Home > Store

Networking for VMware Administrators

Register your product to gain access to bonus material or receive a coupon.

Networking for VMware Administrators

Book

  • Sorry, this book is no longer in print.
Not for Sale

eBook (Watermarked)

  • Your Price: $42.39
  • List Price: $52.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 7" x 9-1/8"
  • Pages: 368
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-351108-1
  • ISBN-13: 978-0-13-351108-6

The one-stop guide to modern networking for every VMware® administrator, engineer, and architect

Now that virtualization has blurred the lines between networking and servers, many VMware specialists need a stronger understanding of networks than they may have gained in earlier IT roles. Networking for VMware Administrators fills this crucial knowledge gap. Writing for VMware professionals, Christopher Wahl and Steve Pantol illuminate the core concepts of modern networking, and show how to apply them in designing, configuring, and troubleshooting any virtualized network environment.

Drawing on their extensive experience with a wide range of virtual network environments, the authors address physical networking, switching, storage networking, and several leading virtualization scenarios, including converged infrastructure.

Teaching through relevant examples, they focus on foundational concepts and features that will be valuable for years to come. To support rapid learning and mastery, they present clear learning objectives, questions, problems, a complete glossary, and extensive up-to-date references.

Coverage includes:

• The absolute basics: network models, layers,  and interfaces, and why they matter

• Building networks that are less complex,  more modular, and fully interoperable

• Improving your virtual network stack: tips, tricks, and techniques for avoiding common pitfalls

• Collaborating more effectively with network  and storage professionals

• Understanding Ethernet, Advanced Layer 2, Layer 3, and modern converged infrastructure

• Mastering virtual switching and understanding how it differs from physical switching

• Designing and operating vSphere standard  and distributed switching

• Working with third-party switches, including Cisco Nexus 1000V

• Creating powerful, resilient virtual networks to handle critical storage network traffic

• Deploying rackmount servers with 1 Gb and  10 Gb Ethernet

• Virtualizing blade servers with converged  traffic and virtual NICs

Christopher Wahl has acquired well over a decade of IT experience in enterprise infrastructure design, implementation, and administration. He has provided architectural and engineering expertise in a variety of virtualization, data center, and private cloud based engagements while working with high performance technical teams in tiered data center environments. He currently holds the title of Senior Technical Architect at Ahead, a consulting firm based out of Chicago.

Steve Pantol has spent the last 14 years wearing various technical hats, with the last seven or so focused on assorted VMware technologies. He is a Senior Technical Architect at Ahead, working to build better datacenters and drive adoption of cloud technologies.

Extras

Tips

Readers please note that the authors don't recommend mixing VPC and iSCSI, so it is not an example in the book. For more information about this see: http://wahlnetwork.com/2014/03/25/avoid-lacp-iscsi-port-binding-multi-nic-vmotion/ and http://wahlnetwork.com/2014/02/19/exploring-enhanced-lacp-support-vsphere-5-5/

Author's Site

Please visit the author's site here

Sample Content

Online Sample Chapter

Networking for VMware Administrators: The vSphere Standard Switch

Sample Pages

Download the sample pages (includes Chapter 8 and Index)

Table of Contents

Foreword xix

Introduction xxi

Part I Physical Networking 101

Chapter 1 The Very Basics 1

Key Concepts 1

Introduction 1

Reinventing the Wheel 2

Summary 6

Chapter 2 A Tale of Two Network Models 7

Key Concepts 7

Introduction 7

Model Behavior 9

    Layering 9

    Encapsulation 9

The OSI Model 10

The TCP/IP Model 12

    The Network Interface Layer 12

    The Internet Layer 13

    The Transport Layer 14

    The Application Layer 14

    Comparing OSI and TCP/IP Models 15

Summary 16

Chapter 3 Ethernet Networks 17

Key Concepts 17

Introduction 17

Ethernet 18

    History and Theory of Operation 18

    Ethernet Standards and Cable Types 19

    Ethernet Addressing 23

Extending Ethernet Segments: Repeaters, Hubs, and Switches 24

    Switching Logic 25

Summary 26

Chapter 4 Advanced Layer 2 27

Key Concepts 27

Introduction 27

    Concepts 28

    Trunking 30

Loop Avoidance and Spanning Tree 32

    Spanning Tree Overview 32

    PortFast 35

    Rapid Spanning Tree 35

Link Aggregation 36

    What Is Link Aggregation? 36

    Dynamic Link Aggregation 39

    Load Distribution Types 41

Summary 42

Reference 43

Chapter 5 Layer 3 45

Key Concepts 45

Introduction 45

The Network Layer 46

    Routing and Forwarding 46

    Connected, Static, and Dynamic Routes 46

    The Gateway of Last Resort 47

IP Addressing and Subnetting 47

    Classful Addressing 48

    Classless Addressing 48

    Reserved Addresses 50

Network Layer Supporting Applications 50

    DHCP 50

    DNS 51

    ARP 51

    Ping 52

Summary 52

Chapter 6 Converged Infrastructure 53

Key Concepts 53

Introduction 53

Concepts 54

    Converged Infrastructure Advantages 54

Examples 55

    Cisco UCS 55

    HP BladeSystem 57

    Nutanix Virtual Computing Platform 59

Summary 60

Part II Virtual Switching

Chapter 7 How Virtual Switching Differs from Physical Switching 61

Key Concepts 61

Introduction 61

Physical and Virtual Switch Comparison 62

    Similarities 62

    Differences 63

    Switching Decisions 63

Physical Uplinks 65

    Host Network Interface Card (NIC) 65

Virtual Ports 66

    Virtual Machine NICs 67

    VMkernel Ports 67

    Service Console 67

VLANs 68

    External Switch Tagging (EST) 68

    Virtual Switch Tagging (VST) 68

    Virtual Guest Tagging (VGT) 69

Summary 70

Chapter 8 vSphere Standard Switch 71

Key Concepts 71

Introduction 71

The vSphere Standard Switch 72

    Plane English 72

    Control Plane 72

    Data Plane 73

vSwitch Properties 73

    Ports 73

    Maximum Transmission Unit (MTU) 74

Security 75

    Promiscuous Mode 75

    MAC Address Changes 76

    Forged Transmits 77

Discovery 78

    Cisco Discovery Protocol (CDP) 79

Traffic Shaping 80

    Traffic Shaping Math 82

NIC Teaming 82

    Load Balancing 83

    Network Failure Detection 84

    Notify Switches 86

    Failback 86

    Failover Order 87

Hierarchy Overrides 87

VMkernel Ports 88

    Port Properties and Services 88

    IP Addresses 89

VM Port Groups 90

Summary 91

Chapter 9 vSphere Distributed Switch 93

Key Concepts 93

Introduction to the vSphere Distributed Switch 93

    Control Plane 94

    Handling vCenter Failure 94

    Data Plane 96

Monitoring 96

    Cisco Discovery Protocol (CDP) 97

    Link Layer Discovery Protocol (LLDP) 97

    NetFlow 98

    Port Mirroring 101

Private VLANs 105

    Primary VLAN 106

    Promiscuous VLAN 106

    Secondary VLANs 106

    Community VLANs 107

    Isolated VLAN 108

Distributed Port Groups 108

    VMkernel Ports 109

    Virtual Machines 110

Traffic Shaping 111

    Egress 111

Load Balancing 112

    Route Based on Physical NIC Load 112

Network I/O Control 115

    Network Resource Pools 116

    Shares 117

    User-Defined Network Resource Pools 119

Summary 120

Chapter 10 Third Party Switches–1000V 121

Key Concepts 121

Introduction 121

Integration with vSphere 122

    Architectural Differences 123

Virtual Supervisor Module 124

    Port Profiles 126

Virtual Ethernet Module 128

    Layer 2 Mode 129

    Nexus 1000V in Layer 3 Mode 130

    VEM Maximums 132

Advanced Features 132

    A Comment on Nexus OS 132

Licensed Modes of Operation 132

    Essential Edition 133

    Advanced Edition 133

Summary 134

Chapter 11 Lab Scenario 135

Key Concepts 135

Introduction 135

Building a Virtual Network 135

Architectural Decisions 136

    Network Design 136

    Host Design 137

    Data Traffic Design for Virtual Machines 138

Lab Scenario 139

Summary 143

Chapter 12 Standard vSwitch Design 145

Key Concepts 145

Introduction 145

Standard vSwitch Design 146

    Sample Use Case 146

    Naming Conventions 147

Ensuring Quality of Service 149

Network Adapters 151

Virtual Machine Traffic 153

    Virtual Machine Port Groups 153

    Failover Order 156

VMkernel Ports 158

    Management 158

    vMotion 161

    Fault Tolerance 166

    NFS Storage 168

    VMkernel Failover Overview 170

Final Tuning 172

Confi guring Additional vSphere Hosts 173

Summary 173

Chapter 13 Distributed vSwitch Design 175

Key Concepts 175

Introduction 175

Distributed vSwitch Design 176

    Use Case 176

    Naming Conventions 177

Ensuring Quality of Service 178

    Network IO Control 178

    Priority Tagging with 802.1p 180

    Differentiated Service Code Point 181

Creating the Distributed vSwitch 182

Network Adapters 185

Distributed Port Groups for Virtual Machines 186

    Load Based Teaming 188

Distributed Port Groups for VMkernel Ports 190

    Management 191

    vMotion 193

    Fault Tolerance 194

    iSCSI Storage 195

    VMkernel Failover Overview 196

Adding vSphere Hosts 198

    Creating VMkernel Ports 204

    Moving the vCenter Virtual Machine 208

Final Steps 212

    Health Check 212

    Network Discovery Protocol 214

Other Design Considerations 215

    Fully Automated Design 215

    Hybrid Automation Design 216

    Which Is Right? 216

Summary 216

Part III You Got Your Storage in My Networking: IP Storage

Chapter 14 iSCSI General Use Cases 219

Key Concepts 219

Introduction 219

Understanding iSCSI 220

    Lossless Versus Best Effort Protocols 220

    Priority-Based Flow Control 220

    VLAN Isolation 222

    iSCSI with Jumbo Frames 222

iSCSI Components 223

    Initiators 224

    Targets 224

    Naming 225

    Security with CHAP 227

iSCSI Adapters 229

    Software iSCSI Adapter 230

    Dependent Hardware iSCSI Adapters 231

    Independent Hardware iSCSI Adapters 232

iSCSI Design 233

    NIC Teaming 234

    Network Port Binding 236

    Multiple vSwitch Design 236

    Single vSwitch Design 238

Boot from iSCSI 239

Summary 241

Chapter 15 iSCSI Design and Confi guration 243

Key Concepts 243

Introduction 243

iSCSI Design 244

    Use Case 244

    Naming Conventions 245

    Network Addresses 246

vSwitch Confi guration 247

    iSCSI Distributed Port Groups 247

    VMkernel Ports 250

    Network Port Binding 254

    Jumbo Frames 256

Adding iSCSI Devices 258

    iSCSI Server and Targets 258

    Authentication with CHAP 261

    Creating VMFS Datastores 263

    Path Selection Policy 265

Summary 267

Chapter 16 NFS General Use Cases 269

Key Concepts 269

Introduction 269

Understanding NFS 269

    Lossless Versus Best Effort Protocols 270

    VLAN Isolation 271

    NFS with Jumbo Frames 271

NFS Components 272

    Exports 272

    Daemons 272

    Mount Points 273

    Security with ACLs 275

Network Adapters 276

NFS Design 276

    Single Network 277

    Multiple Networks 278

    Link Aggregation Group 280

Summary 283

Chapter 17 NFS Design and Confi guration 285

Key Concepts 285

Introduction 285

NFS Design 285

    Use Case 286

    Naming Conventions 286

    Network Addresses 287

vSwitch Confi guration 288

    NFS vSwitch 288

    Network Adapters 290

    VMkernel Ports 291

Mounting NFS Storage 294

Summary 296

Part IV Other Design Scenarios

Chapter 18 Additional vSwitch Design Scenarios 297

Key Concepts 297

Introduction 297

Use Case 298

    Naming Standards 298

Two Network Adapters 299

    With Ethernet-based Storage 299

    Without Ethernet-based Storage 300

Four Network Ports 300

    With Ethernet-based Storage 300

    Without Ethernet-based Storage 301

Six Network Ports 302

    With Ethernet-based Storage—Six 1 Gb 303

    Without Ethernet-based Storage—Six 1 Gb 304

    With Ethernet-based Storage—Four 1 Gb + Two 10 Gb 304

    Without Ethernet-based Storage—Four 1 Gb + Two 10 Gb 305

Eight Network Adapters 306

    With Ethernet-based Storage—Eight 1 Gb 306

    Without Ethernet-based Storage—Eight 1 Gb 307

    With Ethernet-based Storage—Four 1 Gb + Four 10 Gb 308

    Without Ethernet-based Storage—Four 1 Gb + Four 10 Gb 309

Summary 310

Chapter 19 Multi-NIC vMotion Architecture 311

Key Concepts 311

Introduction 311

Multi-NIC vMotion Use Cases 312

Design 312

    Verifying Available Bandwidth 313

    Controlling vMotion Traffi c 314

    Distributed vSwitch Design 314

    Standard vSwitch Design 317

    Upstream Physical Switch Design 317

Confi guring Multi-NIC vMotion 318

    Distributed Port Groups 318

    VMkernel Ports 320

    Traffic Shaping 321

Summary 322

Appendix A Networking for VMware Administrators: The VMware User Group 323

The VMware User Group 323

Index 325

 

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020