O'Reilly logo

Introduction to Computer Networks and Cybersecurity by J. David Irwin, Chwan-Hwa Wu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 27

Network and Information Infrastructure Virtualization

The learning goals for this chapter are as follows:

  • Explore the different categories of virtualization methods and the salient features of each
  • Understand the role played by the hypervisor in virtualization
  • Learn the various features of the three CPU virtualization techniques
  • Understand the virtual network architecture for virtualization and its components
  • Explore data center virtualization and the components that function within it
  • Investigate the new area of cloud computing and examine its complex security

27.1 Virtualization Overview

Virtual machines (VMs) have been available for more than 40 years. Early in the 1960s, researchers at MIT recognized the need for VMs. In the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required