TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

Size: px
Start display at page:

Download "TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS"

Transcription

1 E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN

2 T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand the basics and build the best software-defined possible. PAGE 2 OF 11

3 TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS Michelle McNickle The emergence of software-defined ing has also sparked discourse among IT pros about the need for. Yet in many ways, a singular definition has yet to emerge. In a recent interview with VMWare s Martin Casado, we learned SDN and differ -- Casado likened SDN to a mechanism, while is an application. SDN is relevant to system builders: I liken it to a way to build an engine, Casado said. Someone building a car would use a new way of building an engine to build the car, but customers don t buy engines, they buy cars. Here we ve rounded up 10 key to better explain the basics of. Network. Network is a method of providing virtual instances of physical s by separating bandwidth into independent channels. Each channel can be assigned or reassigned to a specific server or device in real time and is independently secured. With these combined PAGE 3 OF 11

4 resources, distinct tunnels or segments can be provisioned, each with unique routing and management policies. Network is intended to improve productivity and efficiency by performing tasks automatically, allowing files, images and programs to be centrally managed from a single physical site. Storage media, like hard drives and tape drivers, for example, can be easily added or reassigned, and storage space can be shared or reallocated among the servers as well. Network is said to be particularly effective in s that experience sudden and unforeseen data surges and capacityhungry applications. Virtual switch. A virtual switch (vswitch) is a software instance of a physical switch that allows virtual machines (VM) to communicate with one another. Essentially, vswitches manage and route traffic in a virtual environment. Each virtual host must connect to a vswitch in the same way a physical host must be connected to a physical switch. Similar to a physical Ethernet switch, a vswitch not only forwards data packets, it intelligently directs communication on the by inspecting packets before forwarding. A vswitch can be included in a server s hardware as part of its firmware, but some vendors have embedded vswitches directly into their hypervisors. Virtual switching has not traditionally been designed to present visibility of the virtual PAGE 4 OF 11

5 to engineers, but third-party tools, such as the Cisco Nexus 1000v, aim to change that. Additionally, as virtual switching comes under control of SDN environments, pros will have more direct visibility and management capability. Overlay. An overlay is a software construct that lives on the edges of a physical and consists of virtual switches that reside on the virtualized servers. These switches are used to create an abstracted, virtual on top of the underlying physical infrastructure. An overlay relies on a control plane to handle virtual switching on the server hosts, similar to a physical. These control planes can either use traditional protocols or they can rely on a software-defined ing controller. One example of an SDN overlay is Big Switch s Big Virtual Switch, which uses OpenFlow-enabled virtual switches at the server access layer of a to create a virtual on top of an existing physical. Then the overlay tunnels make it possible to build a software-defined on top of physical infrastructure that doesn t explicitly support SDN. Network hypervisor. A hypervisor is a tool that provides an abstraction layer of a, allowing engineers to provision virtual components and tenants or paths that are completely independent of the PAGE 5 OF 11

6 underlying physical. The hypervisor should do for what a server hypervisor does for server -- enable guest applications and operating systems regardless of changes in the underlying infrastructure. With this abstraction layer intact, the hypervisor should also provide visibility and manageability of virtual resources to support dynamic provisioning of virtual s and related virtual machine migration. As solutions grow, many are looking to incorporate them into an overall software-defined ing (SDN) architecture. Using SDN, and incorporating a hypervisor into an SDN architecture, will help make the both flexible and manageable enough for Infrastructure as a Service (IaaS) and virtual resource provisioning. VXLAN. A Virtual Extensible LAN (VXLAN)is a proposed encapsulation or tunneling protocol for running an overlay on existing Layer 3 infrastructure. VXLAN is said to make it easier for engineers to scale out a cloud computing environment while isolating cloud apps and tenants. Traditionally, engineers have used virtual LANs (VLANs) to isolate apps and tenants in a cloud computing environment, but VLAN specifications only allows for up to 4,096 IDs to be assigned at any given time. The primary goal of VXLAN is to extend the virtual LAN (VLAN) address space by PAGE 6 OF 11

7 assigning a 24-bit segment ID and increasing the number of available IDs to 16 million. VXLAN can potentially allow engineers to migrate virtual machines across long distances and play an important role in software-defined ing (SDN). To implement SDN using VXLAN, administrators can use existing hardware and software -- a feature that makes the technology financially valuable. OpenStack Quantam API. OpenStack Quantum is a cloud ing controller and Networking as a Service project within the OpenStack cloud computing initiative. It includes a set of application program interfaces (APIs), plug-ins and authentication/authorization control software that enable interoperability and orchestration of devices and technologies within IaaS environments. The core Quantum API includes support for Layer 2 ing and IP address management, as well as an extension for a Layer 3 router construct that enables routing between Layer 2 s and gateways to external s. Quantum includes a growing list of plug-ins that enable interoperability with various commercial and open source technologies. Multi-tenant s. Multi-tenant architecture allows the physical to be divided into smaller, isolated logical s. Like PAGE 7 OF 11

8 tenants in an apartment complex, multi-tenant s share the physical ing gear but operate using their own distinct management and security policy, preventing spillover or visibility between the segments. While the capability to separate s into logical units has been available for some time through the use of VLANs, virtualized data centers and cloud computing concepts have brought multi-tenancy back to the attention of administrators. There are a few approaches to isolating traffic in a multi-tenant, including defining virtual switches, like Cisco s Nexus 1000v or the open source Open vswitch for each application. VMs connect to the physical by linking to virtual Ethernet adapters and virtual switches. Then, these connect to physical Ethernet adapters and switches. Virtual switches manage the movement of VMs and also aid in the provisioning and management of VLANs in the data center. Network architects create segments or tenants musing these switches and in some cases using a centralized SDN controller. Multi-tenancy is often used within cloud s so that s can be created for specific sets of data and/or applications. Network functions. Network functions, or NFV, is an initiative to virtualize functions that were previously carried out by proprietary, dedicated hardware. The concept is still being PAGE 8 OF 11

9 developed by the ETSI Industry Specification Group (ISG) for Network Functions Virtualization and was first presented by a group of service providers at the SDN and OpenFlow World Congress in October The goal of NFV is to decrease the amount of proprietary hardware that is needed to launch and operate services -- functions previously done by routers, firewalls, load balancers and other hardware would instead be hosted on VMs. If it s successfully developed and implemented, NFV will revolutionize how s are built, managed and used to create services. It s unlikely that virtual hosts will totally displace equipment, but the high-value portion of services could be made into a series of interoperating, cloud-hosted components. NVGRE. Network Virtualization using Generic Routing Encapsulation, or NVGRE, is an overlay or tunnelling protocol for. Using the encapsulation protocol, engineers can create a large amount of virtual LANs for subnets that extend across dispersed data centers on Layers 2 and 3. Its purpose is to enable multi-tenant and load-balanced s to be shared across on-premises and cloud environments. The NVGRE specification was proposed by Microsoft, Intel, HP, and Dell, and it competes with another encapsulation method, VXLAN. Key capabilities of NVGRE include identifying PAGE 9 OF 11

10 a 24-bit Tenant Network Identifier (TNI) to address problems associated with the multi-tenant. It also uses a Generic Routing Encapsulation (GRE) to create an isolated virtual Layer 2 that could be confined to a single physical Layer 2 or extend across subnet boundaries. Nexus 1000v. The Cisco Nexus 1000v is a Cisco Nexus Operating System (NX-OS) switch that s rendered fully in software and provides visibility and management inside the virtual stack, enabling distinct tenants composed of physical and virtual ing resources. The switch enables a team to monitor, manage and troubleshoot both the physical and virtual s with Cisco commands and tools. The switch is programmable and is based on IEEE 802.1Q switching technology. It used a control-path API to communicate with the data plane. This allows administrators who use non- Cisco physical components to use the 1000v to handle virtual management. PAGE 10 OF 11

11 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the ing and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 11 OF 11

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach

More information

SDN Technologies Primer: Revolution or Evolution in Architecture?

SDN Technologies Primer: Revolution or Evolution in Architecture? There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This

More information

VMware vsphere Beginner s Guide

VMware vsphere Beginner s Guide The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros

More information

DWhat Is Network. D Limitations of Network. DAdvantages of Network. DNetwork Virtualization. D Terms BY JONATHAN HASSELL. Virtualization?

DWhat Is Network. D Limitations of Network. DAdvantages of Network. DNetwork Virtualization. D Terms BY JONATHAN HASSELL. Virtualization? E-Book March 2014 WINDOWS SERVER NETWORK VIRTUALIZATION THE COMPLEX POWERS OF NETWORK VIRTUALIZATION In, Microsoft added features that enable users to virtualize a network. The complexity is not to be

More information

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES E-Guide BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES SearchAWS T here is no catch-all for securing a cloud network. Administrators should take a comprehensive approach to protect AWS cloud resources

More information

The Emergence of SDN in WLAN

The Emergence of SDN in WLAN The Emergence of SDN in WLAN SDN is being implemented rapidly find out how SDN can benefit your wireless network. Contents architectures? Chuck Moozakis Some experts predict that the network functions

More information

Requirements for virtualizing Exchange Server 2010

Requirements for virtualizing Exchange Server 2010 Requirements for Exchange : Hardware Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. Yet while isn t difficult, it must be done properly to ensure success.

More information

Storage Virtualization Explained

Storage Virtualization Explained Storage Virtualization Explained In order to understand the benefits of storage virtualization, it is important to understand how it works. In this e-guide, brought to you by SearchServerVirtualization.com,

More information

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS E-Guide NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS SearchSecurity D evices may not connect to enterprise access systems or inventory and patching mechanisms. This expert eguide explains how

More information

Evaluating the Security of Software Defined Networking

Evaluating the Security of Software Defined Networking Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security

More information

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored

More information

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up

More information

Server Hardware for Virtualization: Exploring the Options

Server Hardware for Virtualization: Exploring the Options Server Virtualization: Exploring the Options As virtualization moves toward the private cloud, server hardware will also have to evolve. Soon, when you talk about hardware for virtualization, you ll mean

More information

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 E-Guide KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 SearchWindows Server T hinking of upgrading to Windows Server 2012 R2? In this eguide learn about five new features. From managing the cloud faster to

More information

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E nterprise adoption of Windows 10 isn t likely to follow the same pattern as for Windows 7, and that s a good thing, writes columnist Brian Madden. And even

More information

Best Practices for the Hybrid Cloud

Best Practices for the Hybrid Cloud Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public

More information

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD A modern trend in IT infrastructures reveals that more and more companies are installing solid-state storage and caching. Additionally,

More information

10 Cloud Storage Concepts to Master

10 Cloud Storage Concepts to Master 10 Cloud Storage Concepts to Master Cloud hype has given way to a certain amount of confusion, particularly around the terms used to describe the technology itself. This E-Guide defines "cloud washing"

More information

Desktop Virtualization: What Windows Managers Should Know

Desktop Virtualization: What Windows Managers Should Know One of the biggest jobs for any Windows shop is managing client workstations. Using desktop virtualization can help make that job a little bit easier. This e-guide, from SearchVirtualDesktop.com, can help

More information

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise

More information

An introduction to the VDI landscape

An introduction to the VDI landscape The : An Virtual desktop infrastructures are quickly gaining popularity in the IT industry as end users are now able to connect to their desktops from any location, at any time. This e-guide, from SearchVirtualDesktop.com,

More information

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those

More information

Lecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet

More information

SECURITY MONITORING: BE EVERYWHERE AT ONCE

SECURITY MONITORING: BE EVERYWHERE AT ONCE E-Guide SECURITY MONITORING: BE EVERYWHERE AT ONCE SearchNetworking P ervasive security improves on defense in depth by layering security according to risk and assigning it specifically to each critical

More information

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION E-Guide LESSONS LEARNED FROM AN OFFICE 365 MIGRATION SearchExchange Office 365. O ffice 365 s take time and careful research, but even then, some mistakes are inevitable. Find out what one expert learned

More information

PREVENTING PRIVILEGE CREEP

PREVENTING PRIVILEGE CREEP E-Guide PREVENTING PRIVILEGE CREEP SearchSecurity Mike Cobb The security principle of least privilege is the practice of limiting permissions to the minimal level that will allow users to perform their

More information

ADDRESSING TODAY S VULNERABILITIES

ADDRESSING TODAY S VULNERABILITIES E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.

More information

Quantum, network services for Openstack. Salvatore Orlando Openstack Quantum core developer

Quantum, network services for Openstack. Salvatore Orlando Openstack Quantum core developer Quantum, network services for Openstack Salvatore Orlando sorlando@nicira.com Openstack Quantum core developer Twitter- @taturiello Caveats Quantum is in its teenage years: there are lots of things that

More information

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? E-Guide AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? SearchSecurity A pplication development teams often prioritize timely delivery of software above all other concerns

More information

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH E-Guide MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH SearchSecurity L earn how to implement appropriate security controls for endpoint management. PAGE 2 OF 7 MANAGING ENDPOINTS WITH DEFENSE-IN-DEPTH Mike

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

SSL Certificate Management: Common Mistakes and How to Avoid Them

SSL Certificate Management: Common Mistakes and How to Avoid Them Common Mistakes and How to Avoid Them Common Mistakes and Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. How to Avoid Them By:

More information

Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI

Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI Utilizing Windows Server 2012 Key workarounds for avoiding the Modern UI Even though the graphical user interface (GUI) Microsoft introduced in Windows Server 2012 has its benefits, IT admins are reluctant

More information

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.

More information

Lecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Advanced Networking Virtual LAN. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Advanced Networking Virtual LAN Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Advanced Networking Scenario: Data Center Network Single Multiple, interconnected via Internet

More information

Identify and Eliminate Oracle Database Bottlenecks

Identify and Eliminate Oracle Database Bottlenecks Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle

More information

Zentera Systems CoIP Platform

Zentera Systems CoIP Platform Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic

More information

Disaster Recovery Planning: Weighing your customer s options

Disaster Recovery Planning: Weighing your customer s options Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information

MODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches

MODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches MODERNIZE YOUR DATA CENTER With Cisco Nexus Switches TABLE OF CONTENTS TABLE OF CONTENTS Data Center Needs are Changing Cisco Nexus Switches Lead the Transition to a Next Generation Data Center Outcomes

More information

Cloud e Datacenter Networking

Cloud e Datacenter Networking Cloud e Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica Prof.

More information

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES E-Guide STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES SearchStorage S torage network technology is changing and speed is the name of the game. To handle the burgeoning data growth, organizations

More information

A primer to SQL Server 2012

A primer to SQL Server 2012 A primer to SQL Server 2012 Many industry insiders have declared SQL Server 2012 to be the strongest version Microsoft has released in a long time. The 2012 edition offers new features geared toward enterprises

More information

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering

More information

OpenStack Networking: Where to Next?

OpenStack Networking: Where to Next? WHITE PAPER OpenStack Networking: Where to Next? WHAT IS STRIKING IS THE PERVASIVE USE OF OPEN VSWITCH (OVS), AND AMONG NEUTRON FEATURES, THE STRONG INTEREST IN SOFTWARE- BASED NETWORKING ON THE SERVER,

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing This paper was accepted for publication in the IEEE Cloud Computing. The copyright was transferred to IEEE. The final version of the paper will be made available on IEEE Xplore via http://dx.doi.org/10.1109/mcc.2017.28

More information

SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc.

SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc. SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc. Abstract Service Function Chaining (SFC) is a concept that has been around for a while. Newer technology advancements in the SDN

More information

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE D atabase performance can be sensitive to the adjustments you make to design. In this e-guide, discover the affects database performance data

More information

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,

More information

F5 Networks in the Software Defined DataCenter Era. Paolo Pambianco System Engineer CSP

F5 Networks in the Software Defined DataCenter Era. Paolo Pambianco System Engineer CSP F5 Networks in the Software Defined DataCenter Era Paolo Pambianco System Engineer CSP p.pambianco@f5.com Data Center Transformation Business demands are driving changes in IT service delivery Driving

More information

Minimizing the Risks of OpenStack Adoption

Minimizing the Risks of OpenStack Adoption Minimizing the Risks of OpenStack Adoption White Paper Minimizing the Risks of OpenStack Adoption Introduction Over the last five years, OpenStack has become a solution of choice for enterprise private

More information

Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO

Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, 2016 John Burke Principal Research Analyst & CIO john@nemertes Agenda ± Introductions ± SDN Adoption ± Cloud Management Adoption

More information

Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide

Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight OpenStack Team Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Traditional Virtualization Techniques Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

ANALYSIS OF VIRTUAL NETWORKS IN DATA CENTERS.

ANALYSIS OF VIRTUAL NETWORKS IN DATA CENTERS. ANALYSIS OF VIRTUAL NETWORKS IN DATA CENTERS. Ionka Gancheva, PhD student 45 Abstract: The article contains an analysis of virtual networks and technologies that are used at data centers nowadays. Many

More information

Cloud Networking From Theory to Practice. Ivan Pepelnjak NIL Data Communications

Cloud Networking From Theory to Practice. Ivan Pepelnjak NIL Data Communications Cloud Networking From Theory to Practice Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications Who is Ivan Pepelnjak... in 30 Seconds Networking engineer since 1985 (DECnet, Netware, X.25, OSI, IP...)

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Kahu Compute. Make Private Cloud Painless. Kahu Compute: Make Private Cloud Painless

Kahu Compute. Make Private Cloud Painless. Kahu Compute: Make Private Cloud Painless Kahu Compute: Make Private Cloud Painless Kahu Compute. Make Private Cloud Painless. 2 Kahu Compute: Make Private Cloud Painless. Software is eating the world, and the datacenter is next. How will your

More information

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco Nexus 1000V Switch for Microsoft Hyper-V Q&A Cisco Nexus 1000V Switch for Microsoft Hyper-V Overview Q. What are Cisco Nexus 1000V Switches? A. Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual

More information

Best Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect

Best Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect Best Practice Deployment of F5 App Services in Private Clouds Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect Agenda 1 2 3 4 5 The trend of data center, private cloud

More information

ADOPTING FIDO SearchSecurity

ADOPTING FIDO SearchSecurity E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2

More information

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?

More information

BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK

BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK Ken Cheng VP, Service Provider and Application Delivery Products September 12, 2012 Brocade Cloud-Optimized Networking

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

NETWORK OVERLAYS: AN INTRODUCTION

NETWORK OVERLAYS: AN INTRODUCTION NETWORK OVERLAYS: AN INTRODUCTION Network overlays dramatically increase the number of virtual subnets that can be created on a physical network, which in turn supports multitenancy and virtualization

More information

HP SDN Document Portfolio Introduction

HP SDN Document Portfolio Introduction HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,

More information

DELL EMC TECHNICAL SOLUTION BRIEF

DELL EMC TECHNICAL SOLUTION BRIEF DELL EMC TECHAL SOLUTION BRIEF ARCHITECTING A CLOUD FABRIC WHEN DEPLOING VIRTUALIZATION OVERLAS Version 2.0 Author: VICTOR LAMA Dell EMC Networking SE May 2017 Architecting a Data Center Cloud Fabric:

More information

CloudEngine 1800V Virtual Switch

CloudEngine 1800V Virtual Switch CloudEngine 1800V Virtual Switch CloudEngine 1800V Virtual Switch Product Overview Huawei CloudEngine 1800V (CE1800V) is a distributed virtual switch designed for virtualized environments in cloud data

More information

Virtual Machine Manager Domains

Virtual Machine Manager Domains This chapter contains the following sections: Cisco ACI VM Networking Support for Virtual Machine Managers, page 1 VMM Domain Policy Model, page 3 Virtual Machine Manager Domain Main Components, page 3,

More information

The Next Opportunity in the Data Centre

The Next Opportunity in the Data Centre The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing

More information

CS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization

CS-580K/480K Advanced Topics in Cloud Computing. Network Virtualization CS-580K/480K Advanced Topics in Cloud Computing Network Virtualization 1 Network Diagram of A Company 2 University Network Topology https://www.researchgate.net/figure/234782590_fig1_fig-5-see-university-network-infrastructure

More information

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE

More information

End to End SLA for Enterprise Multi-Tenant Applications

End to End SLA for Enterprise Multi-Tenant Applications End to End SLA for Enterprise Multi-Tenant Applications Girish Moodalbail, Principal Engineer, Oracle Inc. Venugopal Iyer, Principal Engineer, Oracle Inc. The following is intended to outline our general

More information

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 Table of Contents Executive Summary 3 Introduction 3 vsphere Replication... 3 VMware NSX for vsphere... 4 What

More information

Guide to SDN, SD-WAN, NFV, and VNF

Guide to SDN, SD-WAN, NFV, and VNF Evalu- ation Guide Technical Brief SD-WAN, NFV, and With so many acronyms and each one building on another, it can be confusing about how they work together. This guide describes the difference. 006180206

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

1V0-642.exam.30q.

1V0-642.exam.30q. 1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized

More information

SDN+NFV Next Steps in the Journey

SDN+NFV Next Steps in the Journey SDN+NFV Next Steps in the Journey Margaret T. Chiosi AT&T Labs Distinguished Architect SDN-NFV Realization 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

Get Your Datacenter SDN Ready. Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region

Get Your Datacenter SDN Ready. Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region Get Your Datacenter SDN Ready Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region AGENDA Data Center Trends, Priorities, Concerns What Problems Are we Trying to Solve? Cisco

More information

Frequently Asked Questions for HP EVI and MDC

Frequently Asked Questions for HP EVI and MDC Frequently Asked Questions for HP EVI and MDC Q. What are we announcing at VMworld? A. HP will be expanding Virtual Application Networks with new FlexFabric innovations that simplify the interconnection

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Network Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014

Network Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014 Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014 Presented by: Yuri Gittik Head of Strategic Developments and Innovation NFV Promises and Progress 22.04.14 Slide1

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data

More information

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN

More information

Orchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team

Orchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team Orchestration: Accelerate Deployments and Reduce Operational Risk Nathan Pearce, Product Development SA Programmability & Orchestration Team Agenda 1 2 3 Industry Trends Customer Journey Use Cases 2016

More information

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual

More information

Product Brief GigaVUE-VM

Product Brief GigaVUE-VM Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure

More information

Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade

Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade fkoelmel@broc 10/28/2013 2 2012 Brocade Communications Systems, Inc. Proprietary Information ETHERNET FABRICS

More information

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined

More information

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation

More information