SlideShare a Scribd company logo
1 of 41
Download to read offline
Virtualization Concepts
Kingston Smiler. S (kingstonsmiler@gmail.com)
About Me
Author
•“OpenFlow CookBook”, which is one
of the recognized study material by
ONF (Open Networking Foundation)
•Learning CoreOS
•1 RFC & 2 IETF Drafts in MPLS and
TRILL WG
•Frequent Presenter in various
networking Forums
•Trainer of SDN, NFV and Network
Virtualization Concepts
Experience
•14+ years of Industry Experience
•6+ years of experience in SDN, NFV
and OpenFlow
•Working as a pre-sales consultant
and product manager
•Having Work Experience in all the
three commercial L2, L3 networking
stack (IPInfusion ZebOS, Aricent ISS,
MetaSwitch L2,L3 and MPLS stack)
Virtualization Concepts
Session 1: Agenda
What is Virtualization?
Enablers & Need for Virtualization
Does Virtualization a new concept?
Virtualization in various domains
Different types of Virtualization
Server Virtualization
Hypervisors
What is Virtualization?
Server
Storage
Network
Wikipedia Definition
Refers to the act of creating a virtual
version of something
Something can either be hardware
platform, operating system, storage
devices, compute / network resources
Typically applicable for compute,
storage & networking
Concept of Virtualization exists from
the very beginning of computer
technology
Does Virtualization new concept?
Server
Virtualization
– Mainframes
Storage or
Memory
Virtualization
- Virtual
Memory
Network
Virtualization
- Virtual LAN
(VLAN)
Service
Virtualization
(Java Virtual
Machine)
Virtualization Methodologies
Split &
Partitioning
Clustering Mapping
Server Virtualization
Server Virtualization
Wikipedia Definition
Partitioning of physical server into
number of small virtual servers
Uses Virtualization Software and
hardware virtualization techniques
In most cases the servers are not
utilized fully which results in
inefficient usage
Why Server Virtualization
Less Resource Utilization
High Cost
Power Consumption
Server Downtime
High Infrastructure
History of Server Virtualization
IBM Mainframes
with Virtualization
Evolution of
Personal
Computers
(1990s)
Back to
virtualization to
reduce Capex and
Opex
(2000s)
1970s 1990s 2000s
IBM Mainframes
IBM CP-67 (Mid
1960s)
First Virtualized IBM Mainframe
Server
Split the computer into multiple
virtual machines
Different “tasks” can be run separately
and independently on the same
mainframe
If one virtual machine or “task” has a
problem, other virtual machines are
unaffected
Personal Computer Evolution
• Introduction of Intel/AMD servers (x86 architecture)
• Each PC/server runs its own OS (Windows / Unix) and runs application.
• Best approach for personal computers.
• For server and IT infrastructure brings overhead while going for massive
scale.
• Typically in IT and infrastructure deployment one server runs one
application (Email Server, Application Server, DB Server etc)
File
Server
Web
Server
File
Server
Web
Server
File
Server
Domain
Server
App
Server
DNS
Server
Each Server Running
1 Application
Server Virtualization
Physical Server vs Virtual Server
Storage Virtualization
What is Storage Virtualization?
Wikipedia Definition
Pooling of physical storage from
multiple storage devices to appear as
single device managed by single entity
Enables better functionality and more
advanced features in computer data
storage systems
Helps the storage administrator to
perform the tasks of backup,
archiving, and recovery more easily
Storage Virtualization can be provided
using software, hardware and
combination of both
What is Storage Virtualization?
History of Storage Virtualization
1970s 1990s 2000s
OS takes
the individual disks
and create local
volumes within a
logical volume
manager (LVM)
Evolution of RAID
Arrays in 1990s
Evolution of SAN
Why Storage Virtualization?
Efficient, Flexible and
Scalable usage of storage
disks
Stable, recoverable and highly
available solution for storage
medium.
Remove hardwire connection
between storage hardware
and the processor
Classifications of Storage Virtualization?
Storage
Virtualization
Block Level
Host Based
Storage
Device Based
Network
Based
File Level
Host Based
Storage
Device Based
Network
Based
Block Level Vs File Level
Block Vs File Level
Block Level: storage capacity is made
available to the operating system or
the applications in the form of virtual
disks
File Level: Virtualization entity
provides virtual storage to the OS or
applications in the form of files or
directories
Host Based Virtualization
Host Based
Virtualization provided by additional
software running (Volume Manager)
directly in the host machine
Volume Manager intercepts the I/O
request and provides metadata lookup
and I/O mapping
OS can also provide this service
Examples are LDM in Windows, LVM
in Linux and ZFS’s Z-Pool in Solaris
Storage Device Based Virtualization
Storage Device Based
Virtualization provided in storage
devices is found within intelligent disk
subsystems
The storage systems make their
storage available to servers through
various I/O channels by means of LUN
masking and RAID
Network Based Virtualization
Network Based
Two Models: Out-of-band and In-Band
In-band implementations uses
controller between users and
physical storage (SAN) and deliver all
storage requests and data through
that controller
Out-of-band products set up a
metadata controller on the network
that remapped storage requests to
physical locations, but didn’t deal
with the actual data
Virtual Machine & Virtual Storage
• VM Migration
• Easily Manageable Disaster Recovery
• High Availability of both Virtual Machine and Storage
• Easy Server Upgrades
• Easy recovery of Virtual Machine Images
• Server Virtualization really calls for a virtualization in the
storage space with centralized management.
Application/Service Virtualization
What is Service Virtualization?
Application
Operating System
Hardware
Server Virtualization
Application Virtualization
Physical Server
Service Virtualization
Software technology that
encapsulates computer programs from
the underlying operating system on
which it is executed
The application behaves at runtime
like it is directly interfacing with the
original operating system, but can be
isolated or sandboxed to varying
degrees
Why Application Virtualization?
Increased Performance
Easy Upgrades and
Installation
On Demand Delivery of
Applications
Applications need not be
installed in all server
Server & Application Virtualization
Hyper Visor
Hardware
APP1
Operating System
App
Virtualization
Sandbox
APP2 APP1
Operating System
App
Virtualization
Sandbox
APP2
Network Virtualization
32
What is Network Virtualization?
What is Network Virtualization?
Network Virtualization
Combining hardware and software network resources and network functionality
into a single, software-based administrative entity, a virtual network
Process of segregating the user traffic from one group of user is getting
forwarded into the same group of user without any logical isolation of the
network infrastructure
Examples are
VLAN in layer2
MPLs L2VPN, L3VPN
Process of splitting the physical network entities like Switches, Routers,
Firewall etc into multiple logical network entities for isolating the user traffic
from different instances
Examples are
VTN using OVS
VTN using ODL etc
Introduction
• Process of segregating the user traffic
from one group of user is getting
forwarded into the same group of user
without any logical isolation of the
network infrastructure
• Example VLAN, VRF etc
Definition
1
• Process of splitting the physical network
entities like Switches, Routers, Firewall
etc into multiple logical network entities
for isolating the user traffic from different
instances
• Example VTN
Definition
2
Classifications of Network Virtualization
Network
Virtualization
Device Level
Virtual Interface
NIC
TUN/TAP Interface
Bridge, OVS
Virtual Router
Network Level
Network Slicing /
VTN
Packet Level
VLAN
802.1X
802.1AD
MPLS VPN
L2VPN
L3VPN
Interface Level
VRF-lite
OpenFlow SIN
In-Device Virtualization
 In-Device Network
Virtualization
 vNIC
 vBridge
 OVS
 TUN/TAP
Packet Level Virtualization
 The packet carries
information related to a set
of user for isolation network
traffic.
 Example is VLAN, L2VPN,
L3PVN etc
 In VLAN case, the packet will
carry the VLAN tag which is
used to limit the broadcast
domain of a switch / bridge
 The traffic which is flowing
from a user from one VLAN
will not be forwarded to
other VLAN
Interface Level Virtualization
 In this case the traffic
isolation is provided by
assigning set of ports or
interface to a particular
customer.
 The packets from these
ports will be only forwarded
to the interface which is
part of the same VRF.
 Very good example is VRF-
lite
Network Level Virtualization
 In Network Level
Virtualization, the entire
physical network is sliced into
multiple logical networks
each assigning to a customer
/ group of customer.
 This kind of network is
termed as virtual tenant
network (VTN)
The network slices are mapped to a customer / tenant and hence termed as
VTN
Virtual Machine, Virtual Storage & Virtual Network
Service Virtualization
Server Virtualization
Network Virtualization
Storage
Virtualization
Thank you
kingstonsmiler@gmail.com

More Related Content

What's hot

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationAhmad Hafeezi
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...Edureka!
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology OverviewOpenCity Community
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 

What's hot (20)

Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Hypervisor
HypervisorHypervisor
Hypervisor
 

Viewers also liked

In-Memory Computing Essentials for Architects and Engineers
In-Memory Computing Essentials for Architects and EngineersIn-Memory Computing Essentials for Architects and Engineers
In-Memory Computing Essentials for Architects and EngineersDenis Magda
 
Communication hardware
Communication hardwareCommunication hardware
Communication hardwareHans Mallen
 
DevRomagna / Golang Intro
DevRomagna / Golang IntroDevRomagna / Golang Intro
DevRomagna / Golang IntroSimone Gentili
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote ShellcodeAj MaChInE
 
Scale Up with Lock-Free Algorithms @ JavaOne
Scale Up with Lock-Free Algorithms @ JavaOneScale Up with Lock-Free Algorithms @ JavaOne
Scale Up with Lock-Free Algorithms @ JavaOneRoman Elizarov
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?Black Duck by Synopsys
 
Advanced memory allocation
Advanced memory allocationAdvanced memory allocation
Advanced memory allocationJoris Bonnefoy
 
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)Patricia Aas
 
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware
 
Graduating To Go - A Jumpstart into the Go Programming Language
Graduating To Go - A Jumpstart into the Go Programming LanguageGraduating To Go - A Jumpstart into the Go Programming Language
Graduating To Go - A Jumpstart into the Go Programming LanguageKaylyn Gibilterra
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & EcosystemKingston Smiler
 
In-depth forensic analysis of Windows registry files
In-depth forensic analysis of Windows registry filesIn-depth forensic analysis of Windows registry files
In-depth forensic analysis of Windows registry filesMaxim Suhanov
 
Deep dive into Coroutines on JVM @ KotlinConf 2017
Deep dive into Coroutines on JVM @ KotlinConf 2017Deep dive into Coroutines on JVM @ KotlinConf 2017
Deep dive into Coroutines on JVM @ KotlinConf 2017Roman Elizarov
 

Viewers also liked (20)

Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
In-Memory Computing Essentials for Architects and Engineers
In-Memory Computing Essentials for Architects and EngineersIn-Memory Computing Essentials for Architects and Engineers
In-Memory Computing Essentials for Architects and Engineers
 
Communication hardware
Communication hardwareCommunication hardware
Communication hardware
 
DevRomagna / Golang Intro
DevRomagna / Golang IntroDevRomagna / Golang Intro
DevRomagna / Golang Intro
 
Docker Networking
Docker NetworkingDocker Networking
Docker Networking
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
 
Scale Up with Lock-Free Algorithms @ JavaOne
Scale Up with Lock-Free Algorithms @ JavaOneScale Up with Lock-Free Algorithms @ JavaOne
Scale Up with Lock-Free Algorithms @ JavaOne
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?
 
Advanced memory allocation
Advanced memory allocationAdvanced memory allocation
Advanced memory allocation
 
numPYNQ @ NGCLE@e-Novia 15.11.2017
numPYNQ @ NGCLE@e-Novia 15.11.2017numPYNQ @ NGCLE@e-Novia 15.11.2017
numPYNQ @ NGCLE@e-Novia 15.11.2017
 
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)
Linux Security APIs and the Chromium Sandbox (SwedenCpp Meetup 2017)
 
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
OCCIware, an extensible, standard-based XaaS consumer platform to manage ever...
 
Graduating To Go - A Jumpstart into the Go Programming Language
Graduating To Go - A Jumpstart into the Go Programming LanguageGraduating To Go - A Jumpstart into the Go Programming Language
Graduating To Go - A Jumpstart into the Go Programming Language
 
Go Execution Tracer
Go Execution TracerGo Execution Tracer
Go Execution Tracer
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 
OpenFlow
OpenFlowOpenFlow
OpenFlow
 
In-depth forensic analysis of Windows registry files
In-depth forensic analysis of Windows registry filesIn-depth forensic analysis of Windows registry files
In-depth forensic analysis of Windows registry files
 
Deep dive into Coroutines on JVM @ KotlinConf 2017
Deep dive into Coroutines on JVM @ KotlinConf 2017Deep dive into Coroutines on JVM @ KotlinConf 2017
Deep dive into Coroutines on JVM @ KotlinConf 2017
 

Similar to Virtualization Concepts: Server, Storage, Network and Service Virtualization

OpenStack and OpenDaylight Workshop: ONUG Spring 2014
OpenStack and OpenDaylight Workshop: ONUG Spring 2014OpenStack and OpenDaylight Workshop: ONUG Spring 2014
OpenStack and OpenDaylight Workshop: ONUG Spring 2014mestery
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerSatya Sanjibani Routray
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerRahul Krishna Upadhyaya
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
The Microservices world in. NET Core and. NET framework
The Microservices world in. NET Core and. NET frameworkThe Microservices world in. NET Core and. NET framework
The Microservices world in. NET Core and. NET frameworkMassimo Bonanni
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologyIRJET Journal
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittalbuildacloud
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
State of the Container Ecosystem
State of the Container EcosystemState of the Container Ecosystem
State of the Container EcosystemVinay Rao
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaVMUG IT
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of NetworkingOpenStack Korea Community
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationAkhilesh Dhawan
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
MidoNet Differentiation and Overview
MidoNet Differentiation and OverviewMidoNet Differentiation and Overview
MidoNet Differentiation and OverviewMidokura
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master classCitrix
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSXScott Lowe
 
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Dan Mihai Dumitriu
 

Similar to Virtualization Concepts: Server, Storage, Network and Service Virtualization (20)

OpenStack and OpenDaylight Workshop: ONUG Spring 2014
OpenStack and OpenDaylight Workshop: ONUG Spring 2014OpenStack and OpenDaylight Workshop: ONUG Spring 2014
OpenStack and OpenDaylight Workshop: ONUG Spring 2014
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
The Microservices world in. NET Core and. NET framework
The Microservices world in. NET Core and. NET frameworkThe Microservices world in. NET Core and. NET framework
The Microservices world in. NET Core and. NET framework
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
Container Networking Deep Dive
Container Networking Deep DiveContainer Networking Deep Dive
Container Networking Deep Dive
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittal
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
State of the Container Ecosystem
State of the Container EcosystemState of the Container Ecosystem
State of the Container Ecosystem
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
MidoNet Differentiation and Overview
MidoNet Differentiation and OverviewMidoNet Differentiation and Overview
MidoNet Differentiation and Overview
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
 
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...
 

Recently uploaded

Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...vmzoxnx5
 
Tari Eason Warriors Come Out To Play T Shirts
Tari Eason Warriors Come Out To Play T ShirtsTari Eason Warriors Come Out To Play T Shirts
Tari Eason Warriors Come Out To Play T Shirtsrahman018755
 
2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______hackersuli
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
Basic Security.pptx is a awsome PPT on your mobiel
Basic Security.pptx is a awsome PPT on your mobielBasic Security.pptx is a awsome PPT on your mobiel
Basic Security.pptx is a awsome PPT on your mobielpratamakiki860
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...Andreas Sfakianakis
 
Power of Social Media for E-commerce.pdf
Power of Social Media for E-commerce.pdfPower of Social Media for E-commerce.pdf
Power of Social Media for E-commerce.pdfrajats19920
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)ICT Watch - Indonesia
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 

Recently uploaded (13)

Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2016 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2016 National Dialogue - English (tata kelola internet / int...
 
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
办理澳洲USYD文凭证书学历认证【Q微/1954292140】办理悉尼大学毕业证书真实成绩单GPA修改/办理澳洲大学文凭证书Offer录取通知书/在读证明...
 
Tari Eason Warriors Come Out To Play T Shirts
Tari Eason Warriors Come Out To Play T ShirtsTari Eason Warriors Come Out To Play T Shirts
Tari Eason Warriors Come Out To Play T Shirts
 
2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
Basic Security.pptx is a awsome PPT on your mobiel
Basic Security.pptx is a awsome PPT on your mobielBasic Security.pptx is a awsome PPT on your mobiel
Basic Security.pptx is a awsome PPT on your mobiel
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...
Cyber Shield Up - They Shall Not Pass - Andreas Sfakianakis - Lecture at CSD ...
 
Power of Social Media for E-commerce.pdf
Power of Social Media for E-commerce.pdfPower of Social Media for E-commerce.pdf
Power of Social Media for E-commerce.pdf
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)Summary  IGF 2013 Bali - English (tata kelola internet / internet governance)
Summary IGF 2013 Bali - English (tata kelola internet / internet governance)
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 

Virtualization Concepts: Server, Storage, Network and Service Virtualization

  • 1. Virtualization Concepts Kingston Smiler. S (kingstonsmiler@gmail.com)
  • 2. About Me Author •“OpenFlow CookBook”, which is one of the recognized study material by ONF (Open Networking Foundation) •Learning CoreOS •1 RFC & 2 IETF Drafts in MPLS and TRILL WG •Frequent Presenter in various networking Forums •Trainer of SDN, NFV and Network Virtualization Concepts Experience •14+ years of Industry Experience •6+ years of experience in SDN, NFV and OpenFlow •Working as a pre-sales consultant and product manager •Having Work Experience in all the three commercial L2, L3 networking stack (IPInfusion ZebOS, Aricent ISS, MetaSwitch L2,L3 and MPLS stack)
  • 4. Session 1: Agenda What is Virtualization? Enablers & Need for Virtualization Does Virtualization a new concept? Virtualization in various domains Different types of Virtualization Server Virtualization Hypervisors
  • 5. What is Virtualization? Server Storage Network Wikipedia Definition Refers to the act of creating a virtual version of something Something can either be hardware platform, operating system, storage devices, compute / network resources Typically applicable for compute, storage & networking Concept of Virtualization exists from the very beginning of computer technology
  • 6. Does Virtualization new concept? Server Virtualization – Mainframes Storage or Memory Virtualization - Virtual Memory Network Virtualization - Virtual LAN (VLAN) Service Virtualization (Java Virtual Machine)
  • 9. Server Virtualization Wikipedia Definition Partitioning of physical server into number of small virtual servers Uses Virtualization Software and hardware virtualization techniques In most cases the servers are not utilized fully which results in inefficient usage
  • 10. Why Server Virtualization Less Resource Utilization High Cost Power Consumption Server Downtime High Infrastructure
  • 11. History of Server Virtualization IBM Mainframes with Virtualization Evolution of Personal Computers (1990s) Back to virtualization to reduce Capex and Opex (2000s) 1970s 1990s 2000s
  • 12. IBM Mainframes IBM CP-67 (Mid 1960s) First Virtualized IBM Mainframe Server Split the computer into multiple virtual machines Different “tasks” can be run separately and independently on the same mainframe If one virtual machine or “task” has a problem, other virtual machines are unaffected
  • 13. Personal Computer Evolution • Introduction of Intel/AMD servers (x86 architecture) • Each PC/server runs its own OS (Windows / Unix) and runs application. • Best approach for personal computers. • For server and IT infrastructure brings overhead while going for massive scale. • Typically in IT and infrastructure deployment one server runs one application (Email Server, Application Server, DB Server etc) File Server Web Server File Server Web Server File Server Domain Server App Server DNS Server Each Server Running 1 Application
  • 15. Physical Server vs Virtual Server
  • 17. What is Storage Virtualization? Wikipedia Definition Pooling of physical storage from multiple storage devices to appear as single device managed by single entity Enables better functionality and more advanced features in computer data storage systems Helps the storage administrator to perform the tasks of backup, archiving, and recovery more easily Storage Virtualization can be provided using software, hardware and combination of both
  • 18. What is Storage Virtualization?
  • 19. History of Storage Virtualization 1970s 1990s 2000s OS takes the individual disks and create local volumes within a logical volume manager (LVM) Evolution of RAID Arrays in 1990s Evolution of SAN
  • 20. Why Storage Virtualization? Efficient, Flexible and Scalable usage of storage disks Stable, recoverable and highly available solution for storage medium. Remove hardwire connection between storage hardware and the processor
  • 21. Classifications of Storage Virtualization? Storage Virtualization Block Level Host Based Storage Device Based Network Based File Level Host Based Storage Device Based Network Based
  • 22. Block Level Vs File Level Block Vs File Level Block Level: storage capacity is made available to the operating system or the applications in the form of virtual disks File Level: Virtualization entity provides virtual storage to the OS or applications in the form of files or directories
  • 23. Host Based Virtualization Host Based Virtualization provided by additional software running (Volume Manager) directly in the host machine Volume Manager intercepts the I/O request and provides metadata lookup and I/O mapping OS can also provide this service Examples are LDM in Windows, LVM in Linux and ZFS’s Z-Pool in Solaris
  • 24. Storage Device Based Virtualization Storage Device Based Virtualization provided in storage devices is found within intelligent disk subsystems The storage systems make their storage available to servers through various I/O channels by means of LUN masking and RAID
  • 25. Network Based Virtualization Network Based Two Models: Out-of-band and In-Band In-band implementations uses controller between users and physical storage (SAN) and deliver all storage requests and data through that controller Out-of-band products set up a metadata controller on the network that remapped storage requests to physical locations, but didn’t deal with the actual data
  • 26. Virtual Machine & Virtual Storage • VM Migration • Easily Manageable Disaster Recovery • High Availability of both Virtual Machine and Storage • Easy Server Upgrades • Easy recovery of Virtual Machine Images • Server Virtualization really calls for a virtualization in the storage space with centralized management.
  • 28. What is Service Virtualization? Application Operating System Hardware Server Virtualization Application Virtualization Physical Server Service Virtualization Software technology that encapsulates computer programs from the underlying operating system on which it is executed The application behaves at runtime like it is directly interfacing with the original operating system, but can be isolated or sandboxed to varying degrees
  • 29. Why Application Virtualization? Increased Performance Easy Upgrades and Installation On Demand Delivery of Applications Applications need not be installed in all server
  • 30. Server & Application Virtualization Hyper Visor Hardware APP1 Operating System App Virtualization Sandbox APP2 APP1 Operating System App Virtualization Sandbox APP2
  • 32. 32 What is Network Virtualization?
  • 33. What is Network Virtualization? Network Virtualization Combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network Process of segregating the user traffic from one group of user is getting forwarded into the same group of user without any logical isolation of the network infrastructure Examples are VLAN in layer2 MPLs L2VPN, L3VPN Process of splitting the physical network entities like Switches, Routers, Firewall etc into multiple logical network entities for isolating the user traffic from different instances Examples are VTN using OVS VTN using ODL etc
  • 34. Introduction • Process of segregating the user traffic from one group of user is getting forwarded into the same group of user without any logical isolation of the network infrastructure • Example VLAN, VRF etc Definition 1 • Process of splitting the physical network entities like Switches, Routers, Firewall etc into multiple logical network entities for isolating the user traffic from different instances • Example VTN Definition 2
  • 35. Classifications of Network Virtualization Network Virtualization Device Level Virtual Interface NIC TUN/TAP Interface Bridge, OVS Virtual Router Network Level Network Slicing / VTN Packet Level VLAN 802.1X 802.1AD MPLS VPN L2VPN L3VPN Interface Level VRF-lite OpenFlow SIN
  • 36. In-Device Virtualization  In-Device Network Virtualization  vNIC  vBridge  OVS  TUN/TAP
  • 37. Packet Level Virtualization  The packet carries information related to a set of user for isolation network traffic.  Example is VLAN, L2VPN, L3PVN etc  In VLAN case, the packet will carry the VLAN tag which is used to limit the broadcast domain of a switch / bridge  The traffic which is flowing from a user from one VLAN will not be forwarded to other VLAN
  • 38. Interface Level Virtualization  In this case the traffic isolation is provided by assigning set of ports or interface to a particular customer.  The packets from these ports will be only forwarded to the interface which is part of the same VRF.  Very good example is VRF- lite
  • 39. Network Level Virtualization  In Network Level Virtualization, the entire physical network is sliced into multiple logical networks each assigning to a customer / group of customer.  This kind of network is termed as virtual tenant network (VTN) The network slices are mapped to a customer / tenant and hence termed as VTN
  • 40. Virtual Machine, Virtual Storage & Virtual Network Service Virtualization Server Virtualization Network Virtualization Storage Virtualization

Editor's Notes

  1. Courtesy: https://www.veeam.com/blog/why-virtual-machine-backups-different.html