SlideShare une entreprise Scribd logo
1  sur  24
ACI – A Policy Driven Infrastructure for the Intercloud
World
Salim Mehta
Technical Architect Cisco Systems
The History & Evolution of SDN
27 August 2015
Evolution of IT
www.gartner.com/imagesrv/cio/pdf/cio_agenda_execsum2014.pdf
IT Industrialization DigitalizationIT Craftsmanship
Speed,
Innovation and Conventional
Control, Predictable,
Low Risk
Functional Operationally
Focused
Moving to Webscale IT
Self Service
MTTR
Light IT
(1 x Admin: 150K servers)
Few Applications
(Customer Focused)
Applications Built for Cloud
Super Highly Skilled Workforce
Set the Standard
Clean Slate Approach
Request and Wait
MTBF
Heavy IT
(1 x Admin: 500 servers)
Many Applications
(Customer and Internal Focused)
Applications Built for ERP
Highly Skilled Workforce
Follow the Standard
Legacy / Historical
Today
Spend Time Save $ Spend $ Save Time
Moving to Webscale IT
Self Service
MTTR
Light IT
(1 x Admin: 150K servers)
Few Applications
(Customer Focused)
Applications Built for Cloud
Super Highly Skilled Workforce
Set the Standard
Clean Slate Approach
Tomorrow
Spend Time Save $ Spend $ Save Time
Self Service
Automation
Cloud
Cloud Capable Applications
Software Defined Networking
BiModal IT
DevOps
Fast IT
Private
Cloud
SDN 1.0 - OpenFlow
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Box by
box mgmt
SDN 1.0 - OpenFlow
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
OpenFlow
Controller
SDN 1.0 - OpenFlow
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Controller
Control
Plane
Data
Plane
SDN 1.0 - OpenFlow
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Controller
Availability?
Scale?
SDN 2.0 - Separate Overlay
Controller
VM VMVM VM VMVM VMVM
Underlay
SDN 2.0 - Separate Overlay
Controller
VM
VMs on same DVS
VMVM VM VMVM VMVM
No correlation between
overlay & underlay
SDN 2.0 - Separate Overlay
Controller
VM VMVM VM VMVM VMVM
Two Points of control!
Physical
Hosts?
Diagnostics?
VMVM VM
SDN 3.0 - Application Centric Infrastructure
DB Tier
Storage Storage
Application
Client
Web Tier App Tier
Application policy model
Policy instantiation
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Integrated Underlay
Distributed Control Plane
APIC
SDN 3.0 - Application Centric Infrastructure
DB Tier
Storage Storage
Application
Client
Web Tier App Tier
Multiple isolated
virtual networks
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Any Hypervisor
APIC
SDN 3.0 - Application Centric Infrastructure
DB Tier
Storage Storage
Application
Client
Web Tier App Tier
VM VMVM
10.2.4.7
VM
10.9.3.37
VM
10.32.3.7
VMVM
Virtual & Physical Hosts
APIC
Single Point of controlVM VM
Advanced telemetry
for application traffic
visibility
How we deliver infrastructure with policy…
Storage
WEB APP DB
LAN LAN LAN LAN SAN
LBFW
LAN
Connectivity
Security
QoS
SLA
Services
PolicyConfiguration Point
Policy Driven Data Centre
Define the
Application Communication Policy
Provision the Policy into the Fabric
(Fully Automated)
SecurityNetwork Virtualization Application Cloud
Policy Framework
Invest
Time
Spend
No
Time
NETWORKSECURITYCOMPUTE STORAGE OPERATIONSIMPLEMENTATIONARCHITECTURE DESIGN
BEFORE AFTER
Organisational Shift
TECHNOLOGY SILOS VIRTUAL TEAMS
NETWORK
UC / VIDEO
X-aaS
Bimodal IT
http://www.gartner.com/newsroom/id/1923014
How Business Consumes IT
Compute Network StorageSecurity
ITClients
Pools of Infrastructure Resource
Compute Network StorageSecurity Cloud
Orchestration &
Automation
Resource Controllers
Infrastructure
Pool of Infrastructure Resource
PSC UCSD
How Developers Consume IT
Compute Network StorageSecurity Cloud
Open
Daylight
PNSCUCSM APICVMM Storage
Controller
API API API API API API
Fast IT Data Centre & Cloud Reference Architecture
OpenIntegration
MANAGEMENT AUTOMATION POLICY SECURITY
ECOSYSTEMPARTNERS
UCS Director Openstack
UCS
Manager
Application
Policy
Infrastructure
Controller
Converged
Infrastructure
Managers
OpenDaylight
Virtual
Machine
Manager
Process Orchestrator
3rd Party
Orchestrator
IaaS PaaS SaaS ITaaS Intercloud
Prime Services Catalogue
ORCHESTRATION
SERVICES
AUTOMATION
PORTAL
INFRASTRUCTURE
MANAGEMENT
Stack Designer
Intercloud
Fabric
Key Takeaways
SIMPLE
SIMPLIFY your infrastructure and
INTEGRATE across silos
SMART
CREATE intelligent capabilities
and SERVICES that fuel growth
SECURE
DEFEND against ATTACKS and
mitigate THREATS dynamically
Programmatic
Interfaces
Orchestration
and Automation
Centralized
Control
Fast IT
Thank you.

Contenu connexe

Tendances

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
Thomas Graf
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 

Tendances (20)

Data Center Architecture Trends
Data Center Architecture TrendsData Center Architecture Trends
Data Center Architecture Trends
 
PGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationPGW GGSN Optional Services Configuration
PGW GGSN Optional Services Configuration
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
OpenFlow
OpenFlowOpenFlow
OpenFlow
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield Systems
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
5G Services Story
5G Services Story5G Services Story
5G Services Story
 
Fortinet
FortinetFortinet
Fortinet
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
CTAP
CTAPCTAP
CTAP
 

En vedette

Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
OpenSourceIndia
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
Arushi Garg
 

En vedette (19)

Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?Software-Defined Networking: Evolution or Revolution?
Software-Defined Networking: Evolution or Revolution?
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
MidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & PoliciesMidoNet: Network Virtualization & Policies
MidoNet: Network Virtualization & Policies
 
SDN Adoption
SDN AdoptionSDN Adoption
SDN Adoption
 
SDNs: hot topics, evolution & research opportunities
SDNs: hot topics, evolution & research opportunitiesSDNs: hot topics, evolution & research opportunities
SDNs: hot topics, evolution & research opportunities
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
Understanding SDN
Understanding SDNUnderstanding SDN
Understanding SDN
 
Realising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFVRealising the Immediate Benefits of SDN and NFV
Realising the Immediate Benefits of SDN and NFV
 
Traffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined NetworksTraffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined Networks
 
Naveen nimmu sdn future of networking
Naveen nimmu sdn   future of networkingNaveen nimmu sdn   future of networking
Naveen nimmu sdn future of networking
 
Virtual time round-robin scheduler presented by Parang Saraf (CS4204 VT)
Virtual time round-robin scheduler presented by Parang Saraf (CS4204 VT)Virtual time round-robin scheduler presented by Parang Saraf (CS4204 VT)
Virtual time round-robin scheduler presented by Parang Saraf (CS4204 VT)
 
The dark side of SDN and OpenFlow
The dark side of SDN and OpenFlowThe dark side of SDN and OpenFlow
The dark side of SDN and OpenFlow
 
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
 
NFV SDN for carriers
NFV SDN for carriersNFV SDN for carriers
NFV SDN for carriers
 
Internship(bba) presentation aci pure salt
Internship(bba) presentation aci pure saltInternship(bba) presentation aci pure salt
Internship(bba) presentation aci pure salt
 
NFV for beginners
NFV for beginnersNFV for beginners
NFV for beginners
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 

Similaire à The History and Evolution of SDN

System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
Amit Gatenyo
 
Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation
Mauricio Godoy
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
Amit Gatenyo
 

Similaire à The History and Evolution of SDN (20)

SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
VMworld 2013: Cloud Service Automation with NSX and vCloud Automation Center
VMworld 2013: Cloud Service Automation with NSX and vCloud Automation Center VMworld 2013: Cloud Service Automation with NSX and vCloud Automation Center
VMworld 2013: Cloud Service Automation with NSX and vCloud Automation Center
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Net App Cisco V Mware Integrated Presov6
Net App Cisco V Mware Integrated Presov6Net App Cisco V Mware Integrated Presov6
Net App Cisco V Mware Integrated Presov6
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
 
VMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Developer-Ready Transformation
VMware Developer-Ready Transformation
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Cloud Orchestrator - IBM Software Defined Environment Event
Cloud Orchestrator - IBM Software Defined Environment EventCloud Orchestrator - IBM Software Defined Environment Event
Cloud Orchestrator - IBM Software Defined Environment Event
 
Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer DemandPaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 

Plus de Napier University

Plus de Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

The History and Evolution of SDN

  • 1. ACI – A Policy Driven Infrastructure for the Intercloud World Salim Mehta Technical Architect Cisco Systems The History & Evolution of SDN 27 August 2015
  • 2.
  • 3. Evolution of IT www.gartner.com/imagesrv/cio/pdf/cio_agenda_execsum2014.pdf IT Industrialization DigitalizationIT Craftsmanship Speed, Innovation and Conventional Control, Predictable, Low Risk Functional Operationally Focused
  • 4. Moving to Webscale IT Self Service MTTR Light IT (1 x Admin: 150K servers) Few Applications (Customer Focused) Applications Built for Cloud Super Highly Skilled Workforce Set the Standard Clean Slate Approach Request and Wait MTBF Heavy IT (1 x Admin: 500 servers) Many Applications (Customer and Internal Focused) Applications Built for ERP Highly Skilled Workforce Follow the Standard Legacy / Historical Today Spend Time Save $ Spend $ Save Time
  • 5. Moving to Webscale IT Self Service MTTR Light IT (1 x Admin: 150K servers) Few Applications (Customer Focused) Applications Built for Cloud Super Highly Skilled Workforce Set the Standard Clean Slate Approach Tomorrow Spend Time Save $ Spend $ Save Time Self Service Automation Cloud Cloud Capable Applications Software Defined Networking BiModal IT DevOps Fast IT Private Cloud
  • 6. SDN 1.0 - OpenFlow VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Box by box mgmt
  • 7. SDN 1.0 - OpenFlow VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM OpenFlow Controller
  • 8. SDN 1.0 - OpenFlow VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Controller Control Plane Data Plane
  • 9. SDN 1.0 - OpenFlow VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Controller Availability? Scale?
  • 10. SDN 2.0 - Separate Overlay Controller VM VMVM VM VMVM VMVM Underlay
  • 11. SDN 2.0 - Separate Overlay Controller VM VMs on same DVS VMVM VM VMVM VMVM No correlation between overlay & underlay
  • 12. SDN 2.0 - Separate Overlay Controller VM VMVM VM VMVM VMVM Two Points of control! Physical Hosts? Diagnostics? VMVM VM
  • 13. SDN 3.0 - Application Centric Infrastructure DB Tier Storage Storage Application Client Web Tier App Tier Application policy model Policy instantiation VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Integrated Underlay Distributed Control Plane APIC
  • 14. SDN 3.0 - Application Centric Infrastructure DB Tier Storage Storage Application Client Web Tier App Tier Multiple isolated virtual networks VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Any Hypervisor APIC
  • 15. SDN 3.0 - Application Centric Infrastructure DB Tier Storage Storage Application Client Web Tier App Tier VM VMVM 10.2.4.7 VM 10.9.3.37 VM 10.32.3.7 VMVM Virtual & Physical Hosts APIC Single Point of controlVM VM Advanced telemetry for application traffic visibility
  • 16. How we deliver infrastructure with policy… Storage WEB APP DB LAN LAN LAN LAN SAN LBFW LAN Connectivity Security QoS SLA Services PolicyConfiguration Point
  • 17. Policy Driven Data Centre Define the Application Communication Policy Provision the Policy into the Fabric (Fully Automated) SecurityNetwork Virtualization Application Cloud Policy Framework Invest Time Spend No Time
  • 18. NETWORKSECURITYCOMPUTE STORAGE OPERATIONSIMPLEMENTATIONARCHITECTURE DESIGN BEFORE AFTER Organisational Shift TECHNOLOGY SILOS VIRTUAL TEAMS NETWORK UC / VIDEO X-aaS
  • 20. How Business Consumes IT Compute Network StorageSecurity ITClients Pools of Infrastructure Resource Compute Network StorageSecurity Cloud
  • 21. Orchestration & Automation Resource Controllers Infrastructure Pool of Infrastructure Resource PSC UCSD How Developers Consume IT Compute Network StorageSecurity Cloud Open Daylight PNSCUCSM APICVMM Storage Controller API API API API API API
  • 22. Fast IT Data Centre & Cloud Reference Architecture OpenIntegration MANAGEMENT AUTOMATION POLICY SECURITY ECOSYSTEMPARTNERS UCS Director Openstack UCS Manager Application Policy Infrastructure Controller Converged Infrastructure Managers OpenDaylight Virtual Machine Manager Process Orchestrator 3rd Party Orchestrator IaaS PaaS SaaS ITaaS Intercloud Prime Services Catalogue ORCHESTRATION SERVICES AUTOMATION PORTAL INFRASTRUCTURE MANAGEMENT Stack Designer Intercloud Fabric
  • 23. Key Takeaways SIMPLE SIMPLIFY your infrastructure and INTEGRATE across silos SMART CREATE intelligent capabilities and SERVICES that fuel growth SECURE DEFEND against ATTACKS and mitigate THREATS dynamically Programmatic Interfaces Orchestration and Automation Centralized Control Fast IT

Notes de l'éditeur

  1. Points to highlight : Entering the 3rd era and the way we deliver IT will change Supporting existing systems but ALSO delivering as a innovation engine to the business Moving at ‘cloud speed’ to address key business demands as highlighted in the earlier business outcomes slide Digitalization: Renovate the core Top technology priorities for 2014 reveal two complementary goals: renovating the core of IT and exploiting new technologies and trends. Exploiting the new speaks for itself. Meanwhile, the core of enterprise IT — infrastructure, applications such as ERP, information and sourcing — was built for the IT past and needs to be renovated for the digital future. The renovations include moving to a more loosely coupled “postmodern-ERP” paradigm, deploying public and private clouds, creating the information architecture and capabilities to exploit big data, and augmenting conventional sourcing with more innovation, including sourcing from, and partnering with, smaller and less mature enterprises (see figure below). The talent needed to execute on renovation includes different skills, such as digital design, data science, “digital anthropology,” startup skills and agile development. Reimagine the core Build bimodal capability There is an inherent tension between doing IT right and doing IT fast, doing IT safely and doing IT innovatively, working the plan and adapting. The second era of enterprise IT has been all about planning IT right, doing IT right, being predictable and creating value while maximizing control and minimizing risk — in short, about running IT like a business within a business. To capture digital opportunities, CIOs need to deal with speed, innovation and uncertainty. This requires operating two modes of enterprise IT: conventional and “nonlinear.” Those CIOs who have moved early on digitalization, learned the lessons and gotten the scars, have often extended their second-era restructuring to a more comprehensive change. In these cases, the grow-and-change function has become a more full-fledged digital development function, often reporting in a straight line to P&L/business unit owners, with a dotted line to IT for architectural governance. Teams are structured around products (not projects) and are multidisciplinary
  2. http://www.gartner.com/newsroom/id/2675916 http://blogs.gartner.com/cameron_haight/2013/05/16/enter-web-scale-it/
  3. http://www.gartner.com/newsroom/id/2675916 http://blogs.gartner.com/cameron_haight/2013/05/16/enter-web-scale-it/
  4. Points to highlight : Often policies are created and defined in isolation (different sources) with different languages, tooling and required intent These policy points will still exist however when we define in advance of the enforcement – working across teams in a highly collaborative way We can now insatiate that policy as required without having to invoke the ‘human chain’, in a quick and agile manner This is what ACI delivers..
  5. Points to highlight : Policy is critical to creating the agile and repeatable DC model allowing IT to adopt automation Today we build policy direct into the infrastructure (typically a manual process). We need to move that to a logical model where the policy is built once and repeated many times. Working across teams and groups to deliver the policy framework. To build the policy once then repeat as needed This frees up resource to focus on new and innovative things the business demands as opposed to repeating these policy tasks on a daily manual basis The figures below are taken from Deutsche Post & CollabNet - “Achieving the benefits of DevOps on an enterprise scale”. http://www.collab.net/resources/achieving-benefits-devops-enterprise-scale Although this is an example of DevOps it shows that operating in the model delivers clear and tangible results. When IT collaborates and works across team towards a common purpose. Reduced IT ops budget by 20% Decreased time to market by up to 40% Improved developer productivity up to 30% ISO / IEC compliance 10 days to migrate a project 8 x Return On Investment CollabNet provided a solution that gave Deutsche Post all those capabilities, with a set of agile processes using TeamForge to enable collaborative application development and deployment across internal and external cloud infrastructures. Benefits to Deutsche Post Transparency and traceability of changes to IT systems Increase the quality of applications in operations including improving the transition to maintenance and operations Standardization of tools, processes and informations Efficient management of different service providers Acceleration in all processes Simplification and standardization of project setups Reducing costs, for example by replacement of individual solutions Central provision of all necessary and updated information regarding an IT system for all participants along the life cycle of an application Reduction fo the used software portfolio, across all IT systems Terminology for Policy-Based Management …. http://www.ietf.org/rfc/rfc3198.txt "Policy" can be defined from two perspectives:          A definite goal, course or method of action to guide and determine present and future decisions. Policies are implemented or executed within a particular context (such as policies defined within a business unit) Policies as a set of rules to administer, manage, and control access to network resource    
  6. Points to highlight : Cultural Change – Collaboration, Cooperation, Knowledge learning/transfer Unified Process – More responsive to the business needs, Agile, Frequency, Improved visibility Unified Technology – tooling, automation, continuous X.. THIS IS HE IMPORTANT BULLET.. THE CUSTOMER HAS TO CHANGE!!!!! They cant simply buy tooling and that’s enough. It needs to be cultural and passion and a want to deliver the agile/devops world.
  7. Systems of Record — Established packaged applications or legacy homegrown systems that support core transaction processing and manage the organization's critical master data. The rate of change is low, because the processes are well-established and common to most organizations, and often are subject to regulatory requirements. Systems of Differentiation — Applications that enable unique company processes or industry-specific capabilities. They have a medium life cycle (one to three years), but need to be reconfigured frequently to accommodate changing business practices or customer requirements. Systems of Innovation — New applications that are built on an ad hoc basis to address new business requirements or opportunities. These are typically short life cycle projects (zero to 12 months) using departmental or outside resources and consumer-grade technologies.
  8. Points to highlight : Domain controllers vs orchestraiton/automation tool set. Common policy language and framework is appearing. (e.g TOSCA, Opflex)
  9. There is a new acronym in the industry . Its ATSOE. (Automate the SH!& Out of Everything). This is the aspiration of most customers. This is the typical architecture through which customers will consume FastIT. ACI is one of the components. You will have a layer of automation/orchestration. Some of these tools already exist in the customer. If they do, its possible the are not best suited to automate everything. In reality we use domain controllers to consume IT. The domain controller is the single point of entry into a domain. VMM = Virtual Machine Manager (e.g Vcenter, SCOM….) UCSM – UCS Manager - UCS APIC – Application Policy Infrastructure Controller – ACI PNSC – Prime Services Network Controller – Virtual Network Services (N1k, VSG, VASA……) Open Daylight – opensource SDN controller (there is also a Cisco distribution of ODL which is called XNC) EMC – Netapp – Abstracted storage controllers. (E.g EMC vipr) The Domain controller offer integration northbourd via API and southbound via API or protocol. CISCO ACI, CISCO UCS CISCO CLOUD are all designed for this architecture and consumption model.
  10. Points to highlight : Cisco DC reference architecture reflects the complete stack from resource management through to portal capability and to deliver Fast IT Important that this isn't a technology stack, this is a reference architecture allowing the customer to move to a policy driven automated and repeatable capability that delivers business outcomes NOT IT only outcomes Capability to consume a complete Cisco stack however we have an architecture that is open and eco-system driven Customer can choose the products and services that best suite their particular business outcome
  11. Agility via Programmability Enable Faster Innovation Zero Touch Automation
  12. Points to highlight : Cisco DC reference architecture reflects the complete stack from resource management through to portal capability and to deliver Fast IT Important that this isn't a technology stack, this is a reference architecture allowing the customer to move to a policy driven automated and repeatable capability that delivers business outcomes NOT IT only outcomes Capability to consume a complete Cisco stack however we have an architecture that is open and eco-system driven Customer can choose the products and services that best suite their particular business outcome