• Like

Thanks for flagging this SlideShare!

Oops! An error has occurred.

The Second Wave of Virtualisation

  • 366 views
Published

This session examines the second wave of the virtualisation tsunami to hit the shores of the data centre: that of network and application infrastructure. It looks at the architectural implications of …

This session examines the second wave of the virtualisation tsunami to hit the shores of the data centre: that of network and application infrastructure. It looks at the architectural implications of Application Delivery Controller virtualisation in the data centre with a view to maintaining appropriate levels of reliability and scalability.

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
366
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
54
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • When users are all over the world, globally distributed access across several datacenters can help solve access and availability requirements, but both the userbase and IT administrators still need a solution that is easy to use and simple tomanage. At the same time, the worldwide strain on budgets is forcing customersto reduce the number of data centers while still offering fast and secure applicationperformance to the global user base. Content delivery networks (CDNs) can placecertain objects at the edge of the network for fast access, but the cost of entry forusing a traditional CDN can be prohibitive for small-to-medium-size businesses.There are also security and control concerns with traditional CDNs because somecontent is shared, which can be perceived as a potential risk to the business.

Transcript

  • 1. The Second Wave of Virtualisation
    Owen Cole
    Technical Director
    F5 UK, Ireland and Sub Saharan Africa
  • 2. Opposing forces
    We are being pushed to deliver uptime, responsiveness and compliance.
    Vs.
    • …but budgetary strains are prompting consolidation
  • Virtualisation... What's that then??
    Virtualisation
    Two general ‘techniques’
    Physical Thing
    Virtual Thing
    Virtual Thing 1
    Virtual Thing 2
    Virtual Thing 3
    Virtual Thing N
    Physical Thing 1
    Physical Thing N
    Physical Thing 2
    Physical Thing 3
  • 3. Physical OS Virtualization
    One machine running multiple OS instances
    Windows 2003 running virtual Linux and Vista
    Example: VMware, MS HyperV, Xen
  • 4. Application Server Virtualization
    L4/L7ApplicationSwitch
    Network
    Multiple services appearing as one
    Reverse proxy architectures
    Web Farm
    Clients
  • 5. Network Virtualization
    One physical network, multiple virtual networks
    One switch in the DC with overlapping IP blocks
    VLANs
    Multi-routing tables
    VRTs
    NAT
    Trunking
  • 6. Storage Virtualization
    Block: Disassociating storage drive from physical drive (iSCSI)
    File: Virtual File Location
  • 7. Service Virtualization
    L2/L3Switch
    L4/L7ApplicationSwitch
    Network
    switch
    switch
    TMM 1
    TMM 2
    TMM 3
    TMM 4
    Virtual Kitchen Sink
    Dynamic Provisioning & Flexible Infrastructures
    Data Center Consolidation
  • 8. Application Delivery Architectures
    The Complexity of Real World Application Delivery
  • 9. ?
    Application
    Problem: Infrastructures Aren’t Adaptable
    - New security hole
    - High cost to scale
    - Slow performance
    Network Administrator
    Application Developer
    Applications focus on business logic and functionality
    Traditional networks are focused on connectivity
  • 10. Application
    Multiple Point Solutions
    More
    Bandwidth
    Network Administrator
    Application Developer
    Add more infrastructure?
    Faster and centralised fix, applications are offloaded
    Costly, complex and hard to manage
    Hire an army of developers?
    Expensive (code, manage, maintain)
    Consumes server cycles
    Often not possible
    ?
    How Do You Fix the Problem?
  • 11. Advanced ADC Strategy
    Secure, Fast, Available, Flexible
  • 12. Individual Silo Approach
    Benefits
    Regional Data Center
    Individual LTM / Service
    • True “Airgap” Architecture
    • 13. Direct BU Access
    • 14. Controlled deployments
    6 -10 pairs of LTM’s
    per regional datacenter
    LDAP
    Radius
    VOIP, VM, IMS
    Network DVR
    DNS
    Provisioning
    TFTP, SNMP
    Adv. ADC
    Adv. ADC
    Adv. ADC
    Adv. ADC
    Adv. ADC
    Adv. ADC
    Individual Service Pods
    Individual LTM / Service
    • Application-specific hardware sizing
    • 15. Each pod can be managed separately.
    Current Solution:
    Different hardware models can be purchased for different applications specific to their traffic patterns.
    Core Switching
  • 16. Shared Architrecture
    Benefits
    Individual LTM / Service
    • Lower TCO
    • 17. Savings on maintenance
    1-2 Pairs of Scalable LTM’s
    Per regional datacenter
    Dallas Data Center
    LDAP
    Radius
    VOIP, VM, IMS
    Network DVR
    DNS
    Provisioning
    TFTP, SNMP
    Ease of Scalability
    ADC
    ADC
    ADC scalable architecture
    • Network attack protection
    • 18. Scale through application traffic spikes
    • 19. Shared High Level Security architecture
    NO PROBLEM!
    Add a blade to your current infrastructure with no additional management
    Core Switching
  • 20. HybridArchitrecture
    Benefits
    Individual LTM / Service
    • Lower Capex
    • 21. Uses Stock Hardware
    • 22. Integrates with Dynamic provisioning strategy
    1-2 Pairs of Scalable LTM’s
    Per regional datacenter
    Plus
    Virtual ADCs On Demand
    Dallas Data Center
    LDAP
    Radius
    VOIP, VM, IMS
    Network DVR
    DNS
    Provisioning
    TFTP, SNMP
    vADC
    vADC
    vADC
    vADC
    vADC
    vADC
    Ease of Scalability
    ADC scalable architecture
    • Network attack protection from Core ADC
    • 23. Individual specific protection per application
    • 24. Shared High Level Security architecture
    • 25. On-Demand provisioning of ADC resources as required
    • 26. Fully integrates with your Green Power strategy
    ADC
    ADC
    Core Switching
  • 27. The Cloud......
    That's Virtualisation right???
  • 28. Virtualization to Cloud Maturity Model
    Separate
    Consolidate
    Aggregate
    Automate
    Liberate
    Self-Managing Datacenters
    Server Consolidation
    Test and Development
    CapacityOn Demand
    Enterprise Computing Clouds On and Off Premise
    Public
    Private
    Or
    Here
    Or
    Here
    Or
    Here
    You Are Here
    Enterprise Objective: An IT Services On-Demand Platform
  • 29. Traditional Model is Inflexible
    Users
    Resources
    Private
    Public
    Physical
    Virtual
    Cloud
    Multi-Site DCs
  • 30. What’s Needed
    Users
    Dynamic Services Model:
    Reusable services that understand context and can provide control regardless of application, virtualization, user, device, platform or location
    Resources
    Private
    Public
    Physical
    Virtual
    Cloud
    Multi-Site DCs
  • 31. The Dynamic Control Plane Architecture
    Users
    Dynamic
    Control
    Availability
    Optimization
    Security
    Management
    Application and Data Delivery Network
    Resources
    Private
    Public
    Physical
    Virtual
    Multi-Site DCs
    Cloud
  • 43. Q. Dynamic control plane benefits?
    Cost savings from this strategy?
    • How does context awareness improve our
    Application Deliver or Securitystrategy?
  • 44. Virtualisation Summary
    Support virtualized environments at whatever level suits you
    From Server to Service
    Integrate and accelerate VMware and Microsoft
    Dynamic Provisioning for ADCS and Application Architectures
    Secure virtual environments
    At the network layer
    DoS protection, Secure VLANs, Packet Filtering
    At the application layer
    Multi-protocol Application Firewall