News on the upcoming Windows Virtualization OS: Codename Viridian

Well, just like those entertainment news shows on TV have celebrity gossip – us “techie” people have our celebrity gossip. Here is the latest-

News on the upcoming Windows Virtualization OS: Codename Viridian

(yes, just like those shows, maybe this shouldn’t be called news but, gossip)

(and no, I’m not leaking anything confidential here as this has been posted on many other websites and was discussed with Microsoft people in the room at a public seminar)

Microsoft will have a higher end virtualization solution that will take on VMware ESX – head to head

This next OS is currently codename – Veridian and it will be released along with the Longhorn Server OS (now dubbed “Windows 2008”)

CLICK HERE FOR VIRTUALIZATION TRAINING – VIRTUAL SERVER & VMWARE

Continue reading

Future Uses for Virtualization and Virtualization News from the Windows Longhorn Roadshow

Today I attended the Windows IT Pro Longhorn Roadshow in Dallas, Texas. It was a good training conference on the upcoming replacement for the Windows Server 2003 operating system. Out of the three learning tracks offered, I chose to learn about the virtualization features in Longhorn.

I was pleased to see that the speaker for the Virtualization sessions was Alessandro Perilli, who runs the www.virtualization.info tell us about the Virtualization features in Windows Longhorn server.

He talked about the different types of Virtualization and defined them as:

  • Server Virtualization – like we do with VMware and Microsoft Virtual Server
  • Presentation or Session Virtualization – like we do with terminal services
  • Application Virtualization – something new that I will talk about in a minute

Server virtualization has become more and more common in production environments today with the use of Microsoft Virtual Server, VMware Server, VMware ESX, and Xen.

Presentation or Session virtualization is really just “terminal services” or “Citrix Server” renamed and
thought of differently.

What is a new concept is “application virtualization”. With application virtualization, the applications
can be abstracted from the OS. By doing this, you can have a “standalone application”, regardless of the operating system, registry, or other underlying applications that are normally required. What that means is that there is no installation for an application and you can “stream the application”. As soon as your computer is able to access part of the application, you can start using the application.

Compare this to listening to streaming music or streaming video over the Internet. This is based on ideas already in use with Softricity’s SoftGrid, a company & product bought by Microsoft.

Alessandro went on to talk about how there are four core applications for virtualization:

  • Production server consolidation – used to control server sprawl
  • Business continuity management and security – disaster recovery and firewall security
  • Test & development
  • In the future, the “Dynamic Data Center”

What is new in this list is the concept of the dynamic data center. The dynamic data center is a term
for a server/network infrastructure system where by:

  • You obtain maximum hardware utilization – no hardware resources are wasted
  • The infrastructure is flexible and efficient enough to completely support your company’s business
  • processes
  • The complexities today of provisioning and scaling servers, hardware, and applications are removed or reduced
  • Server & network infrastructure automatically adapts to the needs of the applications &
  • workload

Does that sound too good to be true? This sounds like something IBM has been preaching since 2001 called “Autonomic Computingg”.

This also sounds like what VMware is trying to create with their Virtual Infrastructure system (VI).
That system includes VMware ESX, VMotion, VM High Availability, and VMware’s DRS (Distributed Resource Scheduler). With VI, you are getting close to the concept of the “dynamic data center”.

While VMware has a great thing going with their Virtual Infrastructure (and it is clearly the market
leader), Microsoft is going to be challenging them for the top spot in the virtualization market. With the release of Windows Longhorn Server, Microsoft will also release a major new virtualization solution. This will be called Windows Virtualization Server, codenamed Veridian.

How Routers Work

Note that this article was originally published at SearchNetworking.com.

Routers are an essential part of the network’s plumbing. Organizations depend on routers so that employees can check email or access Web applications. Network engineers must configure these routers correctly to keep all the network traffic flowing smoothly. But how does a router actually work?

How routing fits into the OSI model

The OSI model is just a theoretical model, but it is a great way to visualize how all of these protocols, addresses and network devices (like routers) fit together.

Layers 2 and 3 of the OSI model are what apply here. Layer 2, the Data Link layer, is where the Ethernet protocol, MAC addresses and switches fit in. Layer 3, the Network layer, is where the IP protocol, IP addresses and routers fit in. Remember that all traffic is sent from your computer starting with Layer 7 (your network application) and going down to Layer 1 (physical). With the physical layer, the traffic is going across your network medium (such as your network cable or your wireless airwaves).

Traffic goes to a router only if it is not on your local LAN. Routers work primarily at Layer 3 but must understand Layers 1-3, at a minimum. Many routers understand traffic all the way up to Layers 4-7 in varying ways, but we like to think of them as working only at Layer 3 (network) because that is their primary function.

How routers use Ethernet MAC addresses and IP addresses

As I said, in Layer 2 is your Ethernet protocol and Ethernet addressing — the MAC address (a.k.a. physical address or Ethernet address). In Layer 3 is your IP protocol and IP addressing. Today, almost all networking is done using Ethernet and IP. Thus, in general, every packet on your network has an Ethernet MAC address source and destination — and an IP address source and destination. Keep this in mind.

I believe everyone who is interested in computers should, at some time or another, use a network protocol analyzer to really see all the packets that are going to and from the computer. This is true even when you aren’t using it! In a protocol analyzer, you would see this Ethernet source/destination and IP address source/destination.

What a router does with your network traffic

Routers understand these Ethernet and IP addresses. Routers are primarily interested in the destination IP address of the packet you are sending to the router. The router takes this destination (say it is 63.248.129.2) and looks that up in its routing table. Here is an example of a routing table:

Location-A# show ip route

10.0.0.0/24 is subnetted, 2 subnets R

10.2.2.0 [120/1] via 63.248.129.2, 00:00:16, Serial0 C

10.1.1.0 is directly connected, Ethernet0

63.0.0.0/30 is subnetted, 1 subnets C

63.248.129.0 is directly connected, Serial0

Location-A#

Routes in the routing table are learned from either static routes (entered by you) or dynamic routes. Using the routing table, the router tries to find the best route for your traffic. There may be only one route. Often, this is a “default route” (a.k.a. “gateway of last resort”). The default route just says: “If there are no better routes to send this traffic, send it here.”

Just about every home and small business user has just a single Internet connection. In that case, they have a default route and all traffic is sent to their Internet service provider (ISP). In the case of ISPs, however, there may be many places they can send this traffic. Their routers must compare many hundreds of thousands of routes and select the best one for your traffic. This happens in milliseconds. And to get your traffic through the Internet and back, it may pass through hundreds of routers. To you, it appears almost instantaneously (depending on many factors).

If it doesn’t find a valid route for your traffic, the router discards (yes, throws away) your traffic and sends an ICMP “destination unreachable” message back to you. When the router does find the best route and is ready to send your traffic, it has to do a number of things:

  • Perform Network Address Translation (NAT)
    NAT isn’t a traditional router function, but many routers today perform NAT. This is especially true for home and small business routers that function as “all in one” devices. Many companies have dedicated firewalls that also perform NAT. With NAT, your private source IP address is translated into a public source IP address. If the router is performing PAT (NAT overload), then the public source IP address is shared among many devices.
  • Replace your source MAC address with the router’s MAC address.
    The ARP protocol is used to connect your computer’s source MAC address to your IP address. The ARP protocol is a broadcast-oriented protocol, and routers discard broadcasts. This means that ARP doesn’t work through routers. Because of this, the router must replace your source MAC address with the router’s MAC address. The router also adds the destination host or next-hop router’s MAC address to the data link header.
  • Encapsulate the packet for the protocol of the WAN.
    Routers often perform protocol conversion. Say, for example, you have a router that has a PPP T1 connection to the Internet and is connected to the LAN using Ethernet. The Ethernet frames must be de-encapsulated, modified, then re-encapsulated in Ethernet, then PPP, before they can be sent across the PPP link.

On the other side of the link, the destination router is performing all of these same tasks, but in reverse. This happens for every packet sent and every response received.

To see a real production routing table from an ISP, you can telnet to “Route Servers” – public Cisco route servers – around the world. From here, you can do a and see what a real ISP’s routing table looks like.

TrainSignal’s new A+ Video

Whether you are just starting out, or are an IT pro looking for tech support skills and certification to advance your career, A+ certification is your ticket to credibility with employers. When you get A+ certified, you get validation in the busiest area of IT – for life! The new TrainSignal CompTIA A+ training gives you full coverage of 2006 objectives and prepares you for ALL of the A+ exams. Click Here to learn more about the A+ series training.

Continue reading

Downloadable IP Subnetting Charts

Does IP Subnetting boggle your mind? Would you like a “cheat sheet” to have around?

If so, we have got some great subnetting charts for you!

In chart #1, we take a network from each of the three classes (A, B, and C) and calculate the number of hosts and networks for every possible subnet mask. Here it is:

HappyRouter.com – IP Subnet Breakdown #1

In chart #2, we calculate every possible subnetting variation for a class B and C network. Take a look:

HappyRouter.com – IP Subnet Breakdown #2

For lack of a fancy IP subnetting calculator, these are great subnetting references to have around.

Enjoy!

This information sponsored by TrainSignal. Checkout their Cisco Router Training!

Continue reading

FREE VIDEO: How to Reset or Recover your Lost Cisco Router or Switch Password

Have you lost your Cisco router or switch password? Learn how to Reset or Recover your lost Cisco Router or Switch password in this valuable VIDEO!

In this 20 minute video, David Davis, CCIE, will show you how to take a Cisco router that you cannot login to and either recover the password or reset the password.

This involves changing the configuration register to 0x2142, rebooting, recovering or changing the password, and changing the configuration register back to 0x2102.

There are other places on the Internet that TELL you how to do this but few that will SHOW you how to do this.

Check it out!

Continue reading

Subnetting Shortcuts

Need some help with Subnetting? Preparing for your CCNA Exam? In this multi-page list of Subnetting Shortcuts,, you will find tricks, tips, and test preparation know-how when it comes to IP Subnetting, Check it out!

Special Thanks to Mimi Shaw for contributing these shortcuts!

 


Continue reading

Cisco IOS IP routing: Static routes

Every router must have a route to know where to send traffic. I compare this to the post office’s predetermined ways to route your postal mail to its destination. When a router receives a packet from the LAN or the WAN, it must know the "next hop" where it needs to deliver that packet. That next hop is the IP address of the destination router. The router learns the next hop for packets by one of two methods:

Note that this article was originally published at SearchNetworking.com. 

Checkout this Video series on the Cisco CCNA Certification!


Continue reading