TWIPD – Cloud Computing Part I - Introduction 台灣思科網路學會議評會 Mar-22-2013 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 • Motivation & Training Schedule • Why Cloud Computing • Cloud Computing Overview • Key Technologies • Evolution of the Data Centre - Emerging Trends and Observations • Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Improving technical skills Topics election Clouding Computing IPv6 Wireless IP Telephony Security Cabling etc..... © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 • Cisco Associate Certifications CCDA CCNA CCNA Security CCNA Video CCNA Voice CCNA Wireless CCNA Data Center 640-911 DCICN 640-916 DCICT CCNA Service Provider CCNA Service Provider Operations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 15 hours training including in-person lectures, webinar sessions and Labs / Case Study In-Person Session Part II In-Person Session Part I 2013/Jan 2013/Feb 2013/Mar 2013/Apr 2013/May 2013/Jun 2 Webinar Sessions © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 • Part 1 – Introduction What is Cloud Computing • Part 2 – Virtualization Virtualization and products • Part 3 – Cloud Apps AWS, Azure, App Engine… • Part 4 – Cloud Computing in Data Center OpenFlow, SDN and Cisco One • Labs / Case Study Cloud environment in IVE, HK Cisco CloudLab © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 “I need to achieve greater cost efficiency and increased IT agility… an elusive combination…” “… need a solution that enables us to respond to customers within hours instead of days” “At the end of the day, I just want to simply, confidently say “yes” to my business.” Cisco Public TECDCT-2001 © 2012 quotes Cisco and/or its affiliates. from All rights reserved. CIO, Fortune 500 company taken global focus groups executed in June 2010 12 • Google processes 20 PB a day (2008) • Wayback Machine has 3 PB + 100 TB/month (3/2009) • Facebook has 2.5 PB of user data + 15 640K ought to be enough for anybody. TB/day (4/2009) • eBay has 6.5 PB of user data + 50 TB/day (5/2009) • CERN’s Large Hydron Collider (LHC) generates 15 PB a year © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 • Global data center traffic: Annual global data center IP traffic will reach 6.6 zettabytes by the end of 2016 By 2016, global data center IP traffic will reach 554 exabytes per month Global data center IP traffic will nearly quadruple over the next 5 years • Data center virtualization and cloud computing transition: The number of workloads per installed traditional server will increase from 1.5 in 2011 to 2.0 by 2016. The number of workloads per installed cloud server will increase from 4.2 in 2011 to 8.5 by 2016. By 2016, nearly two-thirds of all workloads will be processed in the cloud. • Global cloud traffic: Annual global cloud IP traffic will reach 4.3 zettabytes by the end of 2016 By 2016, global cloud IP traffic will reach 355 exabytes per month Global cloud IP traffic will increase six-fold over the next 5 years Global cloud IP traffic will account for nearly two-thirds of total data center traffic by 2016. Source: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns1175/Cloud_Index_White_Paper.html © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 • 282 U.S. IT decision-makers More than one-half (62 percent) of respondents currently store at least 100 TB of data Nearly one-third (32 percent) expect the amount of data they store to double in the next two to three years Respondents expect an average of 37 percent growth in data during the next two to three years Respondents reported an average of 38 percent of their current data as unstructured Nearly 9 in 10 (89 percent) already have a dedicated budget for a big data solution 51 percent of companies surveyed are in the middle stages of planning a big data solution, whereas 13 percent have fully deployed their solution Nearly three-quarters (72 percent) have begun the planning process but have not yet tested or deployed a solution Of that 72 percent, more than three-quarters (76 percent) plan to have their solution implemented in less than one year Most (62 percent) said developing near-real-time predictive analytics or data-mining capabilities during the next 24 months is extremely important, 58 percent rated expanding data storage infrastructure and resources as extremely important, and 53 percent rated increased amounts of unstructured data to analyze as extremely important © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 • Reduced Cost - Cost is a clear benefit of cloud computing, both in terms of CapEx (capital expenses) and OpEx (operating expenses). • Flexibility - Flexibility benefits derive from rapid provisioning of new capacity and rapid relocation or migration of workloads • Improved Automation - Cloud computing is based on the premise that services can not only be provisioned, but also de-provisioned in a highly automated fashion • Focus on Core Competency - Government agencies can reap the benefits of cloud computing in order to focus on its core mission and core objectives and leverage IT resources as a means to provide services to citizens • Sustainability - The poor energy efficiency of most existing data centers, due to poor design or poor asset utilization, is now understood to be environmentally and economically unsustainable. Through leveraging economies of scale and the capacity to manage assets more efficiently, cloud computing consumes far less energy and other resources than a traditional IT data center © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 IT resources and services that are abstracted from the underlying infrastructure and provided on demand and at scale in a multi-tenant and elastic environment © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Visual Model of NIST’s Working Definition of Cloud Computing Essential Characteristic s Service Models Measured Service On-Demand Self Service Software as a Service (SaaS) Rapid Elasticity Broad Network Access Platform as a Service (PaaS) 1. On-demand self-service 隨需自助服務 Resource Pooling Infrastructure as a Service (IaaS) 2. Broad network access 隨時隨地用任何網路裝置存取 3. Resource pooling 多人共享資源池 Deployment Models Public Private Hybrid Community http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html A Style of Computing Where Massively Scalable IT-Enabled Capabilities Are Delivered “as a Service” to Multiple External Customers Using Internet Technologies Source: Gartner 2008 4. Rapid elasticity 快速重新佈署靈活度 5. Measured service 可被監控與量測的服務 IT Resources and Services that Are Abstracted from the Underlying Infrastructure and Are Provided “On-Demand” and “At Scale” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 • NIST defines cloud computing by: 5 essential characteristics 3 cloud service models 4 cloud deployment models © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 • On-demand service Get computing capabilities as needed automatically • Broad Network Access Services available over the net using desktop, laptop, PDA, mobile phone • Resource pooling Provider resources pooled to server multiple clients • Rapid Elasticity Ability to quickly scale in/out service • Measured service control, optimize services based on metering © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 • Software as a Service (SaaS) - Business Management, Vertical Apps, Tools, Cloud Security, CRM • Platform as a Service (PaaS) - Development & Testing, Integration, Database, Application Platform, General • Infrastructure as a Service (IaaS) - Cloud Management, Storage, Virtualization, Content Delivery Networks, Networking, Computing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 • Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited userspecific application configuration settings. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 • Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Source: CloudTimes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 • AaaS Architecture as a Service • IaaS Infrastructure or Integration as a Service • BaaS Business as a Service • IDaaS Identity as a Service • CaaS Computing as a Service • LaaS Lending as a Service • DaaS Data as a Service • MaaS Mashups as a Service • DBaaS Database as a Service • OaaS Organization or Operations as a Service • EaaS Ethernet as a Service • SaaS Software or Storage as a Service • FaaS Frameworks as a Service • PaaS Platform as a Service • GaaS Globalization or Governance as a Service • TaaS Technology or Testing as a Service • HaaS Hardware as a Service • VaaS Voice as a Service • IMaaS Information as a Service © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 • Public Cloud infrastructure is available to the general public, owned by org selling cloud services • Private Cloud infrastructure for single org only, may be managed by the org or a 3rd party, on or off premise • Community Cloud infrastructure shared by several orgs that have shared concerns, managed by org or 3rd party • Hybrid Combo of >=2 clouds bound by standard or proprietary technology © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Private, Public, Hybrid Private Cloud Private Cloud Open Cloud Private Cloud Private Cloud Virtual Private Cloud InterCloud Stand-Alone Data Centers Public Cloud PRESENT 29 © 2010 Cisco and/or its affiliates. All rights reserved. © 2009 Cisco Systems, Inc. All rights reserved. Public Cloud Enterprise Extension Hybrid Cloud Public Cloud #1 Public Cloud #2 Cisco Confidential 29 Ownership Control © 2010 Cisco and/or its affiliates. All rights reserved. All cloud resources owned by or dedicated to enterprise All cloud resources owned by providers; used by many customers Internal Resources External Resources Private Cloud Public Cloud Cloud definition/ governance controlled by enterprise Cloud definition/ governance controlled by provider Cisco Confidential 30 Interoperability and Portability Between Public and Private Cloud Systems Hybrid Cloud © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Evolution of IT + Business Agility Consolidation (Reduce Costs) Virtualization (Improve Agility) Automation (Transform IT) Platinum Gold IT Infrastructure © 2010 Cisco and/or its affiliates. All rights reserved. Business Applications IT-as-a-Service Cisco Confidential 32 Evolution of IT + Business Agility Consolidation Automation Virtualization • Standardize LAN/SAN infrastructure • Virtualized Switching Fabric • Reduce points of management • Reduce number of Network Operating Systems • Virtualized Network Services • Enable Stateless Computing • Improved VM Security • • Additional Tenant Models Enable Policy-Based provisioning • Simplify overall IT operations • Reduce cabling • Increase application bandwidth 10x • © 2010 Cisco and/or its affiliates. All rights reserved. Enable dynamic QoS • Enable VM-aware security Cisco Confidential 33 Applications to the Public Cloud (SaaS) Public Cloud SaaS Virtual Private Cloud Private Cloud Phase 1: Emerging SaaS Happens – with or without IT sanction Embrace: Endorse apps which help people do their jobs Visibility: Monitor who is using which SaaS apps – endorsed and unendorsed Control: Technical enforcement of key policies © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Moving Infrastructure to the Cloud (IaaS) Most Enterprises Are Here Today Public Cloud SaaS SaaS Virtual Private Cloud IaaS Private Cloud Phase 1: Emerging Phase 2: Exploring SaaS Happens – with or without IT sanction Service delivery via private cloud Performance: Cloud-optimized security performance Management: Consistent physical-to-virtual span Integrate: Security in workloads to prepare for Public cloud migration © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Moving IaaS and PaaS to the Virtual Private and Public Cloud Public Cloud SaaS SaaS SaaS PaaS Virtual Private Cloud IaaS PaaS IaaS Private Cloud IaaS Phase 1: Emerging Phase 2: Exploring Phase 3: Embracing SaaS Happens – with or without IT sanction Service delivery via Private cloud Extend to VPC and PaaS Elasticity: Securely extend the network to the virtual private cloud Scale: On-demand workload mobility to the public cloud Automation: Enabling IT to deliver ready-platforms instead of DIY VMs © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 High Scale, Multi-tenant Highly Complex Environments Established Market Position Today CLM World Class Cloud Portal & Self Service Integration of apps for Private Cloud / Large Enterprises Today Multi-Vendor stack API configuration Modular Components integrated with existing stacks Today Others like OpenStack Leveraging Open source & partner assets Trend CIAC COMMON TECHNOLOGY Network Services Manager HiCloud © 2010 Cisco and/or its affiliates. All rights reserved. CITEIS HP/IBM/VMWare Rackspace Cisco Confidential 37 -37% Average TCO Cisco IT Cloud Journey -27% Average TCO Speed of delivery 6-8 Weeks Speed of Delivery Average TCO 2-3 Weeks Speed of Delivery 15 Minutes IT Maint / Innovation IT Maint / Innovation IT Maint / Innovation 70%/30% 60%/40% 40%/60% Legacy Computer Platform 100% Physical Legacy Computer Platform 46% Physical : 54% Virtual Virtualization Unified Computing Platform 25% Physical : 75% Virtual 100% Automated Unified Infrastructure and Automation CITEIS (Cisco IT Elastic Infrastructure Services) http://www.youtube.com/watch?feature=player_embedded&v=Gsmt717OCKc © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Service Unit VMware ESX/ESXi Network Virtualization Unified Infrastructure Virtualization Cisco Nexus Cost OVF VM 2x4 – Silver $ Bare-metal 8x64 $$$ Service Catalog Show/chargeback Automation Cisco Intelligent Automation for Cloud OVF* Self-service OVF Image Repository PaaS Integration (API) Workload Mobility Multi-tenancy Elasticity Logical Segmentation Control, Security and Fault Isolation Cisco UCS x86 *OVF = Open Virtualization Format © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 • Server Virtualization Virtual Machine • Network Visualization OpenFlow Software Define Network Cisco ONE • Distributed Storage Hadoop HDFS Big data: The next frontier for innovation, competition, and productivity McKinsey Global Institute 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 App App App Operating System Hardware Traditional Stack © 2010 Cisco and/or its affiliates. All rights reserved. App OS App App OS OS Hypervisor Hardware Virtualized Stack Cisco Confidential 55 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 • Pros Easy to conceptualize • Cons Fairly easy to deploy Expensive to acquire and maintain hardware Easy to backup Not very scalable Virtually any application/service can be run from this type of setup Difficult to replicate Redundancy is difficult to implement Vulnerable to hardware outages In many cases, processor is under-utilized © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 • Pros • Cons Resource pooling Slightly harder to conceptualize Highly redundant Slightly more costly (must buy hardware, OS, Apps, and now the abstraction layer) Highly available Rapidly deploy new servers Easy to deploy Reconfigurable while services are running Optimizes physical resources by doing more with less © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 • VMware vSphere 5 Hypervisor : ESXi • Microsoft SCVMM ( Microsoft System Center Virtual Machine Manager ) Hypervisor : Hyper-V、ESXi、Xen … • Citrix XenCenter Hypervisor : XenServer • Linux OpenNebula、Eucalyptus… Hypervisor : KVM、Xen、ESXi… © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Source: iThome:http://www.ithome.com.tw/itadm/article.php?c=69634&s= © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 • Spec. available at http://www.openflow.org • Developed by Stanford University in 2008 • Create programmable networks Source:OpenFlow Specification v1.1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 sw hw Standard Network Processing Userdefined Processing Experimenter writes experimental code on switch/router Source:OpenFlow White Paper © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Controller OpenFlow Switch specification OpenFlow Switch sw Secure Channel hw Flow Table PC Source:OpenFlow White Paper © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Rule Action Stats Packet + byte counters 1. 2. 3. 4. Switch Port + mask MAC src MAC dst Forward packet to port(s) Encapsulate and forward to controller Drop packet Send to normal processing pipeline Eth type VLAN ID IP Src IP Dst IP Prot TCP sport TCP dport Source:OpenFlow White Paper © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 • Hadoop is a framework for running applications on large clusters built of commodity hardware • The Hadoop framework transparently provides applications both reliability and data motion • Hadoop implements a computational paradigm named Map/Reduce, where the application is divided into many small fragments of work, each of which may be executed or reexecuted on any node in the cluster. In addition, it provides a distributed file system (HDFS) that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster • Both Map/Reduce and the distributed file system are designed so that node failures are automatically handled by the framework © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 • Highly fault-tolerant • High throughput • Suitable for applications with large data sets • Streaming access to file system data • Can be built out of commodity hardware © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Life used to be easy (well relatively easy) Images credit: IBM TECDCT-2001 © 2010 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Confidential 69 Life used to be easy (well relatively easy) The Data Centre Switching Design was based on the hierarchical switching we used everywhere Three tiers: Access, Aggregation and Core L2/L3 boundary at the aggregation Core Layer 3 Layer 2 Aggregation Add in services and you were done What has changed? Most everything New Layer 2 fabrics based on routinglike protocols Services Storage and LAN unification Pervasive Virtualization Cloud bursting TECDCT-2001 © 2010 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Access Cisco Public Cisco Confidential 70 Flexibility & Provisioning • Partitioning • Clustering • Physical devices partitioned into • Applications distributed across multiple virtual devices Virtual Machines servers App App App OS OS OS App OS OS App OS OS Physical Servers TECDCT-2001 © 2010 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Confidential 71 The race past ZERO Microsecond 1.000 Nanosecond 0.001 What is next? Picosecond 0.000001 Not for a long time..... Quick Note: Intel x86 server DDR3 memory access times are typically 60 – 150 nanoseconds TECDCT-2001 © 2010 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Confidential 72 Big Data – Hadoop, NoSQL & HDFS Click Streams Application Virtualized, Bare-Metal, Cloud Event Data Social Media Sensor Data Mobility Trends Logs Fabric Traditional Database Storage “Big Data” “Big Data” NoSQL RDBMS SAN/NAS Real-Time Capture, Read & Update Store And Analyze HDFS - Hadoop Distributed File System TECDCT-2001 © 2010 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Confidential 73 Operational Extremes Scaling to the Extreme’s Thousands of Racks, Thousands of Switches and 10’s of Thousands of Servers Topologies deepening and spreading wider Oversubscription & Buffering (non-blocking in the extreme case) Workload Traffic Pattern Changes (East-West) Availability (moving to N + 1 models) Automation and Programmability Thousands of Switches and Ten’s of thousands of servers TECDCT-2001 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 74 Compound Growth Rates Data Created Since Jan 1 2010 1,240,036,374,697,152,065,225 Bytes (And this number is very out of date!!) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75 For most of us this means a hybrid mix of application types Cloud? ASP/SaaS Client Server Minicomputer/PC Mainframe 1960 1970 TECDCT-2001 1980 1990 © 2012 Cisco and/or its affiliates. All rights reserved. 2000 Cisco Public 76 What talks to what and when client-to-server client-to-server Aggregation Aggregation L3 Service processing Service processing srv-to-srv or vm-to-vm Access Access L2 srv-to-srv or vm-to-vm srv-to-srv Virtual Access srv-to-srv Virtual Access L2 VM-to-VM srv-to-srv srv-to-srv srv-to-srv Srv-to-client srv-to-srv or vm-to-vm srv-to-srv srv-to-srv Srv-to-client VM-to-VM srv-to-srv •Traffic Patterns Changing: More server to server traffic, and more L2 server to server traffic. Apps such as VM mobility, clustering, intra-Tier and larger subnets Client to server traffic to same subnet instances across DCs: increase of /32 from DC out Virtual Server Environments could perform a fair degree of local switching © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77 OpenFlow Version 1.1 OpenFlow Swit ch Specificat ion Version 1.1.0 I mplement ed OpenFlow Switch Packet In Ingress port Action Set = {} Table 0 Packet + ingress port + metadata Action Set Table 1 ... Table n Packet Action Set Execute Action Set Packet Out (a) Packet s are mat ched against mul t iple t ables in t he pipeline Find highest - priorit y +Multicast, +ECMP, +Anycast, +MPLS Match fields: Match fields: Ingress port + metadata + pkt hdrs Ingress port + metadata + pkt hdrs m at ching fl ow ent ry Apply inst ruct ions: i. Modif y pack et & updat e m at ch fi elds Google will be buying SDN enabled networks theinst major vendors Flow (applyfrom act ions ruct ion) Table ii. Updat e act ion set (clear act ions and/ or Action set Action set in 2013/2014 writ e act ions inst ruct ions) © 2010 Cisco and/or its affiliates. All rights reserved. iii. Updat e m et adat a Cisco Confidential 78 There is no ‘single design’ anymore Spectrum of Design Evolution blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 blade1 slot 1 blade2 slot 2 blade3 slot 3 blade4 slot 4 blade5 slot 5 blade6 slot 6 blade7 slot 7 blade8 slot 8 Ultra Low Latency HPC/GRID Virtualized Data Center MSDC • High Frequency Trading • Layer 3 & Multicast • No Virtualization • Limited Physical Scale • Nexus 3000 & UCS • 10G edge moving to 40G • Layer 3 & Layer 2 • No Virtualization • iWARP & RCoE • Nexus 2000, 3000, 5500, 7000 & UCS • 10G moving to 40G • SP and Enterprise • Hypervisor Virtualization • Shared infrastructure Heterogenous • 1G Edge moving to 10G • Nexus 1000v, 2000, 5500, 7000 & UCS • Layer 3 Edge (iBGP, ISIS) • 1000’s of racks • Homogeneous Environment • No Hypervisor virtualization • 1G edge moving to 10G • Nexus 2000, 3000, 5500, 7000 & 79 UCSCisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. Data Center http://www.cisco.com/go/datacenter Cloud Computing http://www.cisco.com/web/solutions/trends/cloud/index.html CloudVerse http://www.cisco.com/go/cloudverse TheCloud http://www.cisco.com/web/about/ent/cloud/index.html Network Fabric http://www.cisco.com/en/US/netsol/ns725/index.html Cloud Lab http://cloudlab.cisco.com/ Youtube Resource http://www.youtube.com/user/CiscoDataCenter © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81 Thank you. • Threat #1: Abuse and Nefarious Use of Cloud Computing • Threat #2: Insecure Interfaces and APIs • Threat #3: Malicious Insiders • Threat #4: Shared Technology Issues • Threat #5: Data Loss or Leakage • Threat #6: Account or Service Hijacking • Threat #7: Unknown Risk Profile © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83