Professional Documents
Culture Documents
Data Center Virtualization PDF
Data Center Virtualization PDF
¾ Server Virtualization
¾ Back-End Virtualization
•• VLANs
VLANs atat the
the Virtual
Virtual
Machine
Machine (Hypervisor)
(Hypervisor)
level,
level, map
map to
to VLANs
VLANs atat
the
the Network
Network Switch
Switch
Layer.
Layer.
Virtual LANs Virtual LANs Virtual LANs
Virtual Svc’s Virtual Svc’s •• Virtual
Storage
StorageSvc’sLUN’s
LUN’s are
are
similarly
similarly directly
directly
mapped
mapped to to the
the VM’s
VM’s inin
the
the same
same wayway they
they
would
would mapmap to to physical
physical
Information
Access Layer Logic Layer servers.
servers. Layer
Service Chain Service Chain Service Chain
The Flexibility of Virtualization
VM’s Mobility Across Physical Server Boundaries and Keeping Services
•• VM
VM Mobility
Mobility is
is capable
capable of
of
moving
moving Virtual
Virtual Machines
Machines
Virtual SANs Virtual SANs Virtual SANs
across
across Physical
Physical Server
Server
VM
VM Mobility
Mobility •• The
The Application
Application Services
Services
provided
provided by by the
the Network
Network
need
need to
to respond
respond andand be
be
aligned to meet the
aligned to meet the newnew
geometry
geometry of of the
the VMs
VMs
VM
VM Mobility
Mobility
•• Close
Close interaction
interaction required
required
between
between thethe assets
assets
Virtual LANs Virtual LANs provisioning
Virtual LANs virtualized
provisioning virtualized
Virtual Svc’s Virtual Svc’s infrastructure
Virtual Svc’s
infrastructure and
and the
the
Application Services
Application Services
supporting
supporting thethe Virtual
Virtual
Machines.
Machines.
Information
Access Layer Logic Layer Layer
Service Chain Service Chain Service Chain
Moving to a Unified Fabric
Moving to a fully Virtualized Data Center, with Any To Any Connectivity
Unified Unified Unified
Fabric Fabric Fabric
Networking Networking Networking
•• Fully
Fully unified
unified I/O
I/O delivers
delivers the
the
following
following characteristics:
characteristics:
––Ultra
Ultra High
High Capacity
Capacity
10Gbps+
10Gbps+
––Low
Low latency
latency
––Loss
Loss Free
Free (FCoE)
(FCoE)
•• True
True “Any
“Any to
to Any”
Any”
Connectivity
Connectivity is possible
is possible as
as
Virtual SANs Virtual SANs all
all devices
SANs are
devices
Virtual are connected
connected to
to
all
all other
other
Virtual
devices.
devices.
LANs
Virtual LANs Virtual LANs
Unified Unified
Virtual Svc’s Fabric Virtual Svc’s Fabric Virtual Svc’s
Networking Networking •• We
We can
can now
now simplify
simplify
management,
management, operations
operations
and
and enhance power and
enhance power and
cooling efficiencies
cooling efficiencies
Management
Network Virtualization Building Blocks
Device Partitioning Virtualized Device Pooling
Interconnect
VDC 2
VDC 4
DC Aggregation
Nexus 7000 SAN A/B
Cisco Catalyst 6500 10GbE Agg MDS 9500
10GbE VSS Agg Cisco Catalyst Storage Core
DC Services 6500
DC Services
DC Access
FC
FC Storage
Cisco Nexus 5000 & CBS 3xxx Nexus 7000 Nexus 5000 CBS 3xxx MDS 9500
Catalyst 6500 Nexus 2000 Blade End-of-Row Rack MDS 9124e Storage
End-of-Row Rack Nexus blade (*)
10GbE
10GbE and 4/8Gb
and 4Gb FC Server
FC Server Access
Access
1GbE Server Access 10Gb FCoE Server Access
(*) future
Front-End
Virtualization
Virtual Device Contexts at Nexus 7000
VDC Architecture
Virtual Device Contexts Provides Virtualization at the Device Level Allowing
Multiple Instances of the Device to Operate on the Same Physical Switch at
the Same Time
VLAN Mgr UDLD OSPF GLBP VLAN Mgr UDLD OSPF GLBP
VLAN Mgr UDLD BGP HSRP VLAN Mgr UDLD BGP HSRP
Infrastructure
Kernel
Nexus 7000 Physical Switch
Virtual Device Contexts
VDC Fault Domain
A VDC Builds a Fault Domain Around All Running Processes Within That
VDC—Should a Fault Occur in a Running Process, It Is Truly Isolated from
Other Running Processes and They Will Not Be Impacted
Process ABC
Process ABC
Process DEF
Process DEF
Process XYZ
Process XYZ
Process DEF in VDC
… … A Is Not Affected and
Will Continue to Run
Unimpeded
Infrastructure C B D
Kernel D C A
Nexus 7000 Physical Switch
Virtual Device Contexts
VDC and Interface Allocation
32-Port
10GE
Module
Outside Inside
DC Aggregation
Nexus 7000 SAN A/B
Cisco Catalyst 6500 10GbE Agg MDS 9500
10GbE VSS Agg Cisco Catalyst Storage Core
DC Services 6500
DC Services
FC
Cisco Nexus 5000 & CBS 31xx Nexus 7000 Nexus 5000 CBS 31xx MDS 9500
Catalyst 6500 Nexus 2000 Blade End-of-Row Rack MDS 9124e Storage
End-of-Row Rack Nexus Blade (*)
LACP, PAGP, or ON
EtherChannel Modes
Are Supported
Core/Internet Core/Internet
Cisco Cisco
Catalyst Catalyst
6500 MSFC 6500 MSFC
VLAN 10
VLAN 10 VLAN 20 VLAN 30
A B C A B C
v5 v6 v7 v8
1 3 4 Firewall Module Contexts
v107 v108
v105
2 3 4
ACE Module Contexts
v206 v207 v208
VRF
“Back-End” VRFs (MSFC)
* vX = VLAN X
**BU = Business Unit
VSS with ACE and FWSM Modules
Active / Standby Pair
Switch-1 Switch-2
(VSS Active) (VSS Standby)
ACE ACE
Active Standby
FWSM FWSM
Standby active
Combining vPC with VSS for Services
• Nexus 2000 combines benefits of both ToR and EoR
architectures
¾ Physically resides on the top of each rack but
¾ Logically acts like an end of row access device
• Nexus 2000 deployment benefits
¾Reduces cable runs
¾Reduce management points
¾Ensures feature consistency across hundreds of
servers
¾Enable Nexus 5000 to become a high density 1GE
access layer switch
¾VN‐Link capabilities
Nexus 2000 (Fabric Extender - FEX)
Nexus
2000
Nexus 2000 implementation example
Servers
Rack-1 Rack-N Rack-1 Rack-N
Servers
• Example Deployment:
–16 servers per enclosure X
– 2 GE ports per server X
– 4 enclosures per rack = 128GE
– 2 x 10GE uplinks = 20GE
– 128GE / 20GE = 6.4:1 oversubscription
Cisco Catalyst Virtual Blade Switch (VBS)
with Non-vPC Aggregation
Access Layer (Virtual Blade Switch) Aggregation Layer
Single Switch /
Node (for
Spanning Tree or
Layer 3 or Spanning-Tree Blocking
Management)
Cisco Catalyst Virtual Blade Switch (VBS)
with Non-vPC Aggregation
Aggregation Layer
Single Switch /
Node (for
Spanning Tree
or Layer 3 or
Management) All Links Forwarding
Cisco Catalyst Virtual Blade Switch (VBS)
with Nexus vPC Aggregation
Aggregation Layer
(Nexus vPC)
Access Layer (Virtual Blade Switch)
VMNICS =
Uplinks
vNIC vSwitch0
VM_LUN_0007
vmnic0
VM_LUN_0005
vNIC
vmnic1
Virtual Ports
Cisco VN-Link
Hypervisor
The term literally refers to a VM specific
link that is created between the VM and
Cisco switch. It is the logical equivalent
& combination of a NIC, a Cisco switch
interface and the RJ-45 patch cable
that hooks them together. VETH VETH
VMotion
Problems:
• VMotion may move VMs across
physical ports—policy must
follow
• Impossible to view or apply
policy to locally switched traffic
• Cannot correlate traffic on
physical links—from multiple
VMs
VLAN
101
VN-Link:
• Extends network to the VM
• Consistent services
• Coordinated, coherent
management
VN-Link With the Cisco Nexus 1000V
http://www.ieee802.org/1/files/public/docs2008/new-dcb-
pelissier-NIC-Virtualization-0908.pdf
VMware
VEMvSwitch
VEM VMware
Nexus vSwitch
Nexus VEM
VEM
1000V
1000V DVS
DVS VMware vSwitch
VEM
VEM
VMW ESX
VMW ESX VMW ESX
VMW ESX VMW ESX
VMW ESX
Pools of storage
resources
Virtual Servers
FCoE CNA
Virtualization
Increases flexibility and agility
Department C
VSAN Technology
The Virtual SANs Feature Consists
of Two Primary Functions
Fibre Channel
Services for
Blue VSAN
VSAN Header Is
Fibre Channel
Removed at
Services for
Egress Point Red VSAN
• Hardware-based isolation of Cisco MDS 9000
tagged traffic belonging to Family with VSAN Trunking
Service E_Port
different VSANs (TE_Port)
• Create independent instance of Enhanced ISL (EISL)
Trunk Carries
fiber channel services for each Tagged Traffic from
newly created VSAN—services Multiple VSANs Trunking
include: E_Port
VSAN Header Is (TE_Port)
Added at Ingress
Fibre Channel
Point Indicating
Services for
Membership Blue VSAN
No Special Fibre Channel
Support Required Services for
by End Nodes Red VSAN
N-Port ID Virtualization (NPIV)
Application Server
E_Port
E_Port
FC FC FC FC
FC FC FC FC
NPV Edge
Switch
FC
NP_Port
NPIV-Enabled HBA
F_Port F_Port
Virtual Servers Share a Physical HBA
• A zone includes the physical HBA
and the storage array
• Access control is demanded to
storage array “LUN masking and
Servers
Mapping
FC
HW
pWWN-P FC
pWWN-P
FC Name Server
Virtual Server Using NPIV and
Storage Device Mapping
• Virtual HBAs can be zoned individually
• “LUN masking and mapping” is based on
the virtual HBA pWWN of each VMs
• Very safe with respect to
Servers
configuration errors
Virtual
FC FC FC FC
To pWWN-1
pWWN-1 pWWN-2 pWWN-3 pWWN-4 To pWWN-2
pWWN-P To pWWN-3
HW
pWWN-1
pWWN-P FC pWWN-2 To pWWN-4
pWWN-3
pWWN-4
Multiple Logins on a Single Point-to-Point Connection FC Name Server
VMotion LUN Migration without NPIV
Standard
HBAs
WWPN
WS-X901 6
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
STATUS
HBAs
with NPIV
WWPN1
WWPN2
WWPN3
WS-X901 6
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
STATUS
FC FC FC FC
FC FC FC FC
NPV Edge
Switch
FC
NP_Port
NPIV-Enabled HBA
F_Port F_Port
Blade Switch/Top-of-Rack
Domain ID Explosion
access control
• One domain ID per
SAN switch
• Theoretically 239 domain
ID, practically much less Theoretical
Blade Switches
supported Increase Domain
IDs, Increase
MDS
9500
Maximum: 239
Domain IDs
Fabrics per SAN
• Limits SAN fabric
scalability
Tier 1 Tier 2 Tape Farm
Cisco MDS Network Port Virtualization (NPV)
operations
• Increases fabric NPV-Enabled
Switches Do MDS
Edge Switch
Acts as a
Not Use 9500 NPIV Host
scalability Domain IDs
NPV NPV
Supports
Up to 100 Edge
Switches
PWWN is needed
pwwn2 pwwnX vpwwn1 pwwnX
Storage Volume Virtualization
Initiator Target
Initiator Target
SAN
Fabric
Virtual Virtual
Target 1 Initiator
VSAN_10 VSAN_30
Fabric
Virtual Virtual
Target 1 Initiator
VSAN_10 VSAN_30
Fabric
Thank you!
Recommended Reading