<div dir="ltr">Thank you for the reply. I may be not clear in the original question.<div><br></div><div>For example, in KVM, the system setup a virtual network device pair in host, and added on end to bridge. So when an program is using the other end, its communication will be bridged to actual hardware. And KVM exposes a virtual network device to the guest and links it to "the other end". And in guest, it is just a normal network device.</div>
<div><br></div><div>But in LXC, first of all, it does not vitualize hardware. The guest is just a child process of LXC. Then, how does it make the guest using "the other end"? The guest is just using general socket APIs.</div>
</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, Nov 12, 2013 at 3:24 AM, Tony Su <span dir="ltr"><<a href="mailto:tonysu@su-networking.com" target="_blank">tonysu@su-networking.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"> In general,<br>
I've found that LXC networking is no different than any other type of<br>
virtualizaion.<br>
In fact,<br>
If you implement libvirt, the virtual networking objects (ie br,<br>
virbr, etc) once created can be utilized by any/all virtual networking<br>
technologies.<br>
<br>
So, for example I also have KVM installed on my machine and Guests<br>
using either KVM or LXC can use the same define Linux Bridge Devices.<br>
And, I've read that the same should be possible with Virtual Box and<br>
likely VMware.<br>
<br>
Generally speaking, it's preferable to bind Guest (Container)<br>
networking to a Linux Bridge Device instead of directly to hardware.<br>
Benefits are supposed to be superior ability to manage your virtual<br>
networking with options like assigned network names, their own ip<br>
address ranges, default gateway, NAT and maybe more<br>
<span class="HOEnZb"><font color="#888888"><br>
Tony<br>
</font></span><div class="HOEnZb"><div class="h5"><br>
On Sun, Nov 3, 2013 at 6:19 PM, Magicloud Magiclouds<br>
<<a href="mailto:magicloud.magiclouds@gmail.com">magicloud.magiclouds@gmail.com</a>> wrote:<br>
> Thank you. Exactly what I want.<br>
><br>
><br>
> On Sun, Nov 3, 2013 at 12:03 AM, Marc Aymerich <<a href="mailto:glicerinu@gmail.com">glicerinu@gmail.com</a>> wrote:<br>
>><br>
>><br>
>><br>
>><br>
>> On Wed, Oct 30, 2013 at 4:51 AM, Magicloud Magiclouds<br>
>> <<a href="mailto:magicloud.magiclouds@gmail.com">magicloud.magiclouds@gmail.com</a>> wrote:<br>
>>><br>
>>> Hi,<br>
>>> I am curious how network is virtualized in container kind of<br>
>>> virtualization. But searching through google, I did not see a relavent<br>
>>> document.<br>
>><br>
>><br>
>><br>
>> I believe you have to search by "network namespace"<br>
>> --<br>
>> Marc<br>
><br>
><br>
><br>
><br>
> --<br>
> 竹密岂妨流水过<br>
> 山高哪阻野云飞<br>
><br>
> And for G+, please use magiclouds#<a href="http://gmail.com" target="_blank">gmail.com</a>.<br>
><br>
</div></div><div class="HOEnZb"><div class="h5">> ------------------------------------------------------------------------------<br>
> Android is increasing in popularity, but the open development platform that<br>
> developers love is also attractive to malware creators. Download this white<br>
> paper to learn more about secure code signing practices that can help keep<br>
> Android apps secure.<br>
> <a href="http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk" target="_blank">http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk</a><br>
> _______________________________________________<br>
> Lxc-users mailing list<br>
> <a href="mailto:Lxc-users@lists.sourceforge.net">Lxc-users@lists.sourceforge.net</a><br>
> <a href="https://lists.sourceforge.net/lists/listinfo/lxc-users" target="_blank">https://lists.sourceforge.net/lists/listinfo/lxc-users</a><br>
><br>
</div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br>竹密岂妨流水过<br>山高哪阻野云飞<br><br>And for G+, please use magiclouds#<a href="http://gmail.com" target="_blank">gmail.com</a>.
</div>