VPN Extension Requirements for Private Clouds draft-so-vepc-00.txt.

Slides:



Advertisements
Similar presentations
Elastic Provisioning In Virtual Private Clouds
Advertisements

Identifying MPLS Applications
Windows IT Pro magazine Datacenter solution with lower infrastructure costs and OPEX savings from increased operational efficiencies. Datacenter.
Lecture 12 IaaS Chapter 3 of the second reference book.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Chapter 4 Infrastructure as a Service (IaaS)
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Module 1: Demystifying Software Defined Networking Module 2: Realizing SDN - Microsoft’s Software Defined Networking Solutions with Windows Server 2012.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Discussion on LI for Mobile Clouds
INTERNATIONAL (MPLS VPN & CARRIER ETHERNET) Products.
MPLS - 73nd IETF Minneaplis1 Composite Transport Group (CTG) Framework and Requirements draft-so-yong-mpls-ctg-framework-requirement-00.txt draft-so-yong-mpls-ctg-framework-requirement-00.txt.
A private cloud appliance that allows synchronous replication between storage arrays- and the applications and virtual machines with them- that are up.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: November 2011.
Use Case for Distributed Data Center in SUPA
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
VPN4DC Discussion VPN4DC Team Taipei, Taiwan.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
IETF 81 Quebec City1 Requirements and Framework of VPN-oriented Data Center Services Ning
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
80th IETF Prague Czech1 Requirements and Framework of VPN-oriented Cloud Services Ning
Server Virtualization
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
VMware vSphere Configuration and Management v6
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Network Virtualization Overlays Use Cases draft-timy-nvo3-use-case-01 Lucy Yong Mehmet Toy Aldrin Isaac Vishwas Manral Linda Dunbar Vancouver July 31,
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
Cloud computing: IaaS. IaaS is the simplest cloud offerings. IaaS is the simplest cloud offerings. It is an evolution of virtual private server offerings.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Alfresco Enterprise on Azure Shah Rahman Founder and CEO, CloudlyIO.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
What is Flexpod? Flexpod is a reference architecture for server, storage and networking components that are pretested and validated to work together as.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Chapter 1: Explore the Network
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Course: Cluster, grid and cloud computing systems Course author: Prof
Instructor Materials Chapter 7: Network Evolution
Chapter 6: Securing the Cloud
Organizations Are Embracing New Opportunities
VPN Extension Requirements for Private Clouds
Use Case for Distributed Data Center in SUPA
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Elastic Provisioning In Virtual Private Clouds
Oracle Solaris Zones Study Purpose Only
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Red Hat User Group June 2014 Marco Berube, Cloud Solutions Architect
Managing Clouds with VMM
An Introduction to Computer Networking
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
The Business Value of MPLS VPNs
Goals Introduce the Windows Server 2003 family of operating systems
Microsoft Azure Easily Accommodates Heavy Demands of Office 365 Management Platform MINI-CASE STUDY “Nuvolex relies on the Azure platform to deliver the.
Specialized Cloud Mechanisms
AWS Cloud Computing Masaki.
Cloud Computing Architecture
Specialized Cloud Architectures
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Presentation transcript:

VPN Extension Requirements for Private Clouds draft-so-vepc-00.txt

Description of Today’s Cloud Infrastructure Three components that make up the Cloud infrastructure –Data center, network (LAN/MAN/WAN), and the end user Multiple Cloud-based products and services are being offered across multiple data centers globally –Data centers are multi-tenant in nature, can be single Cloud Service Provider or independent 3 rd party operated –The application (VM) can be mobile The networks can be layer 2 and layer 3 IP/MPLS (VPN and non-VPN) networks, and layer 1 private line/OTN/MPLS-TP based networks –The selection of the network of choice is possible The users can be wireline and wireless with various access technologies –Users are mobile, and exchange of wireless/wireline is possible

Problem Areas The problem areas that this situation can cause Cloud Service Providers, especially for the existing VPN customers –Private Cloud Customer End to End Separation –Private Cloud Resource Virtualization –Private Cloud Services Restoration Other Non-VPN Specific Areas –Cloud Traffic Load-Balancing and Congestion Avoidance –QoS Synchronization –Cross Layer Optimization –Automation end to end Configuration –End-to-End Quality of Experience –OAM Considerations –Cloud Security

Private Cloud Customer End to End Separation Today data center segregates the customer traffic at layer 7 (application), and there is no standard on extending the VPN into data center. –The success of VPN services in the enterprise and the government world is largely due to its ability to virtually segregate the customer traffic at layer 2 and layer 3 –The lower layer the segregation can be maintained, the safer it is for the customers from security and privacy perspectives Cloud-Application (or the virtualization function) should have the ability to get access to VPN (including Layer 2/3 VPN), to segregate different Cloud-Services traffic trough the network. Very high level example solutions are provided to illustrate solution specific requirements

Private Cloud Resource Virtualization Today data center virtualization is totally handled by data center servers and hypervisors. –Application server and VM allocation and assignment –disk and memory space allocation –traffic loading and balancing –QoS assignments, and etc. The entire process is invisible to the underlying networks and the users

Private Cloud Resource Virtualization There shall be a way that the network can influence some virtualization functions that are important to the concept and spirit of the VPN. –The Private Cloud provisioning and management system SHALL have the ability to dedicate a specific block of disk space per services per VPN. –Each VPN SHALL have the exclusive access to the dedicated block of disk space. –Each VPN SHALL have the ability to indicate the mechanism used to prevent the unwanted data retrieval for the block of disk space after it is no longer used by the VPN, before it can be re-used by other parties –Each VPN SHALL have the ability to request a dedicated VM with certainly CPU capability, amount of memory and disk space. –Each VPN SHALL have the ability to request dedicated L2/3 network resources within the data center such as bandwidth, priorities, and so on –Each VPN SHALL have the ability to hold the requested resources without sharing with any other parties –Each VPN SHALL have the ability to limit the stored data mobility to a certain geographic region confinement (country/state).

Private Cloud Resource Virtualization There shall be a way that the network can influence some virtualization functions that are important to the concept and spirit of the VPN. –The Private Cloud provisioning and management system SHALL have the ability to dedicate a specific block of disk space per services per VPN. –Each VPN SHALL have the exclusive access to the dedicated block of disk space. –Each VPN SHALL have the ability to indicate the mechanism used to prevent the unwanted data retrieval for the block of disk space after it is no longer used by the VPN, before it can be re-used by other parties –Each VPN SHALL have the ability to request a dedicated VM with certainly CPU capability, amount of memory and disk space. –Each VPN SHALL have the ability to request dedicated L2/3 network resources within the data center such as bandwidth, priorities, and so on –Each VPN SHALL have the ability to hold the requested resources without sharing with any other parties –Each VPN SHALL have the ability to limit the stored data mobility to a certain geographic region confinement (country/state). –TCP/IP stack SHOULD support multiple routing instances. Each virtualization function SHOULD connect to the network through it own virtual routing instance.

Private Cloud Services Restoration Today the data center restoration and diversity design are not linked to the network restoration and diversity design. –May cause redundant diversity design –May cause traffic oscillation and service/performance degradation Highly performance sensitive VPN traffic is most at risk The solution SHOULD be able to indicate how the restoration is handled across layers –Allows end-to-end diversity design and optimization The restoration capability awareness needs to be scalable –Problems occur in one area of the Cloud SHALL not affect all other areas of the Cloud –Each component of the Cloud can scale independently

Next Step Which WG does this draft belong? Should the draft be split into Requirements and Framework draft, and Solution draft?