SlideShare une entreprise Scribd logo
1  sur  19
Industry VM Trends as They
 Compare with Current VM
         Standards
Virtualization
• End-Goal
   – Leverage current and viable infrastructure and process
     technologies with application architecture
   – Expedite adoption of VM technologies and cost savings with
     future technologies via more thorough application interface
• Virtualization Opportunities
   – Environmental Limitations
       • Security
       • Network
       • Operational
   – More Thorough Unix Virtualization Roadmap Needed
       • Solaris is the only mature roadmap being investigated
       • Linux on VMWare has not been accepted due to limitations
   – Lack of Direction Towards Storage Virtualization
Typical Virtualized Host
              Operating System Details
                                                           All Include a

                                                                                        System
Most are Independent of     Solaris is Exception          Virtualization
                                                     “Hypervisor” Underneath
  Hosted OS Stack*                 Today
                                                            Hosted OS




                                                                                            VM Physical Host
              Shared Physical Resources
                                                              Network/IO
    Storage               CPU               Memory                                                            OS
                                                              Subsystems*
                                                                                                                         OS
                                                                                   OS                         VM
                                                                                                                         VM
                                                                                   VM          OS
                                                                                               VM


                          Management                                                     Hypervisor/Host OS (ESX)

     Centralized Resource Mgmt                  Network Consolidation*
                                                                                            Shared Resources
                                                                                   CPU    Memory    Storage    Network   I/O




                     Typical Footprint
    Not Large SAN                 Not High IO         ISV Validation Might Be
    Requirements                 Requirements                 Required
Virtualization Risks
                                              Network and Security
                                                                 Internal Switch Required on Some Technologies Not Allowed by
     DMZ and SSN Now Allowed and Can’t Span Networks
                                                                                       Network / Security




                                                        Licensing
                                3rd Party Layered SW Needs to
  Functional Use Best fit for                                     Virtual Instances Charge by       Re-Use Must Be Closely
Application Only Requirements        Be Closely Examined        CPU (Multi Core Approach Risk)           Monitored




                                                    Management
 Departments May Have Different Access       Difficulty in Consolidation Access in    ISV Validation Critical for Short and Long
               Criteria                   Specific Government – Type Departments                   Term Strategies




                                                        Financial
                                                                                       Chargeback Mechanism Needed Before
Financial Question Need to Be Answered                Asset Ownership
                                                                                        Massive Proliferation of Technology
VMs and Network/Security
• Issues
   – Network/Security standards targeted to silos
   – Lack of communication/relationship of a common goal
• Opportunities
   – Leverage current and viable technologies with cooperation
     with Network/Security
   – Expedite VM technologies and cost savings with future
     technologies or viable non standard technology
• Next Steps
   – Setup a COE with Network/Security
      • Short term goals
      • Long term goals
   – Elicit participation from Operations, Architecture and
     Business Unit Teams
Verizon Internal Data Network**
   Different Network
     Trust Regions

                                                                         Server            Server
                                                                           G                 H
Definitions:

                                                            Restricted             SSN              DMZ
SSN: Secure Subnet, access
                                                              Zone
systems and to mgmt consoles
and mgmt system is restricted.
Filter request in a per application
basis/submission.

DMZ: The same definition as SSN,
                                                             Server               Server            Server
except we have customer facing
                                                               A                    C                 E
systems.

Restricted Zones: Areas where we                             Server               Server            Server
might have cages and government                                B                    D                 F
security guidelines that apply to
personnel. Could be in a DMZ or
SSN as well as regular Network.
**Terminology might differ depending on the business unit
Proposed Virtualization @ Segment Level
                                                    Legend
      IDN         SSN or DMZ
                                               Instance Color Denotes Virtual
                 Physical Host 1               Application or OS Instance


                                                    Denotes 2 Separate
                                                    Instances of Same
                                      A    B
                  A          B
                                                    Application or OS
 Physical Host
                                   •Different IDN qualified OS/App
                                   instances can be virtualized inside the
                 Physical Host 2
 OS         OS
                                   same physical servers
                                   •SSN or DMZ OS/App instances can
                  A          B     only be virtualized inside of physical
                                   servers dedicated for that specific
 OS         OS
                                   application
                                   •A new physical server required for the
                 Physical Host 3
                                   turn up of a new application in SSN or
                                   DMZ
                                   •Can not bridge physical or virtual
                  A          B
                                   instances across network segments
                                   (IDN to SSN and/or DMZ bridging)
Proposed Centralized Physical Host Access
             and VM Firewalls
•App/OS virtualized
instances inside of a
                                        Physical Host/Hypervisor
physical host are required
to have their own firewall
established as if they
were an ordinary physical
server
•Console access to the                                                 Regardless of
                                                                     Network Segment
physical host/hypervisor               App/OS            App/OS
                                                                        Placement,
is restricted and needs to            Instance B        Instance B   OS/Zone Firewall
be accessed via a secured
                                                                         Required
method
•The access and
                             Secure
standardization of such      Access
console and process will
                                             Console Access
be key for
network/security
agreement to further VM
Infrastructures
Existing VM Transfers Between Physical
      Systems @ Internal Data Network Segment

Right hand side
description points out                          IDN
                                                                          V-Motion like
today’s ability to migrate
                                                                         procedures
                              Physical Host 1          Physical Host 2
between physical hosts.
                                                                         allowed across
                                                                         different
This is something that is
                                                                         physical hosts
                             App A      App B         App B      App C
allowed in our VMWare
                                                                         with different
farms and could also be
                                                                         applications at
implemented across
                                                                         IDN only
different non VMWare VM
                             Free       App E         Free       App G
infrastructures
Proposed VM Transfers Between Physical
     Systems @ SSN and/or DMZ Segments

Right hand side
                                         SSN or DMZ
description points out
                                                                   V-Motion like
today’s ability to migrate
                                                                   procedures
                             Physical Host 1     Physical Host 2
between physical hosts.
                                                                   allowed across
                                                                   different
In this example, we’re
                                                                   physical hosts
                             A           B        B         Free
more constricted. We can
                                                                   as long as
migrate VM across
                                                                   physical hosts
physical servers, only
                                                                   are isolated to
when they’re part of the
                                                                   the same
                             C          Free      D         Free
same application because
                                                                   application
each application must
reside in the same subnet
Proposed Optimization of
          Virtualization @ Physical Layer
                                                               • We’d like to get to a point
    IDN/DMZ/SSN
                                                                 where the virtualization
                                                                 technologies and security
                                                                 allows us to mix different
                                                                 network environments
     Physical Host

                                                               • Preferred technology
                                         App A&D Prod & Dev
                                         (IDN Dedicated NIC)

                                                                 would be integrated
A           B
                                                                 virtual I/O instead of
                                               App B
                                                                 dedicated interface cards
                                         (DMZ Dedicated NIC)


                                                               • We’ll need further
C           D
                                                                 reviews with security and
                                               App C
                                         (SSN Dedicated NIC)
                                                                 network to allow this to
                                                                 happen
                Integrated Virtual I/O
                      Interfaces
Example of Lack of Strategic Load
         Balancing Standard for VMs
Example of a recent
project in which a request
for Load Balancing services
could not be provided due
to rules regarding LB and
subnets.

In this example, intelligent
LB needs to be provided by
BUA for systems located in
BUB. Network path access
from BUB users would be
twice that of BUA and in
the event BUB was the
only user, then it would be
counter productive.
Linux and VM
• State Today
   – Linux targeted as strategic goal for enterprise
   – Part of thrust into Open Source Solutions
   – No viable virtualization strategy for ML (Medium/Large)
     Linux Requirements {Medium/Large make up most of the
     requests}
• Linux Virtualization Opportunities
   – Modification of Current Standards
      • Unisys Intel architecture scales vertically
      • IBM Intel architecture scales vertically
      • HP/IBM midrange offerings provide most mature Linux VM
        technologies
   – Accelerate Application from DB/Web Segregation
      • Decrease application with OS dependent footprint
      • Reduce size of OS dependent footprint for Linux
Goal for SUN and VMWare Virtualized
                           Environments
              VMWare Physical Host                                         SUN Physical Host


                                Windows
                                                                                                         Solaris 10
                                               Windows
     Linux                        VM                                       Solaris 10                    Container
                                                 VM                                      Solaris 10
      VM           Linux                                    Solaris 10     Container
                                                                                         Container
                    VM                                      Container


             Hypervisor/Host OS (ESX)                                    Solaris 10 Global Zone

                Shared Resources                                           Shared Resources
     CPU      Memory       Storage   Network      I/O         CPU        Memory    Storage     Network       I/O




                                                         SPARC Based SUN System Benefits
Intel Based ESX Farm Benefits
                                                         • Cost Effective
• Cost Effective, Large Consolidation Factor 12:1
                                                         • Supports Large Solaris Footprints
• Supports Linux, Windows, Solaris (Non Standard)
• Hypervisor and Guest VM Independence                   Limitations
Limitations                                              • Only Supports Solaris 10
                                                         • Global Zone and Container Dependency
• Large Linux VM Footprints Do Not Fit Here
                                                         • Smaller Consolidation Factor (OPS Target 4:1)
• Need to Maintain Large Consolidation Factor
Example: EOSL
(end of serviceable life) to Virtualized Targets

  EOSL                    Port to                      Virtualization Target
Candidates               Target OS
                          Linux &
                                                         VMWare Farm
                         Solaris 10
  Legacy
                                                         Linux           Linux
  Tru64
                                                          VM              VM
    HP
                          Linux
             App/HW
               Eval
                         Redhat                                  Linux
                                                                  VM
              Code                    Virtualization
  Legacy      Port                     Assessment
  Solaris
             3rd Party
   SUN                    Solaris
               Port                                      SUN Containers
                            10
                                                         Solaris          Solaris
                                                        Container        Container
Legacy AIX
   IBM
                                                               Solaris
                                                              Container
Goal for SUN and VMWare Virtualized
                           Environments
              VMWare Physical Host                                         SUN Physical Host


                                Windows
                                                                                                         Solaris 10
                                               Windows
     Linux                        VM                                       Solaris 10                    Container
                                                 VM                                      Solaris 10
      VM           Linux                                    Solaris 10     Container
                                                                                         Container
                    VM                                      Container


             Hypervisor/Host OS (ESX)                                    Solaris 10 Global Zone

                Shared Resources                                           Shared Resources
     CPU      Memory       Storage   Network      I/O         CPU        Memory    Storage     Network       I/O




                                                         SPARC Based SUN System Benefits
Intel Based ESX Farm Benefits
                                                         • Cost Effective
• Cost Effective, Large Consolidation Factor 12:1
                                                         • Supports Large Solaris Footprints
• Supports Linux, Windows, Solaris (Non Standard)
• Hypervisor and Guest VM Independence                   Limitations
Limitations                                              • Only Supports Solaris 10
                                                         • Global Zone and Container Dependency
• Large Linux VM Footprints Do Not Fit Here
                                                         • Smaller Consolidation Factor (OPS Target 4:1)
• Need to Maintain Large Consolidation Factor
Vendor Strength’s & Weakness

       HP                     IBM                     SUN                   VMWare
Strength                 Strength                Strength                   Strength
• 4 Major OS Offerings   • Leaders in            • Solaris Footprint is     • 3 Major OS Offerings
                           Virtualization          considerable
• Mature vPar and                                                           • Industry Accepted
  Future VM              • Leaders in Mgmt       • Lower Cost               • Mature Product
  Capabilities             Aspects of                                       • Cost
                           Virtualization
                         • P5 and P6
                           Performance
                           Unmatched


Weakness                 Weakness                Weakness                   Weakness
• Dependence on          • Can be Expensive if   • Reliance on Solaris 10   • Dependence on AMD
  Itanium                  not Properly Used                                  and X86 Architecture
                                                 • Limited to 2
• Decreasing OpenVMS     • Limited to 2            Supported OSes           • Vertical Scalability
  Market                   Supported OSes        • ISV Support
• Future ISV Support
Storage Virtualization
• State Today
   – 3 Business Units on Different Technologies
   – Centralization of Support Organizations
• Linux Virtualization Opportunities
   – Virtualization @ Frame Level
      • Less complicated to execute
      • Exists today
      • Vendor lock possible
   – Virtualization outside the frame
      • Outside component
          – Has been proven and functional at other companies
          – Adds another layer of complexity
      • @ Cisco/Router/Switch Level
          – Not as widespread as other technologies
          – Possibly biggest benefit as technology drives towards fiber encapsulation
Storage Virtualization Options
Current , Available                                                  Most Common Storage Virtualization Technologies
and Possible Storage                              Vendors such as HDS                                      Vendors such as IBM can

Virtualization                                    can provide @ frame                                   provide @ external component
                                                          level                                                     level

Strategies




                                                                                                            External Component
                                                     @ Frame Level
                                                                         HDS                                                                IBM
Current:
                                         server                                                server
No standard storage virtualization
roadmap will hinder future server
virtualization technologies. Data
growth is out-pacing storage cost                                          Virtualization @ Switch/Router Layer
decline due to PCI/SOX requirements.                                                  Future Fiber                                   Virtualization Would Occur
                                                                                       within IP                                       Within the Cisco Layer
                                                                                     Encapsulation
No storage ILM direction will continue
to increase cost                                                Switch Fabric




                                                                                                            Storage Virtualization
                                                                Environment




                                                                                         IP Switching
Future:
                                                                                                                                           Any
There are 3 viable options. Virtualize
                                                                                                                                          Frame
within frame, go outside of frame or                                 server
possibly go with a Cisco/Switch
Solution for storage virtualization

Contenu connexe

Tendances

Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Keynote Speech: Xen ARM Virtualization
Keynote Speech: Xen ARM VirtualizationKeynote Speech: Xen ARM Virtualization
Keynote Speech: Xen ARM VirtualizationThe Linux Foundation
 
The Architecture Of V Mware Es Xi
The Architecture Of V Mware Es XiThe Architecture Of V Mware Es Xi
The Architecture Of V Mware Es XiRishi Sharma
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Rishi Sharma
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCentergrudolphi
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Emulex Corporation
 
Nevmug Focus Ti V Mware Networking January 2009
Nevmug   Focus Ti V Mware Networking   January 2009Nevmug   Focus Ti V Mware Networking   January 2009
Nevmug Focus Ti V Mware Networking January 2009csharney
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper Networks
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSoftchoice Corporation
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
CELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCisco Russia
 
Quick Introduction to Gearman
Quick Introduction to GearmanQuick Introduction to Gearman
Quick Introduction to GearmanGiuseppe Maxia
 

Tendances (20)

Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Keynote Speech: Xen ARM Virtualization
Keynote Speech: Xen ARM VirtualizationKeynote Speech: Xen ARM Virtualization
Keynote Speech: Xen ARM Virtualization
 
XS Boston 2008 Fault Tolerance
XS Boston 2008 Fault ToleranceXS Boston 2008 Fault Tolerance
XS Boston 2008 Fault Tolerance
 
The Architecture Of V Mware Es Xi
The Architecture Of V Mware Es XiThe Architecture Of V Mware Es Xi
The Architecture Of V Mware Es Xi
 
Ian Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 KeynoteIan Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 Keynote
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCenter
 
XS 2008 Boston VTPM
XS 2008 Boston VTPMXS 2008 Boston VTPM
XS 2008 Boston VTPM
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...
 
XS Japan 2008 Ganeti English
XS Japan 2008 Ganeti EnglishXS Japan 2008 Ganeti English
XS Japan 2008 Ganeti English
 
Nakajima numa-final
Nakajima numa-finalNakajima numa-final
Nakajima numa-final
 
Nakajima hvm-be final
Nakajima hvm-be finalNakajima hvm-be final
Nakajima hvm-be final
 
Nevmug Focus Ti V Mware Networking January 2009
Nevmug   Focus Ti V Mware Networking   January 2009Nevmug   Focus Ti V Mware Networking   January 2009
Nevmug Focus Ti V Mware Networking January 2009
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing Update
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
CELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCS
 
Quick Introduction to Gearman
Quick Introduction to GearmanQuick Introduction to Gearman
Quick Introduction to Gearman
 

En vedette

佛山分公司曹招聘流程
佛山分公司曹招聘流程佛山分公司曹招聘流程
佛山分公司曹招聘流程20004
 
Networking Como Herramienta Profesional
Networking Como Herramienta ProfesionalNetworking Como Herramienta Profesional
Networking Como Herramienta ProfesionalOscar Cumí
 
Courtney And Sophie French Revisiob
Courtney And Sophie French RevisiobCourtney And Sophie French Revisiob
Courtney And Sophie French Revisiobmissmarsh
 
员工心态与自我激励
员工心态与自我激励员工心态与自我激励
员工心态与自我激励20004
 
Hoosier Responder February 2010
Hoosier Responder February 2010Hoosier Responder February 2010
Hoosier Responder February 2010Pamela Stigall
 
调整心态
调整心态调整心态
调整心态20004
 
Turkey Prospection Presentation 2010
Turkey Prospection Presentation 2010Turkey Prospection Presentation 2010
Turkey Prospection Presentation 2010Mohamed Berrihi
 
保持乐观心态
保持乐观心态保持乐观心态
保持乐观心态20004
 
Bbb De Neuitat Si La Multi Ani
Bbb De Neuitat Si La Multi AniBbb De Neuitat Si La Multi Ani
Bbb De Neuitat Si La Multi AniNicky Nic
 
20040430162931
2004043016293120040430162931
2004043016293120004
 
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...Ozgur Uckan
 
4公司介绍
4公司介绍4公司介绍
4公司介绍20004
 
0010
00100010
001020004
 
Amazon Currency Converter
Amazon Currency ConverterAmazon Currency Converter
Amazon Currency ConverterMark Mertel
 
团队学习
团队学习团队学习
团队学习20004
 
Valtti-hankkeen esittely
Valtti-hankkeen esittelyValtti-hankkeen esittely
Valtti-hankkeen esittelyjennikaisto
 
8 HUS 133 Social Cognition
8 HUS 133   Social Cognition8 HUS 133   Social Cognition
8 HUS 133 Social CognitionDon Thompson
 

En vedette (20)

佛山分公司曹招聘流程
佛山分公司曹招聘流程佛山分公司曹招聘流程
佛山分公司曹招聘流程
 
Networking Como Herramienta Profesional
Networking Como Herramienta ProfesionalNetworking Como Herramienta Profesional
Networking Como Herramienta Profesional
 
Courtney And Sophie French Revisiob
Courtney And Sophie French RevisiobCourtney And Sophie French Revisiob
Courtney And Sophie French Revisiob
 
Week11
Week11Week11
Week11
 
员工心态与自我激励
员工心态与自我激励员工心态与自我激励
员工心态与自我激励
 
Hoosier Responder February 2010
Hoosier Responder February 2010Hoosier Responder February 2010
Hoosier Responder February 2010
 
调整心态
调整心态调整心态
调整心态
 
Turkey Prospection Presentation 2010
Turkey Prospection Presentation 2010Turkey Prospection Presentation 2010
Turkey Prospection Presentation 2010
 
保持乐观心态
保持乐观心态保持乐观心态
保持乐观心态
 
Bbb De Neuitat Si La Multi Ani
Bbb De Neuitat Si La Multi AniBbb De Neuitat Si La Multi Ani
Bbb De Neuitat Si La Multi Ani
 
20040430162931
2004043016293120040430162931
20040430162931
 
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...
Ozgur Uckan - Disadvantaged communities and networked civic participation: Mi...
 
Web Presen
Web PresenWeb Presen
Web Presen
 
4公司介绍
4公司介绍4公司介绍
4公司介绍
 
Web Presen
Web PresenWeb Presen
Web Presen
 
0010
00100010
0010
 
Amazon Currency Converter
Amazon Currency ConverterAmazon Currency Converter
Amazon Currency Converter
 
团队学习
团队学习团队学习
团队学习
 
Valtti-hankkeen esittely
Valtti-hankkeen esittelyValtti-hankkeen esittely
Valtti-hankkeen esittely
 
8 HUS 133 Social Cognition
8 HUS 133   Social Cognition8 HUS 133   Social Cognition
8 HUS 133 Social Cognition
 

Similaire à E Vm Virtualization

Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTThe Linux Foundation
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Developmentelliando dias
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateFlexera
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
Mobile Virtualization using the Xen Technologies
Mobile Virtualization using the Xen TechnologiesMobile Virtualization using the Xen Technologies
Mobile Virtualization using the Xen TechnologiesThe Linux Foundation
 
Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..Aashish Uppal
 
Intro to virtualization
Intro to virtualizationIntro to virtualization
Intro to virtualizationKalpna Saharan
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
 
Atea roadshow norr
Atea roadshow norrAtea roadshow norr
Atea roadshow norrJohan Odell
 
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)Abhijeet Kulkarni
 
Integrate 3rd party security solution into CloudStack
Integrate 3rd party security solution into CloudStackIntegrate 3rd party security solution into CloudStack
Integrate 3rd party security solution into CloudStackmice_xia
 
z/VM 6.2: Increasing the Endless Possibilities of Virtualization
z/VM 6.2: Increasing the Endless Possibilities of Virtualizationz/VM 6.2: Increasing the Endless Possibilities of Virtualization
z/VM 6.2: Increasing the Endless Possibilities of VirtualizationIBM India Smarter Computing
 

Similaire à E Vm Virtualization (20)

Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Development
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) Update
 
XS Japan 2008 BitVisor English
XS Japan 2008 BitVisor EnglishXS Japan 2008 BitVisor English
XS Japan 2008 BitVisor English
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Mobile Virtualization using the Xen Technologies
Mobile Virtualization using the Xen TechnologiesMobile Virtualization using the Xen Technologies
Mobile Virtualization using the Xen Technologies
 
Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..
 
Intro to virtualization
Intro to virtualizationIntro to virtualization
Intro to virtualization
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
 
Atea roadshow norr
Atea roadshow norrAtea roadshow norr
Atea roadshow norr
 
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)
Sdc 2012-how-can-hypervisors-leverage-advanced-storage-features-v7.6(20-9-2012)
 
Xen Community Update 2011
Xen Community Update 2011Xen Community Update 2011
Xen Community Update 2011
 
Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008
 
Integrate 3rd party security solution into CloudStack
Integrate 3rd party security solution into CloudStackIntegrate 3rd party security solution into CloudStack
Integrate 3rd party security solution into CloudStack
 
z/VM 6.2: Increasing the Endless Possibilities of Virtualization
z/VM 6.2: Increasing the Endless Possibilities of Virtualizationz/VM 6.2: Increasing the Endless Possibilities of Virtualization
z/VM 6.2: Increasing the Endless Possibilities of Virtualization
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

E Vm Virtualization

  • 1. Industry VM Trends as They Compare with Current VM Standards
  • 2. Virtualization • End-Goal – Leverage current and viable infrastructure and process technologies with application architecture – Expedite adoption of VM technologies and cost savings with future technologies via more thorough application interface • Virtualization Opportunities – Environmental Limitations • Security • Network • Operational – More Thorough Unix Virtualization Roadmap Needed • Solaris is the only mature roadmap being investigated • Linux on VMWare has not been accepted due to limitations – Lack of Direction Towards Storage Virtualization
  • 3. Typical Virtualized Host Operating System Details All Include a System Most are Independent of Solaris is Exception Virtualization “Hypervisor” Underneath Hosted OS Stack* Today Hosted OS VM Physical Host Shared Physical Resources Network/IO Storage CPU Memory OS Subsystems* OS OS VM VM VM OS VM Management Hypervisor/Host OS (ESX) Centralized Resource Mgmt Network Consolidation* Shared Resources CPU Memory Storage Network I/O Typical Footprint Not Large SAN Not High IO ISV Validation Might Be Requirements Requirements Required
  • 4. Virtualization Risks Network and Security Internal Switch Required on Some Technologies Not Allowed by DMZ and SSN Now Allowed and Can’t Span Networks Network / Security Licensing 3rd Party Layered SW Needs to Functional Use Best fit for Virtual Instances Charge by Re-Use Must Be Closely Application Only Requirements Be Closely Examined CPU (Multi Core Approach Risk) Monitored Management Departments May Have Different Access Difficulty in Consolidation Access in ISV Validation Critical for Short and Long Criteria Specific Government – Type Departments Term Strategies Financial Chargeback Mechanism Needed Before Financial Question Need to Be Answered Asset Ownership Massive Proliferation of Technology
  • 5. VMs and Network/Security • Issues – Network/Security standards targeted to silos – Lack of communication/relationship of a common goal • Opportunities – Leverage current and viable technologies with cooperation with Network/Security – Expedite VM technologies and cost savings with future technologies or viable non standard technology • Next Steps – Setup a COE with Network/Security • Short term goals • Long term goals – Elicit participation from Operations, Architecture and Business Unit Teams
  • 6. Verizon Internal Data Network** Different Network Trust Regions Server Server G H Definitions: Restricted SSN DMZ SSN: Secure Subnet, access Zone systems and to mgmt consoles and mgmt system is restricted. Filter request in a per application basis/submission. DMZ: The same definition as SSN, Server Server Server except we have customer facing A C E systems. Restricted Zones: Areas where we Server Server Server might have cages and government B D F security guidelines that apply to personnel. Could be in a DMZ or SSN as well as regular Network. **Terminology might differ depending on the business unit
  • 7. Proposed Virtualization @ Segment Level Legend IDN SSN or DMZ Instance Color Denotes Virtual Physical Host 1 Application or OS Instance Denotes 2 Separate Instances of Same A B A B Application or OS Physical Host •Different IDN qualified OS/App instances can be virtualized inside the Physical Host 2 OS OS same physical servers •SSN or DMZ OS/App instances can A B only be virtualized inside of physical servers dedicated for that specific OS OS application •A new physical server required for the Physical Host 3 turn up of a new application in SSN or DMZ •Can not bridge physical or virtual A B instances across network segments (IDN to SSN and/or DMZ bridging)
  • 8. Proposed Centralized Physical Host Access and VM Firewalls •App/OS virtualized instances inside of a Physical Host/Hypervisor physical host are required to have their own firewall established as if they were an ordinary physical server •Console access to the Regardless of Network Segment physical host/hypervisor App/OS App/OS Placement, is restricted and needs to Instance B Instance B OS/Zone Firewall be accessed via a secured Required method •The access and Secure standardization of such Access console and process will Console Access be key for network/security agreement to further VM Infrastructures
  • 9. Existing VM Transfers Between Physical Systems @ Internal Data Network Segment Right hand side description points out IDN V-Motion like today’s ability to migrate procedures Physical Host 1 Physical Host 2 between physical hosts. allowed across different This is something that is physical hosts App A App B App B App C allowed in our VMWare with different farms and could also be applications at implemented across IDN only different non VMWare VM Free App E Free App G infrastructures
  • 10. Proposed VM Transfers Between Physical Systems @ SSN and/or DMZ Segments Right hand side SSN or DMZ description points out V-Motion like today’s ability to migrate procedures Physical Host 1 Physical Host 2 between physical hosts. allowed across different In this example, we’re physical hosts A B B Free more constricted. We can as long as migrate VM across physical hosts physical servers, only are isolated to when they’re part of the the same C Free D Free same application because application each application must reside in the same subnet
  • 11. Proposed Optimization of Virtualization @ Physical Layer • We’d like to get to a point IDN/DMZ/SSN where the virtualization technologies and security allows us to mix different network environments Physical Host • Preferred technology App A&D Prod & Dev (IDN Dedicated NIC) would be integrated A B virtual I/O instead of App B dedicated interface cards (DMZ Dedicated NIC) • We’ll need further C D reviews with security and App C (SSN Dedicated NIC) network to allow this to happen Integrated Virtual I/O Interfaces
  • 12. Example of Lack of Strategic Load Balancing Standard for VMs Example of a recent project in which a request for Load Balancing services could not be provided due to rules regarding LB and subnets. In this example, intelligent LB needs to be provided by BUA for systems located in BUB. Network path access from BUB users would be twice that of BUA and in the event BUB was the only user, then it would be counter productive.
  • 13. Linux and VM • State Today – Linux targeted as strategic goal for enterprise – Part of thrust into Open Source Solutions – No viable virtualization strategy for ML (Medium/Large) Linux Requirements {Medium/Large make up most of the requests} • Linux Virtualization Opportunities – Modification of Current Standards • Unisys Intel architecture scales vertically • IBM Intel architecture scales vertically • HP/IBM midrange offerings provide most mature Linux VM technologies – Accelerate Application from DB/Web Segregation • Decrease application with OS dependent footprint • Reduce size of OS dependent footprint for Linux
  • 14. Goal for SUN and VMWare Virtualized Environments VMWare Physical Host SUN Physical Host Windows Solaris 10 Windows Linux VM Solaris 10 Container VM Solaris 10 VM Linux Solaris 10 Container Container VM Container Hypervisor/Host OS (ESX) Solaris 10 Global Zone Shared Resources Shared Resources CPU Memory Storage Network I/O CPU Memory Storage Network I/O SPARC Based SUN System Benefits Intel Based ESX Farm Benefits • Cost Effective • Cost Effective, Large Consolidation Factor 12:1 • Supports Large Solaris Footprints • Supports Linux, Windows, Solaris (Non Standard) • Hypervisor and Guest VM Independence Limitations Limitations • Only Supports Solaris 10 • Global Zone and Container Dependency • Large Linux VM Footprints Do Not Fit Here • Smaller Consolidation Factor (OPS Target 4:1) • Need to Maintain Large Consolidation Factor
  • 15. Example: EOSL (end of serviceable life) to Virtualized Targets EOSL Port to Virtualization Target Candidates Target OS Linux & VMWare Farm Solaris 10 Legacy Linux Linux Tru64 VM VM HP Linux App/HW Eval Redhat Linux VM Code Virtualization Legacy Port Assessment Solaris 3rd Party SUN Solaris Port SUN Containers 10 Solaris Solaris Container Container Legacy AIX IBM Solaris Container
  • 16. Goal for SUN and VMWare Virtualized Environments VMWare Physical Host SUN Physical Host Windows Solaris 10 Windows Linux VM Solaris 10 Container VM Solaris 10 VM Linux Solaris 10 Container Container VM Container Hypervisor/Host OS (ESX) Solaris 10 Global Zone Shared Resources Shared Resources CPU Memory Storage Network I/O CPU Memory Storage Network I/O SPARC Based SUN System Benefits Intel Based ESX Farm Benefits • Cost Effective • Cost Effective, Large Consolidation Factor 12:1 • Supports Large Solaris Footprints • Supports Linux, Windows, Solaris (Non Standard) • Hypervisor and Guest VM Independence Limitations Limitations • Only Supports Solaris 10 • Global Zone and Container Dependency • Large Linux VM Footprints Do Not Fit Here • Smaller Consolidation Factor (OPS Target 4:1) • Need to Maintain Large Consolidation Factor
  • 17. Vendor Strength’s & Weakness HP IBM SUN VMWare Strength Strength Strength Strength • 4 Major OS Offerings • Leaders in • Solaris Footprint is • 3 Major OS Offerings Virtualization considerable • Mature vPar and • Industry Accepted Future VM • Leaders in Mgmt • Lower Cost • Mature Product Capabilities Aspects of • Cost Virtualization • P5 and P6 Performance Unmatched Weakness Weakness Weakness Weakness • Dependence on • Can be Expensive if • Reliance on Solaris 10 • Dependence on AMD Itanium not Properly Used and X86 Architecture • Limited to 2 • Decreasing OpenVMS • Limited to 2 Supported OSes • Vertical Scalability Market Supported OSes • ISV Support • Future ISV Support
  • 18. Storage Virtualization • State Today – 3 Business Units on Different Technologies – Centralization of Support Organizations • Linux Virtualization Opportunities – Virtualization @ Frame Level • Less complicated to execute • Exists today • Vendor lock possible – Virtualization outside the frame • Outside component – Has been proven and functional at other companies – Adds another layer of complexity • @ Cisco/Router/Switch Level – Not as widespread as other technologies – Possibly biggest benefit as technology drives towards fiber encapsulation
  • 19. Storage Virtualization Options Current , Available Most Common Storage Virtualization Technologies and Possible Storage Vendors such as HDS Vendors such as IBM can Virtualization can provide @ frame provide @ external component level level Strategies External Component @ Frame Level HDS IBM Current: server server No standard storage virtualization roadmap will hinder future server virtualization technologies. Data growth is out-pacing storage cost Virtualization @ Switch/Router Layer decline due to PCI/SOX requirements. Future Fiber Virtualization Would Occur within IP Within the Cisco Layer Encapsulation No storage ILM direction will continue to increase cost Switch Fabric Storage Virtualization Environment IP Switching Future: Any There are 3 viable options. Virtualize Frame within frame, go outside of frame or server possibly go with a Cisco/Switch Solution for storage virtualization