Requirements and Framework of VPN-oriented Data Center Services

Similar documents
Ethernet-based and function-independent vehicle control-platform

Alarm transmission through Radio and GSM networks

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

How to recover your Exchange 2003/2007 mailboxes and s if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

Scal abil it y of ANSYS 16 applicat ions and Hardware select ion.

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

College of Engineering Bachelor of Computer Science

Welcome to the Cloud Stream. Sponsored by:

Using Model Checking to Analyze Network Vulnerabilities

LTI, SAML, and Federated ID - Oh My!

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Decision-Driven Fixed Income Attribution

Transmittal 47 Date: FEBRUARY 24, 2006

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

Hitachi Virtual Storage Platform

California s Duals Demonstration: A Transparent. Process. Margaret Tatar Chief, Medi-Cal Managed Care Division. CA Coo 8/21/12

NETWORK TRAFFIC PRIORITIZATION USING MAP OF ARRIVALS

Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Armored Car Insurance Application

How to create a default user profile in Windows 7

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

Aegis Identity Software, Inc. Experts in Identity Management 100% Focused on Education

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

883 Brochure A5 GENE ss vernis.indd 1-2

NFV Checklist. Designing Agile, Scalable Networks for Carrier-Grade Performance

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction

Optimizing Supply Chain Collaboration Based on Negotiation and Bargain Power for Single Retailer And Single Supplier

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Distributed Computing and Big Data: Hadoop and MapReduce

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

How To Manage A Virtualization Server

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

HIGH AVAILABILITY SOLUTION: RESOURCE USAGE MANAGEMENT IN VIRTUALIZED SOFTWARE AGING

Significant value in diagnostic information

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes

Jerry Ash AT&T Bur Goode AT&T George Swallow Cisco Systems, Inc.

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Multi Protocol Label Switching (MPLS) is a core networking technology that

PACE: Policy-Aware Application Cloud Embedding

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

The transport performance evaluation system building of logistics enterprises

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

Dynamic Pricing and Profit Maximization for the Cloud with Geo-distributed Data Centers

Using LISP for Secure Hybrid Cloud Extension

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

For internal circulation of BSNLonly

Overlay Networks and Tunneling Reading: 4.5, 9.4

Framework for Computation Offloading in Mobile Cloud Computing

Software Engineering and Development

How To Change V1 Programming

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

Cisco IP Telephony. Presented By Alastair Brand NETintellect

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

Solutions to Problems: Chapter 7

Effect of Contention Window on the Performance of IEEE WLANs

IBM Research Smarter Transportation Analytics

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Cloud Networking: Framework and VPN Applicability. draft-bitar-datacenter-vpn-applicability-01.txt

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution

The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

Introduction Inter-AS L3VPN

Definitions and terminology

TRILL for Data Center Networks

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

Towards Automatic Update of Access Control Policy

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

ScaleNet Converged Network of the Future

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2

Network Management, MIBs and MPLS

Scheduling Hadoop Jobs to Meet Deadlines

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

Thank you for attending the MDM for the Enterprise Seminar Series!

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

Virtual Desktop Infrastructure (VDI)

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Chapter 30: Magnetic Fields Due to Currents

Packetized Telephony Networks

Transcription:

Requiement and Famewok of -oiented Data Cente Sevice http://datatacke.ietf.og/doc/daft-o-vdc/ Ning So ning.o@veizonbuine.com Paul Unbehagen paul.unbehagen@alcatel-lucent.com Linda Dunba Linda.dunba@huawei.com Heny Yu Heny.yu@twtelecom.com John M. Heinz john.m.heinz@centuylink.com Noival Figueia nfiguei@bocade.com Bhumip Khanabih vumip1@gmail.com 81 Quebec City

What I VS! -oiented Data Cente Sevice (VS) ae the extenion to the exiting L2 and L3 evice into cloud data cente and to contol the vitual eouce haing function! Stictly maintaining the ecue, eliable, and logical iolation chaacteitic of! Making the data cente eouce a additional attibute to! Allowing end-to-end -baed evice management! having the contol on how and what data cente eouce to be aociated with the Thi daft decibe the chaacteitic of thoe evice, the evice equiement, and the coeponding equiement to data cente netwok.

VS Sevice Definition and Requiement! -oiented computing evice! Vitual Machine (VM) and/o phyical eve in a vitualized caie data cente being attached to a cutome! Requiement: auto-poviioning, VM and eve intantiation and emoval, VM migation policy contol, VM monitoing! -oiented toage evice! dik pace, eithe vitual o actual block of had dive in data cente, being added to a cutome! Requiement: content eplication contol, toage pace auto-poviioning, toage migation policy contol, content life cycle management

Othe Requiement! Inta- Netwok Requiement! Requiement when ae extended into uing Gateway Taffic epaation pe and pe evice vitual eouce aignment contol and epoting Dynamic configuation and poviioning contol of vitual eouce QoS uppot! Vitual Reouce Management Requiement! vitual eouce include phyical eve and VM, dik pace, memoie, inta- netwok connection and bandwidth.! Requiement include Reouce patition and aignment Reouce acceibility contol and management

Othe Requiement! Secuity equiement! Auto-configuation equiement! OAM equiement! And etc.

L3-VS Phyical Famewok Vitual Machine attached to 10.1.x Dektop Dektop 10.3.x CE Rout e IP/MPLS netwok CE Rout e 10.2.x Dektop CE Rout e Data Cente Data Cente CE Rout e Data Cente Dektop 10.4.x VM 10.1.200.x 10.2.40.x 10.3.20.x 10.4.100.x

Logical View of Routing Table at L3 10.1.x Dektop 1 IP/MPLS netwok 3 Dektop 10.3.x 10.2.x Dektop 2 4 Dektop 10.4.x IP Adde Next Hop IP Adde Next Hop 10.1.200.x IP Adde Next Hop 10.1.200.x IP Adde Next Hop Data 10.1.x IP Adde ER Next 1 Hop 10.1.200.x 10.1.x IP Adde ER Next 1 Hop 10.1.200.x Cente 10.2.20.x 10.1.200.x 10.1.x IP Adde ER Next 1 Hop 10.2.20.x 10.1.200.x 10.1.x ER 1 10.2.x 10.1.x IP Adde ER 2 ER Next 1 Hop 10.2.20.x 10.1.200.x 10.2.x 10.1.x ER 2 10.2.20.x 10.3.20.x 10.2.20.x 10.1.200.x ER 1 10.2.x 10.1.x ER 2 ER 1 10.3.20.x 10.2.20.x 10.2.x ER 2 VM 10.3.x 10.2.x 10.3.20.x 10.1.x ER 3 ER 2 ER 1 10.2.20.x 10.3.x 10.2.x ER 3 10.3.20.x 10.4.100.x 10.3.20.x 10.3.x 10.2.20.x ER 2 10.2.x ER 3 ER 2 10.4.100.x 10.3.20.x 10.3.x ER 3 10.4.x 10.3.x 10.2.x ER 4 ER 3 ER 2 10.1.200.x 10.2.40.x 10.3.20.x 10.4.100.x 10.4.100.x 10.3.20.x 10.4.x 10.3.x ER 4 ER 3 10.4.100.x 10.4.100.x 10.3.20.x 10.4.x 10.3.x 10.4.100.x ER 4 ER 3 10.4.x ER 4 10.4.x 10.3.x 10.4.100.x ER 4 ER 3 10.4.x 10.4.100.x ER 4 10.4.x ER 4 10.4.x ER 4

L3VS Logical View L3VS Logical View 10.1.x Dektop 1 IP/MPLS netwok 3 Dektop 10.3.x 10.2.x Dektop 2 4 Dektop 10.4.x Fo end ue of a client, they ee the VM in data cente a if Fo end ue of a client, they ee the VM in data cente a if

Next Step! A thi daft get longe, it may need to be A thi daft get longe, it may need to be boken into two epaate daft: equiement daft! Welcome and famewok feedback daft and olution development Welcome feedback coopeation and olution development Still looking coopeation fo a WG fo the pogeion of Still looking fo a WG fo the pogeion of