1 / 30

Business Values of Virtualization

2 nd SG 13 Regional Workshop for Africa on “Future Networks: Cloud Computing, Energy Saving, Security & Virtualization” (Tunis, Tunisia, 28 April 2014). Business Values of Virtualization. Mounir Ferjani, Senior Product Manager, Huawei Technologies mounir.ferjani@huawei.com.

moswalt
Download Presentation

Business Values of Virtualization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2nd SG 13 Regional Workshop for Africa on“Future Networks: Cloud Computing, Energy Saving, Security & Virtualization” (Tunis, Tunisia, 28 April 2014) Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies mounir.ferjani@huawei.com

  2. Wave of Digital Society

  3. Over the past 200 years …… Nikolai Dimitrievic KondratievLong Wave Theory 1790 • Steam engine • Cotton 1840 1890 • Steel • Railway 1940 • Electricity • Chemicals • Oil • Automobile 1990 Information technology

  4. Over the past 20 years …… Connected World Ever-changing life and work • 6.5B mobile users • 2.7B Internet users • 502EB(1018) traffic • 2.4ZB(1021) Data

  5. Digital world and smart world…… • Deep integration of digital and physical worlds. • The physical world will be expressed through data models. • The integration will make the worldmore intelligent.

  6. Wave of virtualization

  7. Virtualization • Virtualization, refers to the act of creating a virtual (rather than actual) version of something. • Virtualization is the simulation of the software and/or hardware upon which other software runs. • NIST SP 800-125

  8. Virtualization Stack • Network • Storage • OS • Applications • Desktop virtualization • Virtualization helps implement Cloud Computing

  9. Network virtualization • Virtualize one hardware network equipment into many virtual network equipments • Virtualize many hardware into one virtual network equipment (consolidate) • Layer 2&3 technologies

  10. External/internal network virtualization

  11. Network virtualization benefits • Improve network resource usage • Internal : traffic between VMs through vNICs • External : many networks without the need to build many physical • Improve security : isolate traffic based on groups : e.g. isolate depts

  12. What is storage virtualization • Making abstraction separating : • Host implementation (application, OS) • Network implementation (switch, router, gateway) • Storage implementation (array, library, device) • Make invisible to host : physical pathing, device characteristics, physical data location • Location and implementation transparency

  13. Storage virtualization stack SNIA storage stack

  14. Storage virtualization benefits • Increase storage asset utilization • Reduce power / cooling costs • Reduce management complexity • Openness to server, network and storage technology • Reduce down time • Dynamic provisioning (elastic cloud, on demand) • Increase scalability

  15. OS virtualization • NIST definition : Full virtualization • Virtualization is the simulation of the software and/or hardware upon which other software runs. • NIST SP 800-125 • Each OS appears to have : CPU, memory, storage (hard disk, USB, CD-ROM,…storage controller, Ethernet controller, display and sound, keyboard and mouse, parallel ports, …

  16. Types of OS virtualization • NIST SP 800-125

  17. Benefits of OS virtualization • Consolidation : reduce CAPEX • Efficiency : Rise hardware usage • Flexibility : reduce management and OPEX costs • Security : Isolation prevent : • Avoid crash • DDOS attacks • Side channel Attacks • Weakness : hypervisor is SPOF if compromised all is down.

  18. Traditional desktop infrastructure: hard to maintain, can not guarantee security and lacks mobility. Dispersed deployment and maintenance, local storage • Complex O&M X Configuration file Application X X OS Hardware • Security risk • Difficult to service

  19. Desktop Cloud solution Data storage center Security management center Application delivery center User interface (UI) is transmitted to terminal devices by using remote protocols, such as ICA, RDP, or PCoIP. Desktop delivery center Huawei desktop cloud platform Configuration file Application • Creates a reliable and scalable shared resource pool to perform unified management. • Decouples hardware from the OS to perform central delivery. • Decouples applications from the OS to perform central delivery. • Decouples data from the OS to perform central storage. • Creates multi-level security systems to perform distributed security control. OS Hardware User equipment only includes a keyboard, a mouse and a monitor

  20. Application virtualization • Application virtualization layer to run specific software (layer replaces the run time environment) • Separate applications from OS • The container will ensure OS security • allows applications to run in environments that do not suit the native application: e.g. Wine allows some Microsoft Windows applications to run on Linux.

  21. Virtualization technology facilitates the implementation of cloud computing

  22. Cloud computing • Model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction • NIST SP-500-291

  23. Characteristics On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service

  24. Cloud Ecosystem/actors

  25. Cloud Cost model Traditional licensing associated with ownership, number of users, support, and maintenance costs and services are being challenged by the pay-as-you-go model found in on-demand Cloud Computing

  26. Capacity management

  27. ROI/Cost saving Opengroup

  28. Rapid provisioning : TTM impact on ROI Opengroup

  29. Increase Margin Opengroup

  30. Thanks

More Related