TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS
|
|
- Jemimah King
- 6 years ago
- Views:
Transcription
1 E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN
2 T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand the basics and build the best software-defined possible. PAGE 2 OF 11
3 TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS Michelle McNickle The emergence of software-defined ing has also sparked discourse among IT pros about the need for. Yet in many ways, a singular definition has yet to emerge. In a recent interview with VMWare s Martin Casado, we learned SDN and differ -- Casado likened SDN to a mechanism, while is an application. SDN is relevant to system builders: I liken it to a way to build an engine, Casado said. Someone building a car would use a new way of building an engine to build the car, but customers don t buy engines, they buy cars. Here we ve rounded up 10 key to better explain the basics of. Network. Network is a method of providing virtual instances of physical s by separating bandwidth into independent channels. Each channel can be assigned or reassigned to a specific server or device in real time and is independently secured. With these combined PAGE 3 OF 11
4 resources, distinct tunnels or segments can be provisioned, each with unique routing and management policies. Network is intended to improve productivity and efficiency by performing tasks automatically, allowing files, images and programs to be centrally managed from a single physical site. Storage media, like hard drives and tape drivers, for example, can be easily added or reassigned, and storage space can be shared or reallocated among the servers as well. Network is said to be particularly effective in s that experience sudden and unforeseen data surges and capacityhungry applications. Virtual switch. A virtual switch (vswitch) is a software instance of a physical switch that allows virtual machines (VM) to communicate with one another. Essentially, vswitches manage and route traffic in a virtual environment. Each virtual host must connect to a vswitch in the same way a physical host must be connected to a physical switch. Similar to a physical Ethernet switch, a vswitch not only forwards data packets, it intelligently directs communication on the by inspecting packets before forwarding. A vswitch can be included in a server s hardware as part of its firmware, but some vendors have embedded vswitches directly into their hypervisors. Virtual switching has not traditionally been designed to present visibility of the virtual PAGE 4 OF 11
5 to engineers, but third-party tools, such as the Cisco Nexus 1000v, aim to change that. Additionally, as virtual switching comes under control of SDN environments, pros will have more direct visibility and management capability. Overlay. An overlay is a software construct that lives on the edges of a physical and consists of virtual switches that reside on the virtualized servers. These switches are used to create an abstracted, virtual on top of the underlying physical infrastructure. An overlay relies on a control plane to handle virtual switching on the server hosts, similar to a physical. These control planes can either use traditional protocols or they can rely on a software-defined ing controller. One example of an SDN overlay is Big Switch s Big Virtual Switch, which uses OpenFlow-enabled virtual switches at the server access layer of a to create a virtual on top of an existing physical. Then the overlay tunnels make it possible to build a software-defined on top of physical infrastructure that doesn t explicitly support SDN. Network hypervisor. A hypervisor is a tool that provides an abstraction layer of a, allowing engineers to provision virtual components and tenants or paths that are completely independent of the PAGE 5 OF 11
6 underlying physical. The hypervisor should do for what a server hypervisor does for server -- enable guest applications and operating systems regardless of changes in the underlying infrastructure. With this abstraction layer intact, the hypervisor should also provide visibility and manageability of virtual resources to support dynamic provisioning of virtual s and related virtual machine migration. As solutions grow, many are looking to incorporate them into an overall software-defined ing (SDN) architecture. Using SDN, and incorporating a hypervisor into an SDN architecture, will help make the both flexible and manageable enough for Infrastructure as a Service (IaaS) and virtual resource provisioning. VXLAN. A Virtual Extensible LAN (VXLAN)is a proposed encapsulation or tunneling protocol for running an overlay on existing Layer 3 infrastructure. VXLAN is said to make it easier for engineers to scale out a cloud computing environment while isolating cloud apps and tenants. Traditionally, engineers have used virtual LANs (VLANs) to isolate apps and tenants in a cloud computing environment, but VLAN specifications only allows for up to 4,096 IDs to be assigned at any given time. The primary goal of VXLAN is to extend the virtual LAN (VLAN) address space by PAGE 6 OF 11
7 assigning a 24-bit segment ID and increasing the number of available IDs to 16 million. VXLAN can potentially allow engineers to migrate virtual machines across long distances and play an important role in software-defined ing (SDN). To implement SDN using VXLAN, administrators can use existing hardware and software -- a feature that makes the technology financially valuable. OpenStack Quantam API. OpenStack Quantum is a cloud ing controller and Networking as a Service project within the OpenStack cloud computing initiative. It includes a set of application program interfaces (APIs), plug-ins and authentication/authorization control software that enable interoperability and orchestration of devices and technologies within IaaS environments. The core Quantum API includes support for Layer 2 ing and IP address management, as well as an extension for a Layer 3 router construct that enables routing between Layer 2 s and gateways to external s. Quantum includes a growing list of plug-ins that enable interoperability with various commercial and open source technologies. Multi-tenant s. Multi-tenant architecture allows the physical to be divided into smaller, isolated logical s. Like PAGE 7 OF 11
8 tenants in an apartment complex, multi-tenant s share the physical ing gear but operate using their own distinct management and security policy, preventing spillover or visibility between the segments. While the capability to separate s into logical units has been available for some time through the use of VLANs, virtualized data centers and cloud computing concepts have brought multi-tenancy back to the attention of administrators. There are a few approaches to isolating traffic in a multi-tenant, including defining virtual switches, like Cisco s Nexus 1000v or the open source Open vswitch for each application. VMs connect to the physical by linking to virtual Ethernet adapters and virtual switches. Then, these connect to physical Ethernet adapters and switches. Virtual switches manage the movement of VMs and also aid in the provisioning and management of VLANs in the data center. Network architects create segments or tenants musing these switches and in some cases using a centralized SDN controller. Multi-tenancy is often used within cloud s so that s can be created for specific sets of data and/or applications. Network functions. Network functions, or NFV, is an initiative to virtualize functions that were previously carried out by proprietary, dedicated hardware. The concept is still being PAGE 8 OF 11
9 developed by the ETSI Industry Specification Group (ISG) for Network Functions Virtualization and was first presented by a group of service providers at the SDN and OpenFlow World Congress in October The goal of NFV is to decrease the amount of proprietary hardware that is needed to launch and operate services -- functions previously done by routers, firewalls, load balancers and other hardware would instead be hosted on VMs. If it s successfully developed and implemented, NFV will revolutionize how s are built, managed and used to create services. It s unlikely that virtual hosts will totally displace equipment, but the high-value portion of services could be made into a series of interoperating, cloud-hosted components. NVGRE. Network Virtualization using Generic Routing Encapsulation, or NVGRE, is an overlay or tunnelling protocol for. Using the encapsulation protocol, engineers can create a large amount of virtual LANs for subnets that extend across dispersed data centers on Layers 2 and 3. Its purpose is to enable multi-tenant and load-balanced s to be shared across on-premises and cloud environments. The NVGRE specification was proposed by Microsoft, Intel, HP, and Dell, and it competes with another encapsulation method, VXLAN. Key capabilities of NVGRE include identifying PAGE 9 OF 11
10 a 24-bit Tenant Network Identifier (TNI) to address problems associated with the multi-tenant. It also uses a Generic Routing Encapsulation (GRE) to create an isolated virtual Layer 2 that could be confined to a single physical Layer 2 or extend across subnet boundaries. Nexus 1000v. The Cisco Nexus 1000v is a Cisco Nexus Operating System (NX-OS) switch that s rendered fully in software and provides visibility and management inside the virtual stack, enabling distinct tenants composed of physical and virtual ing resources. The switch enables a team to monitor, manage and troubleshoot both the physical and virtual s with Cisco commands and tools. The switch is programmable and is based on IEEE 802.1Q switching technology. It used a control-path API to communicate with the data plane. This allows administrators who use non- Cisco physical components to use the 1000v to handle virtual management. PAGE 10 OF 11
11 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the ing and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 11 OF 11
WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY
E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach
More informationSDN Technologies Primer: Revolution or Evolution in Architecture?
There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This
More informationVMware vsphere Beginner s Guide
The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros
More informationDWhat Is Network. D Limitations of Network. DAdvantages of Network. DNetwork Virtualization. D Terms BY JONATHAN HASSELL. Virtualization?
E-Book March 2014 WINDOWS SERVER NETWORK VIRTUALIZATION THE COMPLEX POWERS OF NETWORK VIRTUALIZATION In, Microsoft added features that enable users to virtualize a network. The complexity is not to be
More informationBEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES
E-Guide BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES SearchAWS T here is no catch-all for securing a cloud network. Administrators should take a comprehensive approach to protect AWS cloud resources
More informationThe Emergence of SDN in WLAN
The Emergence of SDN in WLAN SDN is being implemented rapidly find out how SDN can benefit your wireless network. Contents architectures? Chuck Moozakis Some experts predict that the network functions
More informationRequirements for virtualizing Exchange Server 2010
Requirements for Exchange : Hardware Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. Yet while isn t difficult, it must be done properly to ensure success.
More informationStorage Virtualization Explained
Storage Virtualization Explained In order to understand the benefits of storage virtualization, it is important to understand how it works. In this e-guide, brought to you by SearchServerVirtualization.com,
More informationNETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS
E-Guide NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS SearchSecurity D evices may not connect to enterprise access systems or inventory and patching mechanisms. This expert eguide explains how
More informationEvaluating the Security of Software Defined Networking
Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security
More informationE-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY
E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored
More informationBUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE
E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up
More informationServer Hardware for Virtualization: Exploring the Options
Server Virtualization: Exploring the Options As virtualization moves toward the private cloud, server hardware will also have to evolve. Soon, when you talk about hardware for virtualization, you ll mean
More informationKNOW THE FEATURES OF WINDOWS SERVER 2012 R2
E-Guide KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 SearchWindows Server T hinking of upgrading to Windows Server 2012 R2? In this eguide learn about five new features. From managing the cloud faster to
More informationE-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT
E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E nterprise adoption of Windows 10 isn t likely to follow the same pattern as for Windows 7, and that s a good thing, writes columnist Brian Madden. And even
More informationBest Practices for the Hybrid Cloud
Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public
More informationE-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD
E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD A modern trend in IT infrastructures reveals that more and more companies are installing solid-state storage and caching. Additionally,
More information10 Cloud Storage Concepts to Master
10 Cloud Storage Concepts to Master Cloud hype has given way to a certain amount of confusion, particularly around the terms used to describe the technology itself. This E-Guide defines "cloud washing"
More informationDesktop Virtualization: What Windows Managers Should Know
One of the biggest jobs for any Windows shop is managing client workstations. Using desktop virtualization can help make that job a little bit easier. This e-guide, from SearchVirtualDesktop.com, can help
More informationSUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY
E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise
More informationAn introduction to the VDI landscape
The : An Virtual desktop infrastructures are quickly gaining popularity in the IT industry as end users are now able to connect to their desktops from any location, at any time. This e-guide, from SearchVirtualDesktop.com,
More informationAUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER
E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those
More informationLecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet
More informationSECURITY MONITORING: BE EVERYWHERE AT ONCE
E-Guide SECURITY MONITORING: BE EVERYWHERE AT ONCE SearchNetworking P ervasive security improves on defense in depth by layering security according to risk and assigning it specifically to each critical
More informationLESSONS LEARNED FROM AN OFFICE 365 MIGRATION
E-Guide LESSONS LEARNED FROM AN OFFICE 365 MIGRATION SearchExchange Office 365. O ffice 365 s take time and careful research, but even then, some mistakes are inevitable. Find out what one expert learned
More informationPREVENTING PRIVILEGE CREEP
E-Guide PREVENTING PRIVILEGE CREEP SearchSecurity Mike Cobb The security principle of least privilege is the practice of limiting permissions to the minimal level that will allow users to perform their
More informationADDRESSING TODAY S VULNERABILITIES
E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.
More informationQuantum, network services for Openstack. Salvatore Orlando Openstack Quantum core developer
Quantum, network services for Openstack Salvatore Orlando sorlando@nicira.com Openstack Quantum core developer Twitter- @taturiello Caveats Quantum is in its teenage years: there are lots of things that
More informationAS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?
E-Guide AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? SearchSecurity A pplication development teams often prioritize timely delivery of software above all other concerns
More informationMANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH
E-Guide MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH SearchSecurity L earn how to implement appropriate security controls for endpoint management. PAGE 2 OF 7 MANAGING ENDPOINTS WITH DEFENSE-IN-DEPTH Mike
More informationVirtual Security Gateway Overview
This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,
More informationSSL Certificate Management: Common Mistakes and How to Avoid Them
Common Mistakes and How to Avoid Them Common Mistakes and Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. How to Avoid Them By:
More informationUtilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI
Utilizing Windows Server 2012 Key workarounds for avoiding the Modern UI Even though the graphical user interface (GUI) Microsoft introduced in Windows Server 2012 has its benefits, IT admins are reluctant
More informationCisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design
White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.
More informationLecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 7 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet
More informationIdentify and Eliminate Oracle Database Bottlenecks
Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle
More informationZentera Systems CoIP Platform
Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic
More informationDisaster Recovery Planning: Weighing your customer s options
Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a
More informationDeploying Cloud Network Services Prime Network Services Controller (formerly VNMC)
Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing
More informationService Graph Design with Cisco Application Centric Infrastructure
White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...
More informationCloud e Datacenter Networking
Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.
More informationMODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches
MODERNIZE YOUR DATA CENTER With Cisco Nexus Switches TABLE OF CONTENTS TABLE OF CONTENTS Data Center Needs are Changing Cisco Nexus Switches Lead the Transition to a Next Generation Data Center Outcomes
More informationCloud e Datacenter Networking
Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.
More informationSolid State Storage: Trends, Pricing Concerns, and Predictions for the Future
Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent
More informationCisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack
White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationSTORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES
E-Guide STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES SearchStorage S torage network technology is changing and speed is the name of the game. To handle the burgeoning data growth, organizations
More informationA primer to SQL Server 2012
A primer to SQL Server 2012 Many industry insiders have declared SQL Server 2012 to be the strongest version Microsoft has released in a long time. The 2012 edition offers new features geared toward enterprises
More informationCloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking
Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering
More informationOpenStack Networking: Where to Next?
WHITE PAPER OpenStack Networking: Where to Next? WHAT IS STRIKING IS THE PERVASIVE USE OF OPEN VSWITCH (OVS), AND AMONG NEUTRON FEATURES, THE STRONG INTEREST IN SOFTWARE- BASED NETWORKING ON THE SERVER,
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationCross-Site Virtual Network Provisioning in Cloud and Fog Computing
This paper was accepted for publication in the IEEE Cloud Computing. The copyright was transferred to IEEE. The final version of the paper will be made available on IEEE Xplore via http://dx.doi.org/10.1109/mcc.2017.28
More informationSFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc.
SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc. Abstract Service Function Chaining (SFC) is a concept that has been around for a while. Newer technology advancements in the SDN
More informationE-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE
E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE D atabase performance can be sensitive to the adjustments you make to design. In this e-guide, discover the affects database performance data
More informationOPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT
OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,
More informationF5 Networks in the Software Defined DataCenter Era. Paolo Pambianco System Engineer CSP
F5 Networks in the Software Defined DataCenter Era Paolo Pambianco System Engineer CSP p.pambianco@f5.com Data Center Transformation Business demands are driving changes in IT service delivery Driving
More informationMinimizing the Risks of OpenStack Adoption
Minimizing the Risks of OpenStack Adoption White Paper Minimizing the Risks of OpenStack Adoption Introduction Over the last five years, OpenStack has become a solution of choice for enterprise private
More informationActual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO
Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, 2016 John Burke Principal Research Analyst & CIO john@nemertes Agenda ± Introductions ± SDN Adoption ± Cloud Management Adoption
More informationRed Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide
Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight OpenStack Team Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight
More informationNetwork Virtualization
Network Virtualization Petr Grygárek 1 Traditional Virtualization Techniques Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on
More informationDisaster recovery planning for health care data and HIPAA compliance regulations
Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.
More informationANALYSIS OF VIRTUAL NETWORKS IN DATA CENTERS.
ANALYSIS OF VIRTUAL NETWORKS IN DATA CENTERS. Ionka Gancheva, PhD student 45 Abstract: The article contains an analysis of virtual networks and technologies that are used at data centers nowadays. Many
More informationCloud Networking From Theory to Practice. Ivan Pepelnjak NIL Data Communications
Cloud Networking From Theory to Practice Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications Who is Ivan Pepelnjak... in 30 Seconds Networking engineer since 1985 (DECnet, Netware, X.25, OSI, IP...)
More informationBRING SPEAR PHISHING PROTECTION TO THE MASSES
E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put
More informationKahu Compute. Make Private Cloud Painless. Kahu Compute: Make Private Cloud Painless
Kahu Compute: Make Private Cloud Painless Kahu Compute. Make Private Cloud Painless. 2 Kahu Compute: Make Private Cloud Painless. Software is eating the world, and the datacenter is next. How will your
More informationCisco Nexus 1000V Switch for Microsoft Hyper-V
Q&A Cisco Nexus 1000V Switch for Microsoft Hyper-V Overview Q. What are Cisco Nexus 1000V Switches? A. Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual
More informationBest Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect
Best Practice Deployment of F5 App Services in Private Clouds Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect Agenda 1 2 3 4 5 The trend of data center, private cloud
More informationADOPTING FIDO SearchSecurity
E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More informationBROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK
BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK Ken Cheng VP, Service Provider and Application Delivery Products September 12, 2012 Brocade Cloud-Optimized Networking
More informationSoftware-Defined Networking (SDN) Overview
Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it
More informationNETWORK OVERLAYS: AN INTRODUCTION
NETWORK OVERLAYS: AN INTRODUCTION Network overlays dramatically increase the number of virtual subnets that can be created on a physical network, which in turn supports multitenancy and virtualization
More informationHP SDN Document Portfolio Introduction
HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,
More informationDELL EMC TECHNICAL SOLUTION BRIEF
DELL EMC TECHAL SOLUTION BRIEF ARCHITECTING A CLOUD FABRIC WHEN DEPLOING VIRTUALIZATION OVERLAS Version 2.0 Author: VICTOR LAMA Dell EMC Networking SE May 2017 Architecting a Data Center Cloud Fabric:
More informationCloudEngine 1800V Virtual Switch
CloudEngine 1800V Virtual Switch CloudEngine 1800V Virtual Switch Product Overview Huawei CloudEngine 1800V (CE1800V) is a distributed virtual switch designed for virtualized environments in cloud data
More informationVirtual Machine Manager Domains
This chapter contains the following sections: Cisco ACI VM Networking Support for Virtual Machine Managers, page 1 VMM Domain Policy Model, page 3 Virtual Machine Manager Domain Main Components, page 3,
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationCS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization
CS-580K/480K Advanced Topics in Cloud Computing Network Virtualization 1 Network Diagram of A Company 2 University Network Topology https://www.researchgate.net/figure/234782590_fig1_fig-5-see-university-network-infrastructure
More informationVirtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe
Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE
More informationEnd to End SLA for Enterprise Multi-Tenant Applications
End to End SLA for Enterprise Multi-Tenant Applications Girish Moodalbail, Principal Engineer, Oracle Inc. Venugopal Iyer, Principal Engineer, Oracle Inc. The following is intended to outline our general
More informationDISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017
DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 Table of Contents Executive Summary 3 Introduction 3 vsphere Replication... 3 VMware NSX for vsphere... 4 What
More informationGuide to SDN, SD-WAN, NFV, and VNF
Evalu- ation Guide Technical Brief SD-WAN, NFV, and With so many acronyms and each one building on another, it can be confusing about how they work together. This guide describes the difference. 006180206
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More informationSDN+NFV Next Steps in the Journey
SDN+NFV Next Steps in the Journey Margaret T. Chiosi AT&T Labs Distinguished Architect SDN-NFV Realization 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks
More informationGet Your Datacenter SDN Ready. Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region
Get Your Datacenter SDN Ready Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region AGENDA Data Center Trends, Priorities, Concerns What Problems Are we Trying to Solve? Cisco
More informationFrequently Asked Questions for HP EVI and MDC
Frequently Asked Questions for HP EVI and MDC Q. What are we announcing at VMworld? A. HP will be expanding Virtual Application Networks with new FlexFabric innovations that simplify the interconnection
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationNetwork Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014
Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014 Presented by: Yuri Gittik Head of Strategic Developments and Innovation NFV Promises and Progress 22.04.14 Slide1
More informationCisco HyperFlex Systems
White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data
More informationSOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS
WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN
More informationOrchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team
Orchestration: Accelerate Deployments and Reduce Operational Risk Nathan Pearce, Product Development SA Programmability & Orchestration Team Agenda 1 2 3 Industry Trends Customer Journey Use Cases 2016
More informationCisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13
Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual
More informationProduct Brief GigaVUE-VM
Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure
More informationEthernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade
Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade fkoelmel@broc 10/28/2013 2 2012 Brocade Communications Systems, Inc. Proprietary Information ETHERNET FABRICS
More informationSDN Security BRKSEC Alok Mittal Security Business Group, Cisco
SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined
More informationE-Guide CLOUD COMPUTING VS. VIRTUALIZATION
E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation
More information