Professional Documents
Culture Documents
Colin Li colli@cisco.com lli@ i Consulting Solution Architect Asia Pac CTO office
Cisco Confidential
cloud?
a) b) c) d) Economic Benefits Unclear (e.g. TCO) Security Concerns Loss of Control Application Migration
Cisco Confidential
Cloud Defined
IT resources and services that are abstracted from the underlying infrastructure provided on ondemand and at scale in a multi-tenant environment
Essential Characteristics
On-Demand Self Service Measured Service Rapid Elasticity p y
Resource Pooling
Service Models
Deployment Models
Public
Private
Hybrid
Community
Cisco Confidential
Virtual Machine
VSwitch
Compute
Access
Services
Core/Agg.
Peering
IP-NGN Backbone
App OS
OS
Internet
IP-NGN
Partners
ACE
FW
App App App OS OS OS
Nexus 1000v SAN Switches Rack Servers Nexus 5000 ( Salaak ( 1.0 )) Salaak 1.0 ) MDS ( Salaak UCS ( Salaak 1.1) 1.1 ) 2010 Cisco and/or its affiliates. All rights reserved. Consolidated Storage VMWare Vspehere 4 ESX 4
Nexus 7000
Cisco Confidential
On-Demand Consumption
Autoprovisioningofallvirtualmachineattributes throughconvergedinfrastructuremanagement Virtualization aware network/storage/compute Virtualizationawarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservicefor differenttenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters VRFs ACLs and Virtual Data Centers ProvenDataCenteroftheFutureandNextGeneration Networkingscalability N t ki l bilit AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService
Multi-Tenant Architecture
Capacity C it At Scale
DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
SAN
LAN
Dynamic Provisioning y g
Complete infrastructure repurposing Integrated with 3rd part tools
Server Name: LS-A UUID: UUID 56 4dcd3f 59 5b 61 61 MAC : 08:00:69:02:01:FC WWN: 5080020000075740 Boot Order: SAN, LAN
Chassis-1/Blade-5
Chassis-9/Blade-2
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
VirtualizedNetwork
Layer 3virtualizationwithVRFs Layer3 virtualization with VRFs Layer2virtualizationwithvlans,otherencaps Servicevirtualizationwithvirtualcontexts VMlevelgranularity&advancednetworking features Virtualizationawarecomputefabric Networkadaptervirtualization VSANs
Data base
Web
App
nNICs
mHBAs
VIC
2 x 10G ports
Cisco Confidential
NetworkContainer:AbstractstheServicePath
Touchpoints: per-tenant variables/logical boundaries (IP Address blocks, VLANS, VRFs, VDCs) & virtual services (security vFWs or LB contexts) ( y )
IP/NGN Backbone CRS BGP
P E CE
L3orL2VPN Access
N7k Core
BGP
N7k AggVRF
Eachtenantcontainedina uniqueVRF
FW Outer VLAN
FW Inner VLAN, ACE Outside VLAN
BGP
DSN VSS Pair
Vlan/vrfmapstounique VirtualFW/loadbalancer
Static
N7k Acc VRF
L3 L2
Data base VM VLANs Data base (N1k) Data 2010 Cisco and/or its affiliates. All rights reserved. base App App App Web Web Web
Add Capacity For System Not Single Service System, Capa acity Consumed
Available Capacity
Service 1
Available Capacity
Service 2
Service 3
Service 4
Time Ti
Added infrastructure is dynamically discovered, and comes online to meet any required demand.
Cisco Confidential
On-Demand Consumption p
Autoprovisioningofallvirtualmachineattributes throughconvergedinfrastructuremanagement Virtualizationaware network/storage/compute Virtualization awarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservice fordifferenttenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters ProvenDataCenteroftheFutureandNextGeneration Networkingscalability Networking scalability AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService
Multi-Tenant Architecture
Capacity At Scale
DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
MultiTenancyPathIsolation MultiTenancyPathIsolation
Each tenant is logically isolated from the others using VRF as a container Dedicated logical instances of vrf,vlan,fw,SLB etc .. for each tenant to provide security , privacy and policy control Customer=VRF Customer=VRF VRFBlue VRFPurple
Cisco Confidential
11
Disaster Recovery
none
Large g 300 16 50 50
Medium 150 8 50 50
Small 50 4 50 50
Cisco Confidential
12
System Configs
Virtual FW + pVLANs
Logical Topology
Self Provisioning Once complex and manual process are automated Provides the customer with a fully segmented environment Elimination of administrative errors through service automation Removal of manual resource usage documentation and tracking Reduction in service deployment time Minimizing the intergroup coordination of technologies Abstraction of complexities from the user
Customer 1
Customer 2
Step Optional:
Customer 1
app
Logical T L i l Topology l
Customer 2
web
db
app
Storage Manager
Pod
2010 Cisco and/or its affiliates. All rights reserved.
Pod
Virtualization Manager
BMC
Cisco Confidential 15
NetworkContainers Virtuallyandsecurely isolatedbytenant isolated by tenant withinaPod UniqueBenefit:Logical Multi tenancy Multitenancy allowscreationof onetomanyzones
Zones Contain Customizedpolicy Customized policy basedworkloads UniqueBenefit: CLMpolicydriven CLM policy driven placementmakes decisiononbest resourceplacement.
BMC CLM configures and places services within Network Containers and Zones
E2E
Automation of over 200 command lines per
container
10 requests in queue at same time Injected physical and logical error conditions Troubleshooting with trace capabilities 90% HA coverage, improve in next release De-provisioning and resource reclamation Base product, production quality
Provisioning: Average 15-20 minutes. Bronze3 - Start - End: 5:20:19 PM - 5:38:56 PM Bronze2 - Start - End: 5:20:11 PM - 5:36:45 PM WedDeepika - Start - End: 5:19:50 PM - 5:49:23 PM WedBronze1 - Start - End: 5:19:49 PM - 5:34:19 PM WedDeepika2 - Start - End: 5:19:44 PM - 5:51:19 PM WedBronze4 - Start - End: 5:19:40 PM - 5:32:08 PM WedDeepika3:- Start - End: 5:19:38 PM - 5:47:09 PM WedGold3 Start End: 5:21:12 W dG ld3 - St t - E d 5 21 12 PM - 5 55 11 PM 5:55:11 WedGold2 - Start - End: 5:22:20 PM - 5:44:01 PM WedGold1 - Start - End: 5:21:32 PM - 5:46:18 PM
Cisco Confidential
18
On-Demand Consumption
A t Autoprovisioningofallvirtualmachineattributes ii i f ll i t l hi tt ib t throughconvergedinfrastructuremanagement Virtualizationawarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservicefor differenttenants different tenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters ProvenDataCenteroftheFutureandNextGeneration Networkingscalability g y AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService
Capacity At Scale
DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
NAS
NAS
SAN UCS61xx
UCS61xx
SAN
........
BasePOD
2010 Cisco and/or its affiliates. All rights reserved.
PODn
Cisco Confidential 20
Compact 64servers 10GEwith 0G i h SAN&NAS 1GE with SAN&NAS SAN & NAS
Cisco Confidential 21
64serverPODCharacteristics
2 UCS clusters, each of 32 blades 64 x B200 Blade server @ 96GB RAM 512 Cores 512 Gold VMs 1vCore per VM (1:1) ov 1024 SilverVMs 0.50vCore per VM (2:1) ov 2048 Bronze VMs 0 25vCore per VM(4:1) ov 0.25vCore 5-9 VMs/VLAN
UCS61xx
SAN
64servers
Combination of all 3 workload types in a POD NoofCores NoofVMs Large,20% Medium,30% Small,50% 102 154 256 TotalVMs
2010 Cisco and/or its affiliates. All rights reserved.
NAS
NAS
UCS61xx
SAN
UCS61xx
SAN
........
64server,4,096VMs 64 server 4 096 VMs
POD1 POD 1
POD6 POD 6
Cisco Confidential 23
MaximumscalabilityisdependentontheCore/aggmacaddresslimitof 128K
2010 Cisco and/or its affiliates. All rights reserved.
512serverPODCharacteristics
8x8-chassis UCS systems (Vblock Type 2 Max) 8 blades/ESX cluster 512 x B200 Blade server @ 96GB RAM 4,096 4 096 Cores 816 Large VMs1vCore per VM (1:1) ov 2,464 Med. VMs0.50vCore per VM (2:1) ov 8,192 Sm. VMs0.25vCore per VM(4:1) ov ( ) 5-9 VMs/VLAN in lab (1/8th of a pod in lab) 500-1000 tenants = 12-23 VMs/VLAN
UCS61xx
SAN
512servers
POD1
Combination of all 3 workload types in a POD yp NoofCores NoofVMs Large,20% Medium,30% Small,50% 816 1,232 2,048 TotalVMs
2010 Cisco and/or its affiliates. All rights reserved.
NAS
NAS
UCS61xx
SAN
UCS61xx
SAN
........
512server,16,384VMs
2010 Cisco and/or its affiliates. All rights reserved.
POD1
512server,16,384VMs
POD6
Cisco Confidential 25
MaximumscalabilityisafunctionofCoreportdensity:7018wouldallowforfurtherL2scale.
organization ?
a) b) c) ) d) Cloud Management /Orchestration Scalability On demand / Elasticity y All of the above
Cisco Confidential
26
Cisco Confidential
27
Cisco Confidential
28
Cisco Confidential
29
Cisco Confidential
30
Cisco Confidential
31
Cisco Confidential
32
Cisco Confidential
33
Cisco Confidential
34
Cisco Confidential
35
Cisco Confidential
36
Cisco Confidential
37
Cisco Confidential
38
Cisco Confidential
39
Cisco Confidential
40
Cisco Confidential
41
Cisco Confidential
42
Cisco Confidential
43
Cisco Confidential
44
Cisco Confidential
45
Cisco Confidential
46
Cisco Confidential
47
Cisco Confidential
48
Cisco Confidential
49
Cisco Confidential
50
Enterprise IT Capability
App App App OS OS OS Virtual Data Center Application Security Services Virtual Data App App Center App OS OS OS Application Security Services App App App OS OS OS App App App OS OS OS
Cloud OS
Cloud OS
Network Services (Security, Performance, Monitoring) Network Transport Virtualization (VPN) IP-NGN
Enterprise Network
Cisco is the only systems vendor with value-add solutions for the entire cloud computing infrastructure ecosystem. p g y
Cisco Confidential
51
Thank you.
colli@cisco.com @