Network Services Management - A Practical Paper
|
|
|
- Elvin Brown
- 5 years ago
- Views:
Transcription
1 Document Number: DSP2034 Date: Version: 1.0.0a 5 Information for Work-in-Progress version: IMPORTANT: This document is not a standard. It does not necessarily reflect the views of the DMTF or all of its members. Because this document is a Work in Progress, it may still change, perhaps profoundly. This document is available for public review and comment until the stated expiration date. It expires on: Provide any comments through the DMTF Feedback Portal: Document Type: White Paper Document Status: Work in Progress Document Language: en-us 9
2 DSP Copyright Notice Copyright 2013 Distributed Management Task Force, Inc. (DMTF). All rights reserved. DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems management and interoperability. Members and non-members may reproduce DMTF specifications and documents, provided that correct attribution is given. As DMTF specifications may be revised from time to time, the particular version and release date should always be noted. Implementation of certain elements of this standard or proposed standard may be subject to third party patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, or identify any or all such third party patent right, owners or claimants, nor for any incomplete or inaccurate identification or disclosure of such rights, owners or claimants. DMTF shall have no liability to any party, in any manner or circumstance, under any legal theory whatsoever, for failure to recognize, disclose, or identify any such third party patent rights, or for such party s reliance on the standard or incorporation thereof in its product, protocols or testing procedures. DMTF shall have no liability to any party implementing such standard, whether such implementation is foreseeable or not, nor to any patent owner or claimant, and shall have no liability or responsibility for costs or losses incurred if a standard is withdrawn or modified after publication, and shall be indemnified and held harmless by any party implementing the standard from any and all claims of infringement by a patent owner for such implementations. For information about patents held by third-parties which have notified the DMTF that, in their opinion, such patent may relate to or impact implementations of DMTF standards, visit 2 Work in Progress - not a DMTF Standard Version 1.0.0a
3 DSP CONTENTS Foreword... 5 Introduction Scope References Terms and Definitions Overview of Virtualized Networking Challenges of Virtualized Networking Virtualized Networking Components Network Entities Virtualized Network Entities (vnes) Use Case 1 (UC-1): Pre-defined Template-based Network Configuration Short Description of the Use Case Assumptions and Pre-Conditions Goal(s) and Desired Outcome(s) Primary, Secondary, and other Supporting Actors Triggers and Implementation / Executions Steps (Interactions) Failure Condition (s) and Recovery Possible Extensions/variations Non-functional requirements, if applicable Known Issues Use Case 2 (UC-2): Network Configuration based on Existing Physical Network Topology of User s Data Center Short Description of the Use Case Assumptions and Pre-Conditions Goal(s) and Desired Outcome(s) Primary, Secondary, and other Supporting Actors Triggers and Implementation / Executions Steps (Interactions) Failure Condition (s) and Recovery Possible Extensions/variations Non-functional requirements, if applicable Known Issues Use Case 3 (UC-3): Network Configuration Modification Short Description of the Use Case Assumptions and Pre-Conditions Goal(s) and Desired Outcome(s) Primary, Secondary, and other Supporting Actors Triggers and Implementation / Executions Steps (Interactions) Failure Condition (s) and Recovery Possible Extensions/variations Non-functional requirements, if applicable Known Issues Relationships with DMTF Specifications OVF CIMI Network Related Profiles Impact to the existing DMTF Specifications ANNEX A (Normative) IETF/IRTF Standards and Specifications ANNEX B (Informative) (Inter-Provider Use Case) B.1 Use Case B1 (UC-B1): Location Aware Hosting of Virtual Desktop B.1.1 Short Description of the Use Case Version 1.0.0a Work in Progress - not a DMTF Standard 3
4 DSP B.1.2 Assumptions and Pre-Conditions B.1.3 Goal(s) and Desired Outcome(s) B.1.4 Primary, Secondary, and other Supporting Actors B.1.5 Triggers and Implementation / Executions Steps (Interactions) B.1.6 Failure Condition (s) and Recovery B.1.7 Possible Extensions/variations B.1.8 Non-functional requirements, if applicable B.1.9 Known Issues B.2 Impact to the existing DMTF Specifications ANNEX C (Change Log) Figures Figure 1 Network Entities (Resources and Services) Abstraction, Virtualization and Management Figure 2 Pre-Condition for Network Service Management Use Case 1 (UC-1) Figure 3 High-level Network Service Management Use Case 1 (UC-1) Figure 4 Pre-Condition for Network Service Management Use Case 2 (UC-2) Figure 5 High-level Network Service Management Use Case 2 (UC-2) Figure 6 Pre-Condition for High-level Network Service Management Use Case 3 (UC-3) Figure 7 High-level Network Service Management Use Case 3 (UC-3) Figure 8 Pre-Condition for High-level Network Service Management Use Case B1 (UC-B1) Figure 9 High-level Network Service Management Use Case B1 (UC-B1) Tables Table 1 Potential Impact to the DMTF Specifications Table 2 Impact to DMTF Specifications for an Inter-Provider Use Case Work in Progress - not a DMTF Standard Version 1.0.0a
5 DSP Foreword The (DSP2034) contains macros that can be used when authoring DMTF documents. Use this macros template in conjunction with DSP1000_m.n.u, which contains instructions for how to use the template and the necessary boilerplate text. Acknowledgments The authors acknowledge the contributions from the members of the DMTF Network Services Management Work Group. The following persons have been instrumental in the development of this white paper. Editor(s): Khasnabish, Bhumip - ZTE Corporation Zhdankin, Aleksandr - Cisco Contributors: Shah, Hemal Broadcom Neely, Steven Cisco Pardikar, Shishir Citrix Parchem, John Microsoft Lamers, Lawrence - VMware Inc. Ali, Ghazanfar - ZTE Corporation Chu, Junsheng - ZTE Corporation Hu, Jie - ZTE Corporation Khasnabish, Bhumip - ZTE Corporation Meng, Yu - ZTE Corporation Wang, Wei - ZTE Corporation Version 1.0.0a Work in Progress - not a DMTF Standard 5
6 DSP Introduction Abstract This document describes the problem of the network services management in virtualized and hybrid network environments and presents a set of network service-specific use cases applicable to such environments. The whitepaper discusses the applicability of the existing DMTF specifications, and identifies the target areas where the improvements of the existing or development of the new information models and management interfaces may be required. Goals and Scope Network Services Management (NSM) Work Group in DMTF is focused on the Network Services Profiles for the Routed Protocols (and routing protocols where needed) IP (v4, v6) and layer-2 (or L2) connectivity as it relates to the services provided by the network infrastructure to the applications running in a cloud. This white paper lists the use cases where these Network Service Profiles are needed, and provides analysis on how these Network Service Profiles will impact on the network models, including open virtualization format (OVF), Cloud Infrastructure Management Interface (CIMI), and Network Port Profile (NPP) XML Schema, currently defined by DMTF. 6 Work in Progress - not a DMTF Standard Version 1.0.0a
7 DSP Scope This document describes the problem of the network services management in virtualized and hybrid network environments. One of the objectives is to determine the features and functions of network infrastructure required to implement a set of high-priority network service-specific use cases applicable to such environments. The whitepaper also provides the analysis on applicability of the existing DMTF specifications, such as the OVF, CIMI, and NPP XML Schema. We achieve this by analyzing the gaps between the currently available OVF, CIMI, and NPP capabilities and the features and functions required from management models and interfaces. We then identify the target areas where the improvements of the existing or development of the new information models and management interfaces may be needed. 2 References DMTF DSP2025, Virtual Networking Management White Paper DMTF DSP0263, Cloud Infrastructure Management Interface (CIMI) Model and REST Interface over HTTP DMTF DSP0243, Open Virtualization Format Specification DMTF DSP2013, CIM System Virtualization Model White Paper DMTF DSP2017, Open Virtualization Format White Paper DMTF DSP8049, Network Port Profile Schema Specification DMTF DSP2029, Cloud Management for Communications Service Providers DMTF DSP-IS0103, Use Cases and Interactions for Managing Clouds DSP-IS0103_1.0.pdf 3 Terms and Definitions In this section we define the terms that are used throughout this document. When applicable we use or update the definition from an existing DMTF specification. 3.1 Cloud Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (based on NIST definition, Version 1.0.0a Work in Progress - not a DMTF Standard 7
8 DSP Cloud Service Cloud service is a service that utilizes shared computing, communications, and other resources over open or ubiquitous network based access to the resources (adapted from DSP-IS0103 and DSP2029). 3.3 Cloud Service Provider Cloud Service provider is an organization that delivers cloud services to the Cloud Service Consumers, both internal and external (adapted from DSP-IS0103 and DSP2029). 3.4 Cloud Service Consumer or Cloud Consumer Cloud service consumer is an entity that uses Cloud service from a Cloud Service Provider (adapted from DSP-IS0103 and DSP2029). 3.5 Cloud Consumer (or Cloud Service Consumer) Administrator Cloud consumer Administrator is an entity that is responsible for administering the requests for resources and services from Cloud service consumer (based on information available in DSP-IS0103 and DSP2029). 3.6 Network Network is a set of interconnected nodes capable of exchanging information. 3.7 Network Node Network node is an addressable device in a network. 3.8 Network Policy Network policy refers to a set of rules applied to the network. The rules are utilized for processing (security, quality of service, etc.) traffic. 3.9 Network Policy Enforcement Point Identifies the entity where the Network Policies are applied 3.10 Network Policy Service Network policy service enables application of network policies to various network components Network Policy Management Service Network policy service enables management of network policies Network Policy Template Network policy template is a set of Network Policy configuration parameters that can be used to create Network Policy instances Network Service Network Service is a capability offered by a Service provider to its consumers that facilitates the transfer of the consumers information. Network service can be realized via virtual, physical or a combination of both types of network elements Network Service Template Network Service template is a set of Network Service configuration parameters that can be used to create Network Service instances Network Topology Template Network topology template is a topology configuration pattern that can be used to describe a network topology that can be instantiated Network Template Network template is a combination of network service template and network topology template. 8 Work in Progress - not a DMTF Standard Version 1.0.0a
9 DSP Virtual Machine A virtual machine is a full encapsulation of the virtual hardware (including the CPU, controllers, Ethernet devices, and disks), virtual disks, and the metadata associated with it (adapted from DSP0243) Virtual Computer System A virtual system as applied to a computer system, e.g., a Virtual Machine, Hosted Computer, Child Partition, Logical Partition, Domain, Guest, and Container (DSP2013) Virtual Desktop Virtual desktop refers to delivery of the presentation of a desktop such as display, keyboard, mouse etc. on to another desktop or a thin client over a network Virtual Appliance A virtual appliance is a set of pre-packaged virtual system(s) with guest operating system and applications (adapted from Section 1.2 of DSP2017) Virtual Network Appliance A virtual network appliance is a special type of virtual appliance that can be used for network connectivity and services, for example DNS, DHCP, load balancer, firewall, etc. or combination thereof Virtual System A system that can be managed as described in DSP Virtual System Collection A virtual system collection is a group of virtual systems related to each other in some manner Virtualized Network Entity A virtualized network entity is an entity that facilitates creation or maintenance of a virtualized network. 4 Overview of Virtualized Networking This section presents an overview of the virtualized networking concepts and principles. 4.1 Challenges of Virtualized Networking In modern Data Centers, multiple network and service elements like Firewalls, Routers, AAA servers, DNS, QoS managers, Load balancers, etc. exist in LAN and SAN, which can be used to provide advanced network services. These elements may be implemented as virtual appliances as well as traditional dedicated devices and applications. In order to provide the unified management access to such network and service elements we are introducing the concept of Virtualized Networking, where we are looking at the externally manageable functionality of such entities abstracted from their actual realization. NSM WG is focusing on developing specifications that help present a unified management view of the virtualized networking, services and their components to both Cloud service consumers and Cloud service providers. Several challenging network related problems exist in virtualized networking environment: Configuration for network topology and network service deployment. Configuration for physical network hosting in virtualized networking environment. Rapid adaptation of network configuration for network service deployment. Network-Aware Hosting of content-aware applications such as Virtual Desktop (VD). 4.2 Virtualized Networking Components Figure 1 shows a high-level schematic for abstraction of the network elements in order to expose them as the virtualized network entities (vnes) for management. 267 Version 1.0.0a Work in Progress - not a DMTF Standard 9
10 DSP Figure 1 Network Entities (Resources and Services) Abstraction, Virtualization and Management As shown in Figure 1, the followings are the main components of virtualized networking: Physical and virtual network elements/entities Virtualized network entities (vnes) Application programming interface (API) for vne management Network Entities The network entities include various network components, such as routers, firewalls, AAA servers, DNS, load balancers, etc. These network components can be interconnected to support network services. Such network entities can be realized both as physical devices or virtual appliances. A common mechanism for virtualization of these generic network entities is required in order to achieve seamless interoperability. Once virtualization is done, the vnes can be exposed through open API for management and utilization by various applications and services Virtualized Network Entities (vnes) The virtualized network entities are the abstraction of the physical network entities and the network entities realized as virtual appliances. The vnes can be combined flexibly to support virtualized networking services. These virtualized network entities can be exposed via a management API to the upper management layers. The management API can be used to create, assign, monitor, update, and release the vnes. The following sections describe the Use Cases that can be used to derive the management model and required API functions. 10 Work in Progress - not a DMTF Standard Version 1.0.0a
11 DSP This section presents the details of a sample of network services management use cases. The details of each use case are presented using the following format. The Use case Number and Title are mentioned first. This is followed by steps and description per the format shown below.. i. Short Description ii. iii. iv. Assumptions (pre-conditions) Goal(s) / Desired Outcome(s) or post-conditions Primary, Secondary, and Supporting Actors v. Triggers and Implementation / required steps for execution (interactions) vi. Failure Condition(s) and Recovery vii. Possible Extensions/variations viii. Non-functional requirements, if applicable ix. Known issues 5.1 Use Case 1 (UC-1): Pre-defined Template-based Network Configuration Use case (UC-1) describes pre-defined template-based network configuration Short Description of the Use Case In this use case the end users are not concerned with the details of network topology. The network service required by VMs can be predefined in network templates. For example, the cloud service provider can define standard network topology and network service for a three-tier website. To build a web site in the cloud, users can select the predefined three-tier website and assign roles, such as front-end web server, application server or database server, to VMs. Once the VM roles are assigned, the high-level network services can be automatically provisioned to these VMs. For example, Firewalls may be setup between web servers and application servers or between application servers and database servers to enforce access control of these servers. Furthermore, load balancer acting as front-end web servers can be automatically configured to distribute external requests to VMs. From network providers view, the network template and role assignment information provided by users should be mapped to configurations on physical network devices and VMs (when network services are provided by software). Cloud service provider should have capability to manage network topology/flows/services so that the most frequently utilized network architectures can be deployed inside the virtual network environment Assumptions and Pre-Conditions It is assumed that cloud service providers have developed predefined network topology and service templates, e.g., two-tier website, three-tier website, computing clusters. Version 1.0.0a Work in Progress - not a DMTF Standard 11
12 DSP Figure 2 Pre-Condition for Network Service Management Use Case 1 (UC-1) Figure 2 shows one possible way the Cloud Service Providers can prepare and configure their network and services for utilization by the Cloud Consumers for this use case Goal(s) and Desired Outcome(s) The objective is to provide on-demand virtual network to support the cloud consumer application Primary, Secondary, and other Supporting Actors Primary Actor: Cloud Consumer (End User), as defined in the DMTF CIMI spec. and in the definition section (Section 1). Secondary Actor: Cloud Service Provider 12 Work in Progress - not a DMTF Standard Version 1.0.0a
13 DSP Triggers and Implementation / Executions Steps (Interactions) Cloud Service provider VMs VMs 1. Select network template 4. VM allocation and role assignment Computational resources VMs VMs 3. Attach VMs to networks Virtual resource management 2. Network resource allocation 4. Network configuration Deploy Networking resources Figure 3 High-level Network Service Management Use Case 1 (UC-1) UC-1 is invoked by the cloud consumer (end user): 1) End user browses the network templates (a topology with connectivity and services) provided by cloud service provider and selects one of the templates. End user sends commands to service provider, requesting a network to be deployed based on the selected template. Specific template configurations may be set by the end user. 2) Cloud service provider deploys the requested network along with the network services based on the predefined network template selected by user. Cloud service provider associates VMs to network ports on the virtual network. 3) End user deploys VMs on the network or associates existing VMs to the network. 4) Cloud service provider associates VMs to Network services configured in the template (or automatically provisioned to the VM based on the role of VM). The requirements related to UC-1 include the following ones: UC-1: Req.-1: Service provider should be able to configure the network based on network service requirements. UC-1: Req.-2: Service provider should provide network templates for users which can be easily mapped to popular network topologies. UC-1: Req.-3: Service provider may define common network policy services, e.g., Load balancer, FW, on the network templates. UC-1: Req.-4: Service provider may scale the capability of network services, e.g., bandwidth/packet processing capability, based on user network requirements. Version 1.0.0a Work in Progress - not a DMTF Standard 13
14 DSP Failure Condition (s) and Recovery Failure occurs when the Cloud Service Provider cannot meet the consumer requirements or the request is in violation of one of the business agreement requirements. Failure may also occur when the Service Provider can t fulfill any one of the implementation steps or triggers discussed in the previous section. In some situations, failure may also occur when the alternatives suggested by the Cloud Service Provider are not acceptable to the Cloud Consumer Possible Extensions/variations Focus on provider-defined pre-configured templates only. The consumer can pick and choose but not modify the templates. For now the consumer-defined templates are out of scope Non-functional requirements, if applicable None, for this version of this document Known Issues None, for this version of this document. 5.2 Use Case 2 (UC-2): Network Configuration based on Existing Physical Network Topology of User s Data Center Use case (UC-2) discusses Network configuration based on existing physical network topology of user s data center Short Description of the Use Case Cloud consumer may have already deployed their own private network and server clusters. When users move their existing IT infrastructures to the cloud, network services in the existing physical networks should also be moved to the virtual network so that VMs migrated from existing physical servers can work properly. In this use case, users should first extract network service configurations, such as ACLs in Firewall and policy settings in Load balancer, from the deployed physical network. To facilitate the network migration, users may map their network configurations to a standardized format or template, e.g., network service model in CIMI interface or OVF 2 package. After the virtual network is setup by the cloud service provider, user can plug-in the VMs seamlessly to the virtual network interfaces mapped to their existing physical network Assumptions and Pre-Conditions Cloud consumer (end user) has already deployed enterprise network. Cloud consumer (end user) has tools to extract network topology and configurations from existing network. Cloud consumer Administrator (Admin on the consumer side) has the necessary tools and capability to administer the network and service requests from the Cloud consumer. 14 Work in Progress - not a DMTF Standard Version 1.0.0a
15 DSP Figure 4 Pre-Condition for Network Service Management Use Case 2 (UC-2) Figure 4 shows one possible way the Cloud Service Providers can prepare and configure their network and services for utilization by the Cloud Consumers for this use case Goal(s) and Desired Outcome(s) The objective is to support effortless migration from an existing network to a virtual network by extracting the required network topology and configuration information. The cloud service provider essentially clones the existing networking functions and services for seamless migration of resources from one provider domain to another Primary, Secondary, and other Supporting Actors Primary Actor: Cloud Consumer (End User) Secondary Actor: Cloud Service Provider Supporting Actor: Cloud Consumer Administrator (Admin) Triggers and Implementation / Executions Steps (Interactions) From the cloud service providers view, they should get network topology and service configuration information from users. Then they should configure network services (on physical network devices or on VMs) to mimic the network as in the way described by the user. If the service cannot be configured as requested by the users, the cloud service provider should return the reason for the failure and the difference between the configuration of the virtual network and the network requested by the user. Version 1.0.0a Work in Progress - not a DMTF Standard 15
16 DSP Network configuration extaction Import network configuration 2. Network configurations Cloud Service provider 5. VM allocation and role assignment Computational resources VMs VMs VMs VMs 4. Attach VMs to networks Virtual resource management 3. Network resource allocation 5. Network configuration Export network configuration Deploy Networking resources Figure 5 High-level Network Service Management Use Case 2 (UC-2) UC-2 is invoked by the Cloud Consumer Admin: 1) Cloud Consumer Admin exports network topology and configuration from the existing network. The network configuration for specific network services should be mapped to standardized network services. 2) Cloud Consumer Admin imports the network topology and configuration to the cloud service provider. 3) Cloud service provider configures network devices, servers or VMs to setup virtual network and network services which meet the end user s requirements. 4) Cloud Consumer Admin deploys VMs on the network or associates existing VMs to the network. 5) Cloud service provider associates VMs to network ports on the virtual network. The requirements related to UC-2 include the following ones: UC-2: Req.-1: as defined in UC-1: Req.-1. UC-2: Req.-2: Service provider should provide interfaces for user to import network topology and configurations. UC-2: Req.-3: Service provider should meet user s network requirements by allocating network resources and configure them as requested by the user. If user s requirements cannot be fulfilled, service provider may return the difference between user s requirements and the allocated network resources. UC-2: Req.-4: Service provider may provide a set of network services, e.g., routers/fw/lb. UC-2: Req.-5: Service provider may enable configuration mechanisms to allow user to migrate configuration data. The configuration may include network services policies, e.g. ACLs in firewall or policies in Load Balancer Failure Condition (s) and Recovery Failure occurs when the Cloud Service Provider cannot meet the consumer requirements or the request is in violation of one of the business agreement requirements. Failure may also occur when the Service Provider can t fulfill any one of the implementation steps or triggers discussed in the previous section. In some situations, failure may also occur when the alternatives suggested by the Cloud Service Provider are not acceptable to the Cloud Consumer. 16 Work in Progress - not a DMTF Standard Version 1.0.0a
17 DSP Possible Extensions/variations Cloud service provider may return the difference between available virtual network capability and user request when any significant parts of user s requirements cannot be fulfilled Non-functional requirements, if applicable Users may request for specific capacity for a given network service, e.g., a Firewall may need to have black list size larger than 10,000 entries and should be able to process 1M packets per second. These types of features are commonly supported Known Issues None, for this version of this document. 5.3 Use Case 3 (UC-3): Network Configuration Modification Use case 3 (UC-3) illustrates network configuration modification during run time Short Description of the Use Case A cloud consumer administrator may need to modify the network configuration while their virtual systems are running. For example, changes may be needed to the ACLs in firewall or scaling the network based on workload demand. The cloud consumer administrator can use the CIMI interface to request changes in the network configuration Assumptions and Pre-Conditions The cloud service provider has deployed the virtual network as requested by the cloud consumer administrator. The cloud consumer administrator has the necessary tools to effect changes. Version 1.0.0a Work in Progress - not a DMTF Standard 17
18 DSP Figure 6 Pre-Condition for High-level Network Service Management Use Case 3 (UC-3) Figure 6 shows one possible way the Cloud Service Providers can prepare and configure their network and services for utilization by the Cloud Consumers for this use case Goal(s) and Desired Outcome(s) The objective is to achieve an on-demand update of the network configuration. This facilitates dynamic addition/removal/modification of network capacity, service quality, and capabilities of the services Primary, Secondary, and other Supporting Actors Primary Actor: Cloud Consumer Secondary Actor: Cloud Service Provider Supporting Actor: Cloud Consumer Administrator Triggers and Implementation / Executions Steps (Interactions) From the cloud service providers view, they must provide automatic network service reconfiguration, in addition to user requested configuration changes. Such automatic network service reconfiguration includes: automatically relocate network services when there is a network failure, automatically scale up network service capacities when more VMs or computational resources are allocated to the user. 18 Work in Progress - not a DMTF Standard Version 1.0.0a
19 DSP2034 Cloud Service provider 1. Network configurations modification Computational resources 4. Return update results Virtual resource management 2. Network configuration update 3. Return update results Virtual configuration channel Networking resources Virtual network device Figure 7 High-level Network Service Management Use Case 3 (UC-3) UC-3 is invoked by the cloud customer administrator: 1) The cloud consumer administrator sends a request to the cloud service provider to modify a network service configuration. 2) The cloud service provider modifies the network service configuration. 3) The cloud service provider returns the status of the network service configuration change to the cloud consumer administrator. 4) The cloud consumer administrator verifies that the requested modification has been made. The requirements related to UC-3 include the following ones: UC-3: Req.-1: The cloud service provider is able to accept requests for network service configuration changes from the cloud consumer administrator Failure Condition (s) and Recovery A failure occurs if the cloud service provider cannot support the requested network service configuration change Possible Extensions/variations None, for this version of this document Non-functional requirements, if applicable None, for this version of this document Known Issues None, for this version of this document. Version 1.0.0a Work in Progress - not a DMTF Standard 19
20 DSP Relationships with DMTF Specifications In this section, a short overview of the DMTF specifications and models related to networking is presented. 6.1 OVF Open Virtualization Format Specification (DSP0243) OVF describes an open, secure, portable, efficient and extensible format for the packaging and distribution of software to be run in virtual machines. The OVF package contains Network Section which describes logical networks used in the package. Connections to Networks are specified through configurations on Ethernet Adaptors CIMI Cloud Infrastructure Management Interface (CIMI) Model and REST Interface over HTTP specification (DSP0263) CIMI focuses on the model and protocol for management interactions between a cloud Infrastructure as a Service (IaaS) Provider and the Consumers of an IaaS service. Among other resources, such as Machines and Volumes, CIMI also provides management for Networking resources, which include Network, Network Template, Network Configuration, Network Port, Network Port Template, Network Port Configuration, Address, Address Template, Forwarding Group, Forwarding Group Template and their respective collections. CIMI needs to be able to support implementing the subset of the requirements of the use cases described in this white paper as applicable to the Provider/Consumer interface. 6.3 Network Related Profiles DMTF defined network related management profiles include: Virtual System Profile (DSP1057), Ethernet Port Profile (DSP1014), Resource Allocation Profile (DSP1041), Allocation Capabilities Profile (DSP1043), Ethernet Port Resource Virtualization Profile (DSP1050), and Virtual Ethernet Switch Profile (DSP1097). Network management is an important component for the management task. The current DMTF standards mostly focus on network aspects of L2 and below networks, which mainly involves with network ports, adaptors, L2 switches, etc. For a more complete view of networking management, L3 and above network services should be considered Impact to the existing DMTF Specifications Table 1 shows the potential impact on the CIMI interface, OVF, and NPP based on the requirements developed above Work in Progress - not a DMTF Standard Version 1.0.0a
21 DSP Table 1 Potential Impact to the DMTF Specifications Requirement DMTF Spec Usage Comments UC-1: Req.-1 UC-1: Req.-2 UC-1: Req.-3 UC-1: Req.-4 OVF: Supported CIMI: Show network resource capability (need more granularity and flexibility) NPP Schema: VMs and VNEs are included into the network topology. End user selects topology and related Network Port Profiles (NPPs) from the Port Profile Database (PPDB) OVF: Network resources selection and assigning VM to the network. Basic functions are available in OVF 1.x and OVF 2.0; advanced functions (quality of service, load balancer, fire wall) will be available in post OVF 2.0) CIMI: Template selection, and mapping requirements to the template NPP Schema: Network templates provided by Cloud Service provider should include VMs/VNEs associated NPPs which can be taken from the Port Profile Database (PPDB) OVF: Network (L2 and above) service extension (available in post OVF 2.0) CIMI: Network (L2 and above) service extension (may leverage OVF specs.) NPP Schema: No direct relationship OVF: Scaling policy definition (out of scope; need more discussion) CIMI: Scaling policy definition (out of scope; need more discussion) NPP Schema: No direct relationship Cloud Service Provider preconfigures the relationship among NPP, VM/VNE, and Topology NPP is layer-2 related configuration data which can be used to configure the port of VM. This needs to be extended to support layer-3 parameters and entities. Otherwise, may need to initiate a new work item If common network policy services are not related to new VM/VNE deployment, or there is no need to change NPP to support these services If the capability scaling of network services is not related to new VM/VNE deployment or there is no need to change NPP to support the capability scaling UC-2: Req.-1 UC-2: Req.-2 OVF: Same as in UC-1: Req.-1 CIMI: Same as in UC-1:Req.-1 NPP Schema: Cloud Service Provider need to take port related configuration data from end user provided network topology and configuration, and construct these into VM/VNE related NPP, or should get the pre-configured NPP based on the standardized network services which are mapped from the specific physical network services OVF: Add new configuration and detailed network parameters CIMI: Add new configuration and detail network parameters NPP Schema: NPP can be constructed based on the configuration data provided by the End user from the interfaces, or can bind to some pre-configured NPP based on the standardized network services which are mapped from the specific physical network services Cloud Service Provider preconfigures the NPPs for the VM/VNE included into the standardized network services Cloud Service Provider preconfigures the NPPs for the VM/VNE included into the standardized network services Version 1.0.0a Work in Progress - not a DMTF Standard 21
22 DSP2034 UC-2: Req.-3 UC-2: Req.-4 UC-2: Req.-5 OVF: Supported CIMI: Return differences when user requirements cannot be met (outside the scope) NPP Schema: Cloud Service Provider needs to check whether the platform can support the required port configuration data based on End User s network requirements OVF: Define standard network services (limited support) CIMI: Define standard network services (not available as an API; only through OVF import) NPP Schema: Cloud Service Provider should provide mapping of standard network services to some port configuration data of NPP OVF: Network device configuration parameters (limited support) CIMI: Network device configuration parameters (not available as an API; only through OVF import) NPP Schema: Migration of configuration data has no direct influence on the content of NPP, but impact the location only If the port profiles can t be supported per End User s network requirements, Cloud service provider should return the difference at network service level If a standard network service is supported by VM/VNE, the affected port configuration data related to the network service should be reflected into NPP None UC-3: Req.-1 OVF: Not Supported, Runtime features to be supported in future version. CIMI: Supported. May provide network service configuration interface through CIMI NPP Schema: Cloud Service Provider should provide mapping of network capability to some port configuration data of NPP. NPP should be modified to support the network services configured by the End User CIMI: May return network service configuration interface through CIMI NPP Schema: NPP should be modified to support the network services configured by the End User If some network capability is autoscaled by Cloud Service provider, the affected port configuration data in NPP should be modified 22 Work in Progress - not a DMTF Standard Version 1.0.0a
23 DSP ANNEX A (Normative) IETF/IRTF Standards and Specifications The following three active IETF ( and IRTF ( working groups may be most relevant to the DMTF NSM WG: Network Virtualization Overlays (NVO3) in the Routing Area (RA) of IETF System for Cross-domain Identity Management (SCIM) in the Applications Area (AA) of IETF Software Defined Networking Research Group (SDN-RG) in IRTF A brief description of each of the above groups is presented below. NVO3: It is noted that support for multi-tenancy has become a core requirement of data centers (DCs), especially in the context of data centers supporting virtualized hosts and virtual machines (VMs). The NVO3 WG will investigate the interconnection of the DC virtual private network (VPNs) and their tenants with non-nvo3 Internet protocol-based network(s) to determine if any specific work is needed. Further details about the charter of NVO3 can be found at the following Website: SCIM: SCIM working group will standardize methods for creating, reading, searching, modifying, and deleting user identities and identity-related objects across administrative domains, with the goal of simplifying common tasks related to user identity management in services and applications. Further details about the charter of NVO3 can be found at the following Website: SDN-RG: SDN-RG provides a forum for researchers to investigate key and interesting problems in the Software Defined Networking (SDN) field. It investigates SDN from various perspectives with the goal of identifying the approaches that can be defined, deployed and used in the near term as well identifying future research challenges. Key areas of interest include solution scalability, abstractions, and programming languages and paradigms particularly useful in the context of SDN. Further details about the charter of SDN-RG can be found at the following Website: Version 1.0.0a Work in Progress - not a DMTF Standard 23
24 DSP ANNEX B (Informative) (Inter-Provider Use Case) B.1 Use Case B1 (UC-B1): Location Aware Hosting of Virtual Desktop This is an Inter-Provider use case. This use case (UC-B1), describes location aware hosting of Virtual Desktop (VD). 570 B.1.1 Short Description of the Use Case Implementation of this use case facilitates accessing of the features and services by a roaming virtual desktop (VD) without directly using a virtual machine (VM) in a host of the original home/enterprise Data center. 574 B.1.2 Assumptions and Pre-Conditions A virtual desktop (VD) client is installed in a device (Tablet, Mobile phone, Laptop, phablet, etc.) that can travel with the user, and the user can get all of the services and features seamlessly irrespective of the location through generic network (Internet) access. In general, the VD is hosted in a virtual machine (VM) in the Enterprise (private) Data Center (DC). When the user is roaming, another VM in a visited DC may host the VD Figure 8 Pre-Condition for High-level Network Service Management Use Case B1 (UC-B1) Figure 8 shows one possible way the Cloud Service Providers can prepare and configure their network and services for utilization by the Cloud Consumers for this use case. 24 Work in Progress - not a DMTF Standard Version 1.0.0a
25 DSP B.1.3 Goal(s) and Desired Outcome(s) The objective is to achieve on-demand hosting and mobility support for virtual desktop. The virtual desktop features and host (in VM) location are adapted based on network and service access location. This helps achieve the desired performance to the visited location. It is required to share cross-domain topology and resource utilization information in order to achieve the desired optimization. 590 B.1.4 Primary, Secondary, and other Supporting Actors Primary actors: Cloud consumers who have Virtual desktop (VD) client, VD host, Networking as a Service (NaaS) proxy, etc. Secondary actors: Cloud service provider with the capability to support Networking as a Service (NaaS) server, virtual machine, Host, Data center, etc. Supporting actors: Service monitoring/management/logging/auditing tools, and associated infrastructure. 596 B.1.5 Triggers and Implementation / Executions Steps (Interactions) Figure 9 High-level Network Service Management Use Case B1 (UC-B1) An implementation of UC-B1 can be invoked by any cloud customer (end user) who has a VD installed in a network (Internet) access capable device, e.g., tablet, laptop, mobile phone, etc. The following are possible high-level steps: 1) Turn on the device and activate the virtual desktop (VD). 2) Enable network (Internet) access. 3) Start the Web Browser, and Type-in the URL for accessing the VM in the Enterprise Data center that is hosting the VD. 4) Provide the valid LogIn credentials for access verification/challenge, and then allow successful Login or report mis-handling of the system, unauthorized access attempts, etc. 5) Enterprise Data center recognizes the current roaming location of the VD and locates a nearby guest Data Center and a VM in that DC that can host the VD. Version 1.0.0a Work in Progress - not a DMTF Standard 25
26 DSP ) The guest DC then establishes back-end Network as a Service (NaaS) extension to the VM in the original Enterprise DC 7) The VD which is now hosted in a VM in the guest DC, and it can have all of the service and features as in the original DC without having direct access to the VM in the original Enterprise DC 8) Service usages are monitored and recorded for logging, auditing and QoS/QoE maintenance purposes 9) When the user logs off, the VM, NaaS, and associated resources form eth guest DC are released, and all of the recorded service logging and auditing related data are transferred back to the original Enterprise DC. The requirements related to UC-B1 include the following ones: UC-B1: Req.-1: The device that contains a valid/registered VD should be able to establish a VPN or layer-2 tunnel to the Enterprise Data Center (DC) where the original VM that hosts the VD resides. UC- B1: Req.-2: Based on the physical location of the VD, the Original DC (in collaboration with the VM that is Hosting the VD) should be able to determine -- based on many criteria, and one of these may be the geographical proximity of the VD-device a guest/visited DC, and must locate a VM (within the DC) which can host the VD temporarily (for the duration of the session). Note that a federation of VMs may be used to locate a feasible VM to Host the VD as well (cross-domain resources discovery and topology sharing may be required for this purpose). UC- B1: Req.-3: Original VM should be able to negotiate for the desired features and services of the VD with the VM in the guest/visited DC. If the negotiation passes, a VM is located in the desired DC to Host the VD. If not, the Enterprise DC should be able to locate an alternative DC within a given set of constraints, and a VM is located in it to host the VD (cross-domain resources discovery and topology sharing may be required for this purpose). UC- B1: Req.-4: VM in the guest/visited DC should be able to establish VPN or Layer-2 tunnel (backend networking as a service or NaaS extensions) to the VM in the original Enterprise DC VM (VD-host). UC- B1: Req.-5: Back-end NaaS extensions should be able to allocate, monitor and enforce the features and services including QoS/QoE, privacy and security requirements, and must facilitate logging and auditing data collection throughout the session. The features may utilize virtualized computing, communications, storage, transcoding, etc. resources. UC- B1: Req.-6: The VD should now be able to access the VM (Host) in the guest/visited DC and must have access to all of the features and functions as if the VD (VM) is in the original Enterprise DC that hosts the VD. UC- B1: Req.-7: It is required to support the abstraction of cross-dc (among the VMs that are Hosting the VD) communications. UC- B1: Req.-8: It is required to support the abstraction of cross-dc (among the VMs that are Hosting the VD) co-ordination of VD features and services. UC- B1: Req.-9: It is required to support the availability of Topology and Cost (delay, jitter, loss, price, etc. matrix) data across the desired DC domains. 648 B.1.6 Failure Condition (s) and Recovery In general, failure occurs when the Cloud service provider cannot support the desired network-aware hosting of virtual desktop. In addition, failure may occur when the Cloud Service Provider cannot satisfy any one of the implementation steps or triggers discussed in the previous section. This may include regulatory restrictions, and lack of availability of VM features/functions/capability in the visited hosts. 26 Work in Progress - not a DMTF Standard Version 1.0.0a
27 DSP B.1.7 Possible Extensions/variations The roaming user may provide some preference regarding the location of the guest DC. Similarly, the Enterprise DC may have a set of pre-selected list of globally distributed DCs from which the guest DC can be selected. It is possible that service-specific QoS/QoE and security profile will be invoked either by the VD or by the VM or by both. If desired, logging of auditable service usage may be flexible as well. 660 B.1.8 Non-functional requirements, if applicable The non-functional requirements for this use case may include the following: (a) personalization of VD and VM profiles, (b) service granularity and quality, and (c) service usage capacity including bandwidth and volume/size of downloaded/uploaded data. 664 B.1.9 Known Issues 665 None, for this version of this document B.2 Impact to the existing DMTF Specifications Table 2 shows the potential impact on the CIMI interface, OVF, and NPP based on the requirements developed above for this Inter-Provider use case. Table 2 Impact to DMTF Specifications for an Inter-Provider Use Case UC-B1: Req.-1 UC-B1: Req.-2 UC-B1: Req.-3 UC-B1: Req.-4 OVF: Supported CIMI: Per-user authentication, VM assignment and access NPP Schema: No special requirements OVF: On demand VPN setup CIMI: On demand VPN setup NPP Schema: NPP of the VM that is Hosting the VD should be supported and provided in the guest/visited DC which provides a feasible VM to Host the VD OVF: None CIMI: Inter-DC negotiation NPP Schema: Cloud Service Provider should support mapping of features and services of the VD with the VM/VNE to some port configuration data of NPP OVF: On demand VPN setup QoS guarantee CIMI: On demand VPN setup QoS guarantee NPP exists in the Enterprise Data Center (DC) where the original VM that hosts the VD resides NPP may be migrated to the guest/visited DC environment NPP can be accessed to and configured in VM/VNE in both guest/visited DC and the original Enterprise DC Version 1.0.0a Work in Progress - not a DMTF Standard 27
28 DSP2034 UC-B1: Req.-5 UC-B1: Req.-6 UC-B1: Req.-7 UC-B1: Req.-8 UC-B1: Req.-9 NPP Schema: No special requirements OVF: Supported CIMI: Extension on metering NPP Schema: Cloud Service Provider should support mapping of the features and services of the NaaS extensions to some port configuration data of NPP OVF: Supported CIMI: Supported NPP Schema: No special requirements OVF: Supported CIMI: On demand VPN setup NPP Schema: No special requirements OVF: Supported CIMI: Inter-DC coordination NPP Schema: Cloud Service Provider should provide mapping of the features and services of the VD with the VM to some port configuration data of NPP OVF: Supported CIMI: Inter-DC data sharing NPP Schema: Cloud Service Provider should support checking and mapping of the Topology and Cost data to some port configuration data of NPP None NPP can be accessed to and configured in VM/VNE in both guest/visited DC and the original Enterprise DC NPP can be accessed to and configured in VM/VNE in both guest/visited DC and the original Enterprise DC The port profiles can be coordinated between the guest/visited DC and the original Enterprise DC The supported port profiles across the desired DC domains need to be checked Work in Progress - not a DMTF Standard Version 1.0.0a
29 DSP ANNEX C (Change Log) Version Date Description wgv Early Template and Outline wgv Initial Draft wgv Updated with Use Case Details wgv Updated with Edits and Use Case Details wgv Updated with Edits/Clarification wgv Updated with Edits/Clarification wgv Updated to address the comments from face-to-face mtg. and discussion wgv Updated pre-condition and definition section wgv Edits and updates wgv Edits and updates wgv Converted to DMTF template wgv Worked on terms and definitions wgv Added DSP number and some formatting wgv Edits and updates wgv WIP release candidate 1.0.0a wgv WIP release candidate with footer, front, page, references fixed a WIP release Version 1.0.0a Work in Progress - not a DMTF Standard 29
Interoperable Clouds
Interoperable Clouds A White Paper from the Open Cloud Standards Incubator Version: 1.0.0 Status: DMTF Informational Publication Date: 2009-11-11 Document Number: DSP-IS0101 DSP-IS0101 Interoperable Clouds
Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM)
1 2 3 4 5 Document Number: DSP0264 Version: 0.0.09 Date: 2011-09-07 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM)
Simple Identity Management Profile
1 2 3 4 Document Number: DSP1034 Date: 2009-06-17 Version: 1.0.1 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 DSP1034 10 11 Copyright Notice Copyright 2008,
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
Software Identification and Entitlement Usage Metrics
1 2 3 4 Document Number: DSP-IS0301 Date: 2012-05-20 Version: 1.0.0 5 6 Software Identification and Entitlement Usage Metrics 7 8 9 10 Document Type: White Paper Document Status: DMTF Informational Document
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
EMC ENCRYPTION AS A SERVICE
White Paper EMC ENCRYPTION AS A SERVICE With CloudLink SecureVSA Data security for multitenant clouds Transparent to applications Tenant control of encryption keys EMC Solutions Abstract This White Paper
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
Virtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
VMware vcloud Director for Service Providers
Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud
VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION
TECHNICAL MARKETING DOCUMENTATION October 2014 Table of Contents Purpose and Overview.... 3 1.1 Background............................................................... 3 1.2 Target Audience...........................................................
OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar
OpenNebula Open Souce Solution for DC Virtualization C12G Labs Online Webinar What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized Environments I m using virtualization/cloud,
Network Technologies for Next-generation Data Centers
Network Technologies for Next-generation Data Centers SDN-VE: Software Defined Networking for Virtual Environment Rami Cohen, IBM Haifa Research Lab September 2013 Data Center Network Defining and deploying
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Standard Registry Development and Publication Process
Document number: DSP4006 Date: 2007-12-12 Version: 1.1.0 Standard Registry Development and Publication Process Document type: Specification Document status: Informational Document language: E Copyright
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
OpenNebula Open Souce Solution for DC Virtualization
OSDC 2012 25 th April, Nürnberg OpenNebula Open Souce Solution for DC Virtualization Constantino Vázquez Blanco OpenNebula.org What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator ([email protected]) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
OpenNebula Open Souce Solution for DC Virtualization
13 th LSM 2012 7 th -12 th July, Geneva OpenNebula Open Souce Solution for DC Virtualization Constantino Vázquez Blanco OpenNebula.org What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Cisco Virtual Network Management Center
Data Sheet Cisco Virtual Network Management Center Introduction The dynamic nature of the cloud paradigm introduces new needs for automation, but it also facilitates new types of automation due to the
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Installing Intercloud Fabric Firewall
This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
Certificate Management Profile
1 2 3 4 Document Number: DSP1096 Date: 2011-09-16 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: en-us 9 DSP1096 10 11 Copyright notice Copyright
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Software Identification and Entitlement Metrics
Information for Work-in-Progress version: IMPORTANT: This specification is not a standard. It does not necessarily reflect the views of the DMTF or all of its members. Because this document is a Work in
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud
Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture
Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.
INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs
White Paper INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs Provisioning storage using EMC Symmetrix VMAX Cloud Edition Using REST APIs for integration with VMware vcloud
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise
Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle NIST Definition of Cloud Computing Cloud
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
Cloud Customer Architecture for Web Application Hosting, Version 2.0
Cloud Customer Architecture for Web Application Hosting, Version 2.0 Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural
IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
VMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Data Center Virtualization and Cloud QA Expertise
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment
CloudCenter Full Lifecycle Management An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management Page 2 Table of
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:
How To Write A Cloud Security Framework
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, and Meng Yu Please send comments & suggestions to Suren Karavettil ([email protected])
Advanced Service Design
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Service Orchestration: The Key to the Evolution of the Virtual Data Center
Service Orchestration: The Key to the Evolution of the Virtual Data Center By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Introduction Data center managers are faced with an array of
The following normative disclaimer shall be included on the front page of a PoC report:
Annex B (normative): NFV ISG PoC #28 Report The following normative disclaimer shall be included on the front page of a PoC report: Submission of this NFV ISG PoC Report as a contribution to the NFV ISG
How To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael
Cloud Security Framework (CSF): Gap Analysis & Roadmap
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil
Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com
Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident
Software Defined Data Center (SDDC) Definition A White Paper from the OSDDC Incubator
1 2 3 4 Document Identifier: DSP-IS0501 Date: 2014-10-23 Version: 1.0.1c 5 6 A White Paper from the OSDDC Incubator Information for Work-in-Progress version: IMPORTANT: This document is not a standard.
Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, 2015. 20014 IBM Corporation
Boas Betzler Cloud IBM Distinguished Computing Engineer for a Smarter Planet Globally Distributed IaaS Platform Examples AWS and SoftLayer November 9, 2015 20014 IBM Corporation Building Data Centers The
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM
Leverage Vblock Systems for Esri's ArcGIS System Table of Contents www.vce.com LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM August 2012 1 Contents Executive summary...3 The challenge...3 The solution...3
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Virtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers Huawei SingleCLOUD* Case Study Cloud Design and Deployment on Intel Xeon Processor-based Platforms Huawei SingleCLOUD* AUDIENCE AND PURPOSE
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Uila Management and Analytics System Installation and Administration Guide
USER GUIDE Uila Management and Analytics System Installation and Administration Guide October 2015 Version 1.8 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE
Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015
Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015 Introduction 1 Netra Modular System 2 Oracle SDN Virtual Network Services 3 Configuration Details
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed
IAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
PROSPHERE: DEPLOYMENT IN A VITUALIZED ENVIRONMENT
White Paper PROSPHERE: DEPLOYMENT IN A VITUALIZED ENVIRONMENT Abstract This white paper examines the deployment considerations for ProSphere, the next generation of Storage Resource Management (SRM) from
Simplified Private Cloud Management
BUSINESS PARTNER ClouTor Simplified Private Cloud Management ClouTor ON VSPEX by LOCUZ INTRODUCTION ClouTor on VSPEX for Enterprises provides an integrated software solution for extending your existing
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
