Network Virtualization Architecture: Major Components and Functions

Major Components of Network Virtualization Architecture

Prev Question Next Question


Which three functions are major components of a network virtualization architecture? (Choose three.)



Click on the arrows to vote for the correct answer

A. B. C. D. E. F.


Network virtualization architecture is a technique to create a virtual version of a physical network by separating the underlying physical network infrastructure into multiple virtual networks. This separation allows for improved network flexibility, scalability, and security. The major components of a network virtualization architecture include:

  1. Virtual network services: Virtual network services are software-based services that provide network functionality such as firewalls, load balancers, VPNs, and WAN optimization. These services are decoupled from the underlying physical network infrastructure and can be easily configured and managed through software.

  2. Policy enforcement: Policy enforcement is a mechanism to ensure that all traffic on the network complies with predefined policies. Policies can include security policies, quality of service (QoS) policies, and network performance policies. Policy enforcement is achieved through software-defined networking (SDN) technologies that allow administrators to define, configure, and enforce policies centrally.

  3. Path isolation: Path isolation is the process of isolating traffic on different virtual networks to prevent traffic from interfering with each other. Path isolation can be achieved through network overlay technologies such as VXLAN, NVGRE, and GRE. These technologies encapsulate network traffic within a virtual tunnel that is independent of the underlying physical network infrastructure.

In summary, the major components of a network virtualization architecture are virtual network services, policy enforcement, and path isolation. These components enable network administrators to create and manage multiple virtual networks that are flexible, scalable, and secure.