Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center

Size: px
Start display at page:

Download "Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center"

Transcription

1 Container Adoption for NFV Challenges & Opportunities Sriram Natarajan, T-Labs Silicon Valley Innovation Center

2 Virtual Machine vs. Container Stack KVM Container-stack Libraries Guest-OS Hypervisor Libraries Lightweight footprint: Very small images with API-based control to automate the management of services Resource Overhead: Lower use of system resources (CPU, memory, etc.) by eliminating hypervisor & guest OS overhead Container A (Application + Libraries) Container B (Application + Libraries) Kernel Functions and Modules: (container group) A (Application + Libraries) Namespaces, cgroups, capabilities, chroot, SELinux Deployment time: Rapidly deploy applications with minimal run-time requirements Updates: Depending on requirements, updates, failures or scaling apps can be achieved by scaling containers up/down 2

3 Container Environment Container Management Networking Container Specification OS Distributions Security / Monitoring / UI Service Discovery Repositories 11/18/2015 3

4 Containers for NFV: Portability & Performance Container Management Solutions Scheduler C D B E A Requirements Applications s Load, execute apps across infrastructure infrastructure Decouple application instance from instance from underlying infrastructure infrastructure End-to-end performance improvements improvements Allocate resources to meet performance performance targets Collect performance related information related information Virtual Customer CPE Container Performance White Paper, Labs-CaseStudy2015.pdf Test Setup: COTS server with Intel Xeon E v2 processor, Virtual CPE s (Firewall etc.) fast path optimized using Intel DPDK, Measured L2-L3 TCP traffic throughput per core. VM (KVM) environment with SRIOV Containers (LXC) environment Gbps Gbps ~25% PERFROMANCE IMPROVEMENT OVER VMs 4

5 Containers for NFV: Agility, Elasticity & Resilience Replication Controller Container Management Solutions Scheduler Requirements Applications s Agility to spin-up/down apps On-demand scaling (networkwide requirements, # of instances), Auto-heal after failure Optimize location, reservation, allocation of required resources 5

6 Containers for NFV: Security & Service Assurance Requirements Applications s Service Discovery Replication Controller capabilities Security Protection of data, interfaces, and isolation between sets (PID, mount, netns, ipc, uid) Container Privileges (Linux capabilities, roles) Container Management Solutions Level of service continuity (seamless or non-seamless) Resource exhaustion - How about physical resources (SR-IOV, caching etc.)? Scheduler Security Debug service issues (watchdog, notifications, discovery mechanism, liveness) 6

7 Containers for NFV: Operations & Management Requirements Applications s Service Discovery Replication Controller Function automation (creation, termination etc.) Handle App lifecycle (deployment, operational, migration) Manage policies and constraints Container Management Solutions Scheduler Monitor and collect resource usage and other service related information Use of standard APIs for all applicable functions Security 7

8 Conclusion Containerized network functions promises to address some requirements, but requires more work to meet production requirements Physical resources (e.g., accelerators, NIC adapters) should be exposed as native resources to containers, with the right abstractions. Further study is required to identify possible unknown challenges (performance, security, operations etc.) IETF NFVRG draft: Opportunistic areas for future work Distributed micro-service network functions Controller discovery/management/etc. strictly confidential, confidential, internal, public 11/18/2015 8

9 THANK YOU!

OS Virtualization. Linux Containers (LXC)

OS Virtualization. Linux Containers (LXC) OS Virtualization Emulate OS-level interface with native interface Lightweight virtual machines No hypervisor, OS provides necessary support Referred to as containers Solaris containers, BSD jails, Linux

More information

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software

More information

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including

More information

TITANIUM CLOUD VIRTUALIZATION PLATFORM

TITANIUM CLOUD VIRTUALIZATION PLATFORM TITANIUM CLOUD VIRTUALIZATION PLATFORM Glenn Seiler Software Defined Infrastructure BU 30 Minutes 12 Content Slides 2017 WIND RIVER. ALL RIGHTS RESERVED. Wind River Titanium Cloud Titanium Cloud is a cloud

More information

Survey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016

Survey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016 Survey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016 VNFaaS (Virtual Network Function as a Service) In our present work, we consider the VNFaaS use-case

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

Data Path acceleration techniques in a NFV world

Data Path acceleration techniques in a NFV world Data Path acceleration techniques in a NFV world Mohanraj Venkatachalam, Purnendu Ghosh Abstract NFV is a revolutionary approach offering greater flexibility and scalability in the deployment of virtual

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

Virtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software

Virtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software Virtualizaton: One Size Does Not Fit All Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software Agenda Linux and Automotive Challenges Solution: Virtualization Linux Containers Best

More information

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat

Linux Containers Roadmap Red Hat Enterprise Linux 7 RC. Bhavna Sarathy Senior Technology Product Manager, Red Hat Linux Containers Roadmap Red Hat Enterprise Linux 7 RC Bhavna Sarathy Senior Technology Product Manager, Red Hat Linda Wang Senior Eng. Manager, Red Hat Bob Kozdemba Principal Soln. Architect, Red Hat

More information

Ixia Test Solutions to Ensure Stability of its New, LXC-based Virtual Customer Premises Equipment (vcpe) Framework for Residential and SMB Markets

Ixia Test Solutions to Ensure Stability of its New, LXC-based Virtual Customer Premises Equipment (vcpe) Framework for Residential and SMB Markets Innovate, Integrate, Transform Ixia Test Solutions to Ensure Stability of its New, LXC-based Virtual Customer Premises Equipment (vcpe) Framework for Residential and SMB Markets www.altencalsoftlabs.com

More information

Introduction to Virtualization and Containers Phil Hopkins

Introduction to Virtualization and Containers Phil Hopkins Introduction to Virtualization and Containers Phil Hopkins @twitterhandle Virtualization What is it? Introduction to Virtualization and Containers What the heck is a hypervisor? Why are there so many of

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus

Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus amirz@redhat.com TODAY'S IT CHALLENGES IT is under tremendous pressure from the organization to enable growth Need to accelerate,

More information

Achieve Low Latency NFV with Openstack*

Achieve Low Latency NFV with Openstack* Achieve Low Latency NFV with Openstack* Yunhong Jiang Yunhong.Jiang@intel.com *Other names and brands may be claimed as the property of others. Agenda NFV and network latency Why network latency on NFV

More information

Storage Protocol Offload for Virtualized Environments Session 301-F

Storage Protocol Offload for Virtualized Environments Session 301-F Storage Protocol Offload for Virtualized Environments Session 301-F Dennis Martin, President August 2016 1 Agenda About Demartek Offloads I/O Virtualization Concepts RDMA Concepts Overlay Networks and

More information

Merging Enterprise Applications with Docker* Container Technology

Merging Enterprise Applications with Docker* Container Technology Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions

More information

Containers for NFV Peter Willis March 2017

Containers for NFV Peter Willis March 2017 Containers for NFV Peter Willis March 2017 Content What is containers Fundamental Benefits Use Cases Virtual CPE in the network/cloud Network Slicing Service Protection & Energy saving At the Edge/Fog

More information

AMD EPYC Processors Showcase High Performance for Network Function Virtualization (NFV)

AMD EPYC Processors Showcase High Performance for Network Function Virtualization (NFV) White Paper December, 2018 AMD EPYC Processors Showcase High Performance for Network Function Virtualization (NFV) Executive Summary Data centers and cloud service providers are creating a technology shift

More information

1 Virtualization Recap

1 Virtualization Recap 1 Virtualization Recap 2 Recap 1 What is the user part of an ISA? What is the system part of an ISA? What functionality do they provide? 3 Recap 2 Application Programs Libraries Operating System Arrows?

More information

Network Function Virtualization over Open DC/OS Yung-Han Chen

Network Function Virtualization over Open DC/OS Yung-Han Chen Network Function Virtualization over Open DC/OS Yung-Han Chen 2016.05.18 1 Outlines Network Function Virtualization (NFV) Framework Container-based Open Source Solutions for NFV Use Cases 2 NFV Architectural

More information

RDMA Container Support. Liran Liss Mellanox Technologies

RDMA Container Support. Liran Liss Mellanox Technologies RDMA Container Support Liran Liss Mellanox Technologies Agenda Containers 101 RDMA isolation Namespace support Controller support Putting it all together Status Conclusions March 15 18, 2015 #OFADevWorkshop

More information

Unify DevOps and SecOps: Security Without Friction

Unify DevOps and SecOps: Security Without Friction SANS Secure DevOps Summit Unify DevOps and SecOps: Security Without Friction Matt Alderman, CISSP Chief Strategy & Marketing Officer Layered Insight @maldermania Technology Trend #1: Infrastructure Migrates

More information

[Docker] Containerization

[Docker] Containerization [Docker] Containerization ABCD-LMA Working Group Will Kinard October 12, 2017 WILL Kinard Infrastructure Architect Software Developer Startup Venture IC Husband Father Clemson University That s me. 2 The

More information

Dataplane Networking journey in Containers

Dataplane Networking journey in Containers Dataplane Networking journey in Gary Loughnane gary.loughnane@intel.com Kuralamudhan Ramakrishnan kuralamudhan.ramakrishnan@intel.com DPDK Summit Userspace - Dublin- 2017 Discussion topics Container Deployment

More information

Cisco Virtualized Infrastructure Manager

Cisco Virtualized Infrastructure Manager DEVNET-2570 Virtualized Infrastructure Manager Suhail Syed, Product Manager Vamsi Krihsna Kuppur, Product Manager Spark How Questions? Use Spark to communicate with the speaker after the session 1. Find

More information

Red Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies

Red Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies Red Hat Enterprise Virtualization and KVM Roadmap Scott M. Herold Product Management - Red Hat Virtualization Technologies INTRODUCTION TO RED HAT ENTERPRISE VIRTUALIZATION RED HAT ENTERPRISE VIRTUALIZATION

More information

On the Performance Impact of Virtual Link Types to 5G Networking

On the Performance Impact of Virtual Link Types to 5G Networking On the Performance Impact of Virtual Link Types to 5G Networking Wen-Ping Lai *, Yong-Hsiang Wang Department of Communications Engineering Yuan Ze University Taoyuan, Taiwan, ROC Abstract Virtual links

More information

Introduction to containers

Introduction to containers Introduction to containers Nabil Abdennadher nabil.abdennadher@hesge.ch 1 Plan Introduction Details : chroot, control groups, namespaces My first container Deploying a distributed application using containers

More information

CONTAINERS AND MICROSERVICES WITH CONTRAIL

CONTAINERS AND MICROSERVICES WITH CONTRAIL CONTAINERS AND MICROSERVICES WITH CONTRAIL Scott Sneddon Sree Sarva DP Ayyadevara Sr. Director Sr. Director Director Cloud and SDN Contrail Solutions Product Line Management This statement of direction

More information

Building High-Performance NFV Solutions Using Containers

Building High-Performance NFV Solutions Using Containers Building High-Performance NFV Solutions Using Containers Jun Nakajima Contributors: Sainath Grandhi, Yunhong Jiang, Krishna Murthy, Guangrong Xiao 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

DEPLOYING NFV: BEST PRACTICES

DEPLOYING NFV: BEST PRACTICES DEPLOYING NFV: BEST PRACTICES Rimma Iontel Senior Cloud Architect, Cloud Practice riontel@redhat.com Julio Villarreal Pelegrino Principal Architect, Cloud Practice julio@redhat.com INTRODUCTION TO NFV

More information

1. What is Cloud Computing (CC)? What are the Pros and Cons of CC? Technologies of CC 27

1. What is Cloud Computing (CC)? What are the Pros and Cons of CC? Technologies of CC 27 1. What is Cloud Computing (CC)? 3 1.1. Utility Computing First 3 1.2. The New Features of Cloud Computing (CC) 4 1.3. Cloud Service Provider (CSP) 6 1.3.1 Thin Provisioning 7 1.4. CC via a CSP (not via

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 ! 2 Oracle VM Introduction Adam Hawley, Senior Director Virtualization, Oracle January 15, 2013 Safe Harbor Statement The following is intended to outline our general product direction. It is intended

More information

Docker and Oracle Everything You Wanted To Know

Docker and Oracle Everything You Wanted To Know Docker and Oracle Everything You Wanted To Know June, 2017 Umesh Tanna Principal Technology Sales Consultant Oracle Sales Consulting Centers(SCC) Bangalore Safe Harbor Statement The following is intended

More information

NEC Virtualized Evolved Packet Core vepc

NEC Virtualized Evolved Packet Core vepc TE-524262 NEC Virtualized Evolved Packet Core vepc Design Concepts and Benefits INDEX Leading the transformation into Mobile Packet Core Virtualization P.3 vepc System Architecture Overview P.4 Elastic

More information

NFV Infrastructure for Media Data Center Applications

NFV Infrastructure for Media Data Center Applications NFV Infrastructure for Media Data Center Applications Today s Presenters Roger Sherwood Global Strategy & Business Development, Cisco Systems Damion Desai Account Manager for Datacenter, SDN, NFV and Mobility,

More information

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING

Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Docker A FRAMEWORK FOR DATA INTENSIVE COMPUTING Agenda Intro / Prep Environments Day 1: Docker Deep Dive Day 2: Kubernetes Deep Dive Day 3: Advanced Kubernetes: Concepts, Management, Middleware Day 4:

More information

Kubernetes The Path to Cloud Native

Kubernetes The Path to Cloud Native Kubernetes The Path to Cloud Native Eric Brewer VP, Infrastructure @eric_brewer August 28, 2015 ACM SOCC Cloud Na*ve Applica*ons Middle of a great transition unlimited ethereal resources in the Cloud an

More information

Akraino & Starlingx: A Technical Overview

Akraino & Starlingx: A Technical Overview Akraino & Starlingx: A Technical Overview Agenda Why Edge Computing? What s Edge Computing? Akraino and Its Building Blocks StarlingX Technical Overview Collaboration in Akraino Community LC3 Beijing 2018

More information

The four forces of Cloud Native

The four forces of Cloud Native 1 Aplicaciones Nativas En La Nube The four forces of Cloud Native Iñaki Borrero- Advisory vspecialist MEDI, Dell EMC @DellEMCForum 2 Containers Devops Confluence of 4 forces Agile 3 3 Microservices 4 4

More information

Windows Server System Center Azure Pack

Windows Server System Center Azure Pack Windows Server System Center Azure Pack Tenant Deployment Multi-Tier LOB Application Tenant Deployment Multi-Tier LOB Application Inbox feature for integrated management of IP addresses, domain

More information

Superfluidity: A Superfluid, Cloud-Native, Converged Edge System

Superfluidity: A Superfluid, Cloud-Native, Converged Edge System Superfluidity: A Superfluid, Cloud-Native, Converged Edge System Call: H2020-ICT-2014-2 Topic: ICT 14 2014: Advanced 5G Network Infrastructure for the Future Internet Project Coordinator: Nicola Blefari

More information

Datacenter Network Solutions Group

Datacenter Network Solutions Group 1 Enabling NFV features in kubernetes IVAN COUGHLAN IVAN.COUGHLAN@INTEL.COM Software Architect Kuralamudhan Ramakrishnan kuralamudhan.ramakrishnan@intel.com Senior Software Engineer Data Center Network

More information

VNF Benchmarking. Customer Profile. The Move to Virtualization. The Challenges. Case Study

VNF Benchmarking. Customer Profile. The Move to Virtualization. The Challenges. Case Study Case Study VNF Benchmarking Customer Profile Customer: Large Network Equipment Manufacturer Industry: Networking Equipment Employees: 180,000 (2016) The Challenges How to test the performance of VNFs?

More information

CS-580K/480K Advanced Topics in Cloud Computing. Container III

CS-580K/480K Advanced Topics in Cloud Computing. Container III CS-580/480 Advanced Topics in Cloud Computing Container III 1 Docker Container https://www.docker.com/ Docker is a platform for developers and sysadmins to develop, deploy, and run applications with containers.

More information

Introduction to the Cisco ASAv

Introduction to the Cisco ASAv Hypervisor Support The Cisco Adaptive Security Virtual Appliance (ASAv) brings full firewall functionality to virtualized environments to secure data center traffic and multitenant environments. You can

More information

Deployment Patterns using Docker and Chef

Deployment Patterns using Docker and Chef Deployment Patterns using Docker and Chef Sandeep Chellingi Sandeep.chellingi@prolifics.com Agenda + + Rapid Provisioning + Automated and Managed Deployment IT Challenges - Use-cases What is Docker? What

More information

End to End SLA for Enterprise Multi-Tenant Applications

End to End SLA for Enterprise Multi-Tenant Applications End to End SLA for Enterprise Multi-Tenant Applications Girish Moodalbail, Principal Engineer, Oracle Inc. Venugopal Iyer, Principal Engineer, Oracle Inc. The following is intended to outline our general

More information

VM-SERIES FOR VMWARE VM VM

VM-SERIES FOR VMWARE VM VM SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud

More information

Secure Containers with EPT Isolation

Secure Containers with EPT Isolation Secure Containers with EPT Isolation Chunyan Liu liuchunyan9@huawei.com Jixing Gu jixing.gu@intel.com Presenters Jixing Gu: Software Architect, from Intel CIG SW Team, working on secure container solution

More information

Xen Summit Spring 2007

Xen Summit Spring 2007 Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise

More information

Building a Platform Optimized for the Network Edge

Building a Platform Optimized for the Network Edge Building a Platform Optimized for the Network Edge MPLS + SDN + NFV WORLD 2018 Nicolas Bouthors, Enea Innovation Agenda Software Virtualization - Key Requirements Leveraging DPDK Multi-Function VNFs at

More information

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud. DATA SHEET vthunder SOFTWARE FOR VIRTUAL & CLOUD INFRASTRUCTURE A10 vthunder software appliances enable organizations to SUPPORTED SOLUTIONS gain flexible, easy-to-deploy and high-performance secure application

More information

VFd: an SR-IOV Hypervisor using DPDK. Alex Zelezniak DPDK Summit Userspace - Dublin- 2017

VFd: an SR-IOV Hypervisor using DPDK. Alex Zelezniak DPDK Summit Userspace - Dublin- 2017 VFd: an SR-IOV Hypervisor using DPDK Alex Zelezniak DPDK Summit Userspace - Dublin- 2017 Current state Despite many improvements software overlays have fundamental inefficiencies for packet processing

More information

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2 Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.

More information

Supporting Fine-Grained Network Functions through Intel DPDK

Supporting Fine-Grained Network Functions through Intel DPDK Supporting Fine-Grained Network Functions through Intel DPDK Ivano Cerrato, Mauro Annarumma, Fulvio Risso - Politecnico di Torino, Italy EWSDN 2014, September 1st 2014 This project is co-funded by the

More information

Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance

Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance TechTarget Dennis Martin 1 Agenda About Demartek I/O Virtualization Concepts RDMA Concepts Examples Demartek

More information

Introduction to Cisco and Intel NFV Quick Start

Introduction to Cisco and Intel NFV Quick Start Quick Start Cisco Intel NFV Quick Start. Simplify Virtualization, Encourage Innovation for Service Providers Introduction Customer expectations for network services have evolved markedly. Customers want

More information

CSC 5930/9010 Cloud S & P: Virtualization

CSC 5930/9010 Cloud S & P: Virtualization CSC 5930/9010 Cloud S & P: Virtualization Professor Henry Carter Fall 2016 Recap Network traffic can be encrypted at different layers depending on application needs TLS: transport layer IPsec: network

More information

Przyspiesz tworzenie aplikacji przy pomocy Openshift Container Platform. Jarosław Stakuń Senior Solution Architect/Red Hat CEE

Przyspiesz tworzenie aplikacji przy pomocy Openshift Container Platform. Jarosław Stakuń Senior Solution Architect/Red Hat CEE Przyspiesz tworzenie aplikacji przy pomocy Openshift Container Platform Jarosław Stakuń Senior Solution Architect/Red Hat CEE jstakun@redhat.com Monetize innovation http://www.forbes.com/innovative-companies/list/

More information

Introduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016

Introduction to Container Technology. Patrick Ladd Technical Account Manager April 13, 2016 Introduction to Container Technology Patrick Ladd Technical Account Manager April 13, 2016 Container Technology Containers 3 "Linux Containers" is a Linux kernel feature to contain a group of processes

More information

Cloud & container monitoring , Lars Michelsen Check_MK Conference #4

Cloud & container monitoring , Lars Michelsen Check_MK Conference #4 Cloud & container monitoring 04.05.2018, Lars Michelsen Some cloud definitions Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Software-as-a-Service (SaaS) Applications

More information

Virtualization of Customer Premises Equipment (vcpe)

Virtualization of Customer Premises Equipment (vcpe) Case Study Virtualization of Customer Premises Equipment (vcpe) Customer Profile Customer: A Cloud Service Provider Reach: Global Industry: Telecommunications The Challenge A Cloud Service Provider serving

More information

Looking ahead with IBM i. 10+ year roadmap

Looking ahead with IBM i. 10+ year roadmap Looking ahead with IBM i 10+ year roadmap 1 Enterprises Trust IBM Power 80 of Fortune 100 have IBM Power Systems The top 10 banking firms have IBM Power Systems 9 of top 10 insurance companies have IBM

More information

SAINT LOUIS JAVA USER GROUP MAY 2014

SAINT LOUIS JAVA USER GROUP MAY 2014 SAINT LOUIS JAVA USER GROUP MAY 2014 STEVEN BORRELLI steve@borrelli.org @stevendborrelli ABOUT ME FIRST COMPUTER: SYSTEMS ENGINEERING MANAGEMENT FOUNDER, ASTERIS (JAN 2014) @ ORGANIZER OF STL MACHINE LEARNING

More information

Executive Summary. Introduction. Test Highlights

Executive Summary. Introduction. Test Highlights Executive Summary Today, LTE mobile operators typically deploy All-IP and flat network architectures. This elegant and flexible solution requires deployment of an adequate security infrastructure. One

More information

Red Hat HyperConverged Infrastructure. RHUG Q Marc Skinner Principal Solutions Architect 8/23/2017

Red Hat HyperConverged Infrastructure. RHUG Q Marc Skinner Principal Solutions Architect 8/23/2017 Red Hat HyperConverged Infrastructure RHUG Q3.2017 Marc Skinner Principal Solutions Architect 8/23/2017 AGENDA 2 What is RHHI? Use cases Technology Features Installation What is RHHI? INFRASTRUCTURE CONSOLIDATION

More information

The Missing Piece of Virtualization. I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers

The Missing Piece of Virtualization. I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers The Missing Piece of Virtualization I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers Agenda 10 GbE Adapters Built for Virtualization I/O Throughput: Virtual & Non-Virtual Servers Case

More information

Travis Cardwell Technical Meeting

Travis Cardwell Technical Meeting .. Introduction to Docker Travis Cardwell Tokyo Linux Users Group 2014-01-18 Technical Meeting Presentation Motivation OS-level virtualization is becoming accessible Docker makes it very easy to experiment

More information

Enabling Efficient and Scalable Zero-Trust Security

Enabling Efficient and Scalable Zero-Trust Security WHITE PAPER Enabling Efficient and Scalable Zero-Trust Security FOR CLOUD DATA CENTERS WITH AGILIO SMARTNICS THE NEED FOR ZERO-TRUST SECURITY The rapid evolution of cloud-based data centers to support

More information

Enterprise Network Compute System (ENCS)

Enterprise Network Compute System (ENCS) Enterprise Network Compute System (ENCS) Cisco vbranch Architecture Per Jensen, per@cisco.com Sept 2017 Agenda: Tech Update september-2017 1. ENCS update + demo v/per 2. Viptela update + demo v/dr Søren

More information

Pulse Secure Application Delivery

Pulse Secure Application Delivery DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,

More information

Software Transformation for Cloud Video Solutions

Software Transformation for Cloud Video Solutions BRKSPV-1102 Software Transformation for Cloud Video Solutions Neeve Nikoo, Systems Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

Performance Considerations of Network Functions Virtualization using Containers

Performance Considerations of Network Functions Virtualization using Containers Performance Considerations of Network Functions Virtualization using Containers Jason Anderson, et al. (Clemson University) 2016 International Conference on Computing, Networking and Communications, Internet

More information

Network Services Benchmarking: Accelerating the Virtualization of the Network

Network Services Benchmarking: Accelerating the Virtualization of the Network white paper Communications Data Center Solutions Network Services Benchmarking: Accelerating the Virtualization of the Network Network Services Benchmarking (NSB), part of the OPNFV* Yardstick project,

More information

Container System Overview

Container System Overview Container System Overview 2018 Table of Contents Introduction 3 Container Network 7 Uploading an Image or Dockerfile 9 Allocating a Container 13 Saving a Running Container 15 Access Considerations 18 2

More information

Network Edge Innovation With Virtual Routing

Network Edge Innovation With Virtual Routing Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading

More information

Virtualization, Xen and Denali

Virtualization, Xen and Denali Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two

More information

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine Table of Contents Overview Containers, Docker, Registries vsphere Integrated Containers Engine Management Portal Registry Roles and Personas 1.1 1.1.1 1.1.2 1.1.2.1 1.1.2.2 1.1.2.3 1.1.2.4 2 Overview of

More information

How Container Runtimes matter in Kubernetes?

How Container Runtimes matter in Kubernetes? How Container Runtimes matter in Kubernetes? Kunal Kushwaha NTT OSS Center About me Works @ NTT Open Source Software Center Contributes to containerd and other related projects. Docker community leader,

More information

Virtual Machine Systems

Virtual Machine Systems Virtual Machine Systems Question Can a small operating system simulate the hardware of some machine so that Another operating system can run in that simulated hardware? More than one instance of that operating

More information

MWC 2015 End to End NFV Architecture demo_

MWC 2015 End to End NFV Architecture demo_ MWC 2015 End to End NFV Architecture demo_ March 2015 demonstration @ Intel booth Executive summary The goal is to demonstrate how an advanced multi-vendor implementation of the ETSI ISG NFV architecture

More information

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,

More information

Virtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs

Virtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs Solution brief Software-Defined Data Center (SDDC) Hyperconverged Platforms Virtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs Virtuozzo benchmark

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

Using MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems

Using MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems Using MySQL in a Virtualized Environment Scott Seighman Systems Engineer Sun Microsystems 1 Agenda Virtualization Overview > Why Use Virtualization > Options > Considerations MySQL & Virtualization Best

More information

CLOUD ARCHITECTURE & PERFORMANCE WORKLOADS. Field Activities

CLOUD ARCHITECTURE & PERFORMANCE WORKLOADS. Field Activities CLOUD ARCHITECTURE & PERFORMANCE WORKLOADS Field Activities Matt Smith Senior Solution Architect Red Hat, Inc @rhmjs Jeremy Eder Principal Performance Engineer Red Hat, Inc @jeremyeder CLOUD ARCHITECTURE

More information

Cauldron: A Framework to Defend Against Cache-based Side-channel Attacks in Clouds

Cauldron: A Framework to Defend Against Cache-based Side-channel Attacks in Clouds Cauldron: A Framework to Defend Against Cache-based Side-channel Attacks in Clouds Mohammad Ahmad, Read Sprabery, Konstantin Evchenko, Abhilash Raj, Dr. Rakesh Bobba, Dr. Sibin Mohan, Dr. Roy Campbell

More information

How to Put Your AF Server into a Container

How to Put Your AF Server into a Container How to Put Your AF Server into a Container Eugene Lee Technology Enablement Engineer 1 Technology Challenges 2 Cloud Native bring different expectations 3 We are becoming more impatient Deploy Code Release

More information

SteelEye Solutions Extend Citrix XenServer. Bob Williamson

SteelEye Solutions Extend Citrix XenServer. Bob Williamson SteelEye Solutions Extend Citrix XenServer Bob Williamson bobw@steeleye.com DataKeeper Expanding SteelEye Family of Protection Solutions Real-time continuous data protection with full rewind capability

More information

Virtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization

Virtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

An introduction to Docker

An introduction to Docker An introduction to Docker Ing. Vincenzo Maffione Operating Systems Security Container technologies on Linux Several light virtualization technologies are available for Linux They build on cgroups, namespaces

More information

Micro VMMs and Nested Virtualization

Micro VMMs and Nested Virtualization Micro VMMs and Nested Virtualization For the TCE 4th summer school on computer security, big data and innovation Baruch Chaikin, Intel 9 September 2015 Agenda Virtualization Basics The Micro VMM Nested

More information

Configuring SR-IOV. Table of contents. with HP Virtual Connect and Microsoft Hyper-V. Technical white paper

Configuring SR-IOV. Table of contents. with HP Virtual Connect and Microsoft Hyper-V. Technical white paper Technical white paper Configuring SR-IOV with HP Virtual Connect and Microsoft Hyper-V Table of contents Abstract... 2 Overview... 2 SR-IOV... 2 Advantages and usage... 2 With Flex-10... 3 Setup... 4 Supported

More information

Virtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized

Virtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

I/O and virtualization

I/O and virtualization I/O and virtualization CSE-C3200 Operating systems Autumn 2015 (I), Lecture 8 Vesa Hirvisalo Today I/O management Control of I/O Data transfers, DMA (Direct Memory Access) Buffering Single buffering Double

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

RIFT.io* and Intel Taking Virtual Network Functions to Hyperscale

RIFT.io* and Intel Taking Virtual Network Functions to Hyperscale white paper RIFT.io* and Intel Taking Virtual Network Functions to Hyperscale Introduction Network functions virtualization (NFV) is a powerful technology that offers elasticity, scale, and reliability

More information

DPDK Summit China 2017

DPDK Summit China 2017 DPDK Summit China 2017 2 DPDK in container Status Quo and Future Directions Jianfeng Tan, June 2017 3 LEGAL DISCLAIMER No license (express or implied, by estoppel or otherwise) to any intellectual property

More information