software exist, and they differ significantly in their capabilities, security mechanisms, and supported platforms.
a.       True
b.      False



15. E-mail servers and clients communicate through special TCP/IP ____ layer protocols.
a.       Network
b.      Presentation
c.       Application
d.      Transport

16. In _____ networking mode, VMs on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host.
a.       host-only
b.      bridged
c.       NAT
d.      network-only

17. To add VMs to a VLAN defined on a physical network, you modify a switch’s configuration.
a.       True
b.      False


18. A subnet created by moving the subnet boundary to the left is known as a(n) ____.
supernet

19.  ____ is useful when operating a mail server, for example, whose address must remain the same for clients to reach it at any time.
a.       SNAT
b.      ARP
c.       DNAT
d.      PAT

20. MIME has replaced SMTP.
a.       True
b.      False

21. When multiple virtual machines contend for finite physical resources, one virtual machine could _____ those resources and impair the performance of other virtual machines on the same computer.
a.       reframe
b.      repair
c.       monopolize
d.      optimize

Chapter Test

1.  ____ connect vNICs with a network, whether virtual or physical.
a.       Virtual duplexers
b.      Virtual bridges
c.       Virtual routers
d.      Virtual crossovers

 
2. A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
a.       True
b.      False

3.  ____ is the most widely implemented virtualization software today.
a.       Citrix
b.      VirtualBox
c.       VMware
d.      Hyper-V

4. In bridged mode, a(n) ____________________ accesses a physical network using the host machine’s NIC.
vNIC
 
5.  The physical computer on a virtual machine is known as a ____.
a.       guest
b.      client
c.       server
d.      host

6. A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
a.       fat client
b.      thin client
c.       virtual client
d.      thick client

7.   ____ is the remote virtual computing software that comes with Windows client and server operating systems.
a.       Remote Desktop
b.      Remote Windows
c.       Remote Client
d.      Remote Server

8. Upon creation, each vNIC is automatically assigned a ____.
a.       block address
b.      switch address
c.       reference address
d.      MAC address
 
9. In ____, each datagram can follow one of many paths to reach its destination.
a.       circuit switching
b.      packet switching
c.       line switching
d.      data switching



10.  ____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
a.       Material
b.      Virtual
c.       Physical
d.      Guest

11. The software required to establish VPNs is usually expensive.
a.       True
b.      False

12. Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
a.       True
b.      False

13. VPNs can be classified based on the kinds of ____ they connect.
a.       hardware
b.      circuits
c.       endpoints
d.      software

14. ____ are wide area networks that are logically defined over public transmission systems.
a.       Private lines
b.      VPNs
c.       Dial-up lines
d.      Leased lines

15. In a ____ VPN, tunnels connect multiple sites on a WAN.
a.       client-to-client
b.      link-to-line
c.       site-to-client
d.      site-to-site

16. A VPN tunneling protocol operates at the ____ layer.
a.       Data Link
b.      Network
c.       Application
d.      Session

17. In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
a.       reference machine
b.      guest machine
c.       management machine
d.      host machine



18. To connect to a network, a virtual machine requires a ____.
a.       virtual adapter
b.      virtual switch
c.       physical switch
d.      virtual MAC address

19.  ____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
a.       Blocked
b.      NAT
c.       Bridged
d.      Host-only
 
20.    ____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
a.       Remote Desktop
b.      Citrix
c.       VNC
d.      Xen

21.  ____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
Cloud computing
 
 22. The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
virtual machine manager
 
23. In the case of dial-up networking, the term ____ refers to a modem.
a.       virtual connection
b.      POTS connection
c.       serial connection
d.      physical connection

24. In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
client-to-site
 
25. A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
Virtual switch