Instructor Materials Chapter 7: Network Evolution

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
SDN and Openflow.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Chapter 1: Hierarchical Network Design
Effectively Explaining the Cloud to Your Colleagues.
3 Cloud Computing.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Introduction to Cloud Computing
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
VMware vSphere Configuration and Management v6
Cloud Strategy made Simple David G. Fletcher. 2 Hybrid Cloud Approach Utah is building a private cloud to provision services from its virtualized infrastructure.
FirewallPK Security tool for centralized Access Control List Management th RoEduNet International Conference - Networking in Education and Research.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
SDN and Beyond Ghufran Baig Mubashir Adnan Qureshi.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Designing Cisco Data Center Unified Fabric
Clouding with Microsoft Azure
Chapter 1: Explore the Network
REMOTE MANAGEMENT OF SYSTEM
Network customization
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
SDN challenges Deployment challenges
Chapter 6: Securing the Cloud
Instructor Materials Chapter 1: LAN Design
Understanding The Cloud
Organizations Are Embracing New Opportunities
IOT Critical Impact on DC Design
Prepared by: Assistant prof. Aslamzai
What is Cloud Computing - How cloud computing help your Business?
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Living in a Network Centric World
Living in a Network Centric World
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 21: Cloud Computing and Related Security Issues
Oracle Solaris Zones Study Purpose Only
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Replace with Application Image
In-Class Activity… Cloud Computing.
Indigo Doyoung Lee Dept. of CSE, POSTECH
Managing Clouds with VMM
CS 31006: Computer Networks – The Routers
Chapter 7: Network Evolution
Software Defined Networking (SDN)
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Data Security for Microsoft Azure
Living in a Network Centric World
3 Cloud Computing.
Cloud computing mechanisms
WIS Strategy – WIS 2.0 Submitted by: Matteo Dell’Acqua(CBS) (Doc 5b)
Living in a Network Centric World
"Cloud services" - what it is.
Living in a Network Centric World
Living in a Network Centric World
Cloud-Enabling Technology
Cloud Computing: Concepts
Network Architecture By Dr. Shadi Masadeh 1.
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Living in a Network Centric World
Presentation transcript:

Instructor Materials Chapter 7: Network Evolution Cisco Networking Academy Program Connecting Networks Chapter 7: Network Evolution CCNA Routing and Switching Connecting Networks

Chapter 7 - Sections & Objectives 7.1 Internet of Things Explain the value of the Internet of Things. 7.2 Cloud and Virtualization Explain why cloud computing and virtualization are necessary for evolving networks. 7.3 Network Programming Explain why network programmability is necessary for evolving networks. 2

7.1 Internet of Things Cisco Networking Academy Program Connecting Networks Chapter 7: Network Evolution

Internet of Things IoT Elements Cisco estimates that 50 billion things will be connected to the Internet by 2020. 99% of things are currently unconnected. Dissimilar networks are converging to share the same infrastructure. 7.1 - Internet of Things 7.1.1 – The Cisco IoT System

Internet of Things IoT Elements The challenge for IoT is to securely integrate millions of new things from multiple vendors into existing networks. The Cisco IoT System provides an infrastructure designed to manage large scale systems of very different endpoints and platforms, and the huge amount of data that they create. 7.1 - Internet of Things 7.1.1 – The Cisco IoT System

Internet of Things IoT Pillars Network Connectivity identifies devices that can be used to provide IoT connectivity to many diverse industries and applications. Fog Computing enables edge devices to run applications locally and make immediate decisions. Security offers scalable cybersecurity solutions, enabling an organization to quickly and effectively discover, contain, and remediate an attack to minimize damage. Data Analytics consists of distributed network infrastructure components and IoT-specific, application programming interfaces (APIs). Management and Automation products can be customized for specific industries to provide enhanced security and control and support. Application and Enablement provides the infrastructure for application hosting and application mobility between cloud and Fog computing. 7.1 – Internet of Things 7.1.2 – IoT Pillars

7.2 Cloud and Virtualization Cisco Networking Academy Program Connecting Networks Chapter 7: Network Evolution

Cloud and Virtualization Cloud Computing Cloud computing involves large numbers of computers connected through a network that can be physically located anywhere. The three main cloud computing services are: Software as a Service (SaaS): Applications delivered over the web to the end users. Platform as a Service (PaaS): Tools and services used to deliver the applications. Infrastructure as a Service (IaaS): Hardware and software to power servers, storage, networks and operating systems. Cloud service providers now also offer Information Technology as a Service (ITaaS) which allows customers to extend the capability of IT without requiring investment in new infrastructure, training new personnel, or licensing new software. 7.2 – Cloud and Virtualization 7.2.1 - Cloud Computing

Cloud and Virtualization Cloud Computing The four primary cloud models are: Public clouds made available to the general population and uses the Internet to provide services. Private clouds are intended for a specific organization or entity, such as the government and is often managed by an outside organization with strict access security. Hybrid clouds: A hybrid cloud is made up of two or more cloud models. Access to various services is based on user access rights. Community clouds: A community cloud is created for exclusive use by a specific community, such as healthcare organizations, that have special authentication and confidentiality requirements. 7.2 – Cloud and Virtualization 7.2.1 - Cloud Computing

Cloud and Virtualization Virtualization Virtualization separates the OS from the hardware allowing multiple operating systems to exist on a single hardware platform. The hypervisor adds an abstraction layer on top of the real physical hardware used to create virtual machines which have access to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs. Virtualization advantages include: Faster server provisioning  Increased server uptime  Improved disaster recovery  Legacy support  Less equipment is required Less energy is consumed Less space is required Easier prototyping  7.2 – Cloud and Virtualization 7.2.2 - Virtualization

Cloud and Virtualization Virtualization Virtualization separates the OS from the hardware allowing multiple operating systems to exist on a single hardware platform. The hypervisor adds an abstraction layer on top of the real physical hardware used to create virtual machines which have access to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs. Virtualization advantages include: 7.2 – Cloud and Virtualization 7.2.2 - Virtualization

Cloud and Virtualization Virtual Network Infrastructure There are two approaches to installing a Hypervisor: Type 1 “Bare Metal” approach in which the hypervisor is installed directly on the hardware. Type 2 “Hosted” approach in which the hypervisor is installed on top of an existing operating system. 7.2 – Cloud and Virtualization 7.2.3 - Virtual Network Infrastructure

Cloud and Virtualization Virtual Network Infrastructure Type 1 Hypervisors use a management console that can be used to automatically move, consolidate, and power on and off servers as required. 7.2 – Cloud and Virtualization 7.2.3 - Virtual Network Infrastructure

7.3 Network Programming Cisco Networking Academy Program Connecting Networks Chapter 7: Network Evolution

Network Programming Software-Defined Networking A network device contains the following planes: Control plane - Uses CPU process to calculate Layer 2 and Layer 3 route forwarding information. Data plane - Forwards traffic flows using a data plane processor, such as a digital signal processor (DSP), without the CPU getting involved. SDN virtualizes the network, removing the control plane function from each device and performing it on a centralized controller. 7.3 – Network Programming 7.3.1 - Software-Defined Networking

Network Programming Software-Defined Networking The SDN framework uses northbound APIs to communicate with upstream applications and southbound APIs to define the behavior of downstream routers and switches. 7.3 – Network Programming 7.3.1 - Software-Defined Networking

Network Programming Controllers The SDN controller defines the data flows that occur in the SDN Data Plane. Using the OpenFlow protocol, the controller populates a series of tables implemented in hardware or firmware The following tables manage the flows of packets through the switch: Flow table - This table matches incoming packets to a particular flow and specifies the functions that are to be performed on the packets. There may be multiple flow tables that operate in a pipeline fashion. Group table - A flow table may direct a flow to a Group Table, which may trigger a variety of actions that affect one or more flows. Meter table - The table triggers a variety of performance-related actions on a flow. 7.3 – Network Programming 7.3.2 - Controllers

Network Programming Controllers Cisco developed the Application Centric Infrastructure (ACI) to automate the network, accelerate application deployments, and align IT infrastructures to better meet business requirements. These are the three core components of the ACI architecture: Application Network Profile (ANP) - a collection of end-point groups (EPG), their connections, and the policies that define those connections Application Policy Infrastructure Controller (APIC) - a centralized software controller that manages downstream switches. Cisco Nexus 9000 Series switches - provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure. The Cisco APIC - Enterprise Module (APIC-EM) extends ACI aimed at enterprise and campus deployments. 7.3 – Network Programming 7.3.2 - Controllers

Network Programming Controllers There are three basic types of SDN: Device-based SDN - Devices are programmable by applications running on the device itself or on a server in the network. Cisco OnePK is an example of a device-based SDN. Controller-based SDN - Centralized controller that has knowledge of all devices in the network. The applications can interface with the controller responsible for managing devices and manipulating traffic flows throughout the network. The Cisco Open SDN Controller is a commercial distribution of OpenDaylight. Policy-based SDN - Includes an additional Policy layer that operates at a higher level of abstraction. No programming skills are required. Cisco APIC-EM is an example of this type of SDN. 7.3 – Network Programming 7.3.2 - Controllers

Network Programming Controllers Cisco APIC-EM provides the following features: Discovery - used to populate the controller's device and host inventory database. Device Inventory - collects detailed information from devices within the network Host Inventory - collects detailed information from hosts with the network Topology - supports a graphical view of the network (topology view) Policy - ability to view and control policies across the entire network including QoS. Policy Analysis - ability to trace application specific paths between end devices to quickly identify ACLs in use and problem areas including: ACL Analysis - examines ACLs on devices, searching for redundant, conflicting, or shadowed entries. ACL Path Trace - examines specific ACLs on the path between two end nodes, displaying any potential issues. 7.3 – Network Programming 7.3.2 - Controllers

7.4 Chapter Summary Chapter 7: Network Evolution Cisco Networking Academy Program Connecting Networks Chapter 7: Network Evolution

Chapter Summary Summary The six pillars of IoT are: Network Connectivity Fog Computing Security Data Analytics Management and Automation Application Enablement Platform Cloud computing services include: Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) IT as a Service (ITaaS) Cloud models include: Public clouds Private clouds Hybrid clouds Community clouds 7.4 - Chapter Summary

Chapter Summary Summary Type 1 hypervisors are installed directly on the hardware. Type 2 hypervisors are installed on top of any existing OS. SDN is a network architecture that has been developed to virtualize the network. The SDN controller defines the data flows that occur in the SDN data plane. The three types of SDN are: Device-based SDN Controller-based SDN Policy-based SDN Policy-based SDN, such as Cisco’s APIC-EM, is the most robust, providing for a simple mechanism to control and manage policies across the entire network. One of the most important features of the APIC-EM controller is the ability to manage policies across the entire network. 7.4 - Chapter Summary