2 SG 13 Regional Workshop for Africa on Saving, Security & Virtualization”

advertisement
2nd SG 13 Regional Workshop for Africa on
“Future Networks: Cloud Computing, Energy
Saving, Security & Virtualization”
(Tunis, Tunisia, 28 April 2014)
Business Values of Virtualization
Mounir Ferjani,
Senior Product Manager,
Huawei Technologies
mounir.ferjani@huawei.com
Tunis, Tunisia, 28 April 2014
5/31/2016
2
Over the past 200 years ……
Nikolai Dimitrievic Kondratiev
1790
1840
• Steam engine
• Cotton
• Steel
• Railway
5/31/2016
1890
• Electricity
• Chemicals
1940
• Oil
• Automobile
1990
3
Over the past 20 years ……
Ever-changing life and work
5/31/2016
• 6.5B mobile users
• 2.7B Internet users
• 2.4ZB(1021) Data
•502EB(1018) traffic
4
Digital world and smart world ……

Deep integration of digital and
physical worlds.

The physical world will be expressed
through

.
The integration will make the world
.
5/31/2016
5
5/31/2016
6
Virtualization
Virtualization, refers to the act of
creating a virtual (rather than actual)
version of something.
Virtualization is the simulation of the
software and/or hardware upon
which other software runs.
NIST SP 800-125
Tunis, Tunisia, 28 April 2014
7
Virtualization Stack
Network
Storage
OS
Applications
Desktop virtualization
Virtualization helps implement Cloud
Computing
Tunis, Tunisia, 28 April 2014
8
Network virtualization
Virtualize one hardware network
equipment into many virtual network
equipments
Virtualize many hardware into one
virtual network equipment
(consolidate)
Layer 2&3 technologies
Tunis, Tunisia, 28 April 2014
9
External/internal network
virtualization
Tunis, Tunisia, 28 April 2014
10
Network virtualization benefits
Improve network resource usage
Internal : traffic between VMs through
vNICs
External : many networks without the
need to build many physical
Improve security : isolate traffic
based on groups : e.g. isolate depts
Tunis, Tunisia, 28 April 2014
11
What is storage virtualization
Making abstraction separating :
Host implementation (application, OS)
Network implementation (switch, router,
gateway)
Storage implementation (array, library, device)
Make invisible to host : physical pathing,
device characteristics, physical data
location
Location and implementation transparency
Tunis, Tunisia, 28 April 2014
12
Storage virtualization stack
SNIA storage stack
Tunis, Tunisia, 28 April 2014
13
Storage virtualization benefits
Increase storage asset utilization
Reduce power / cooling costs
Reduce management complexity
Openness to server, network and storage
technology
Reduce down time
Dynamic provisioning (elastic cloud, on
demand)
Increase scalability
Tunis, Tunisia, 28 April 2014
14
OS virtualization
NIST definition : Full virtualization
Virtualization is the simulation of the
software and/or hardware upon
which other software runs.
NIST SP 800-125
Each OS appears to have :
CPU, memory,
storage (hard disk, USB, CD-ROM,…storage controller,
Ethernet controller, display and sound, keyboard and
mouse, parallel ports, …
Tunis, Tunisia, 28 April 2014
15
Types of OS virtualization
NIST SP 800-125
Tunis, Tunisia, 28 April 2014
16
Benefits of OS virtualization
Consolidation : reduce CAPEX
Efficiency : Rise hardware usage
Flexibility : reduce management and OPEX
costs
Security : Isolation prevent :
Avoid crash
DDOS attacks
Side channel Attacks
Weakness : hypervisor is SPOF if compromised
all is down.
Tunis, Tunisia, 28 April 2014
17
Traditional desktop infrastructure: hard
to maintain, can not guarantee security
and lacks mobility.
Dispersed deployment and
maintenance,
local storage
Complex O&M
Configuration file
Application
OS
Hardware
Security risk
Difficult to service
Page 18
Data storage center
Desktop Cloud solution
Security management
center
Application delivery
User interface (UI) is transmitted to
terminal devices by using remote
protocols, such as ICA, RDP, or PCoIP.
center
Desktop delivery
center
Huawei desktop cloud platform
Configuration file
Application

OS
Hardware
User equipment only includes a
keyboard, a mouse and a monitor
Creates a reliable and scalable shared resource pool to
perform unified management.

Decouples hardware from the OS to perform central delivery.

Decouples applications from the OS to perform central
delivery.

Decouples data from the OS to perform central storage.

Creates multi-level security systems to perform distributed
security control.
Page 19
Application virtualization
Application virtualization layer to run
specific software (layer replaces the
run time environment)
Separate applications from OS
The container will ensure OS security
allows applications to run in
environments that do not suit the native
application: e.g. Wine allows some
Microsoft Windows applications to run
on Linux.
Tunis, Tunisia, 28 April 2014
20
Virtualization technology facilitates the
implementation of cloud computing
5/31/2016
21
Cloud computing
Model for enabling ubiquitous,
convenient, on-demand network
access to a shared pool of
configurable computing resources
(e.g., networks, servers, storage,
applications, and services) that can
be rapidly provisioned and released
with minimal management effort or
service provider interaction
NIST SP-500-291
5/31/2016
22
Characteristics
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
5/31/2016
23
Cloud Ecosystem/actors
5/31/2016
24
Cloud Cost model
Traditional licensing associated with
ownership, number of users,
support, and maintenance costs and
services are being challenged by the
pay-as-you-go model found in ondemand Cloud Computing
5/31/2016
25
Capacity management
5/31/2016
26
ROI/Cost saving
Opengroup
5/31/2016
27
Rapid provisioning : TTM impact on
ROI
Opengroup
5/31/2016
28
Increase Margin
Opengroup
5/31/2016
29
Thanks
Tunis, Tunisia, 28 April 2014
30
Download