SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
F5 White Paper




VMware DRS: Why You Still Need
Assured Application Delivery and
Application Delivery Networking
VMware Infrastructure products provide the next generation
virtual platform for the new data center, but they don’t
virtualize the network or application delivery. F5 BIG-IP LTM
works with VMware to provide truly virtualized Application
Delivery Networking.

by Alan Murphy
Technical Marketing Manager, Virtualization
White Paper
VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking




Contents
Virtual Machine Mobility                                                                   3

Elastic Data Center Limitations—Scaling the Cloud                                          4
  DRS—Where’s the Network?                                                                 4

       Network Virtualization                                                              5

       Application Awareness                                                               5

       Resource Offloading                                                                 6

       Connection Management                                                               6


Conclusion                                                                                 7




                                                                                                  2
White Paper
VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking




Virtual Machine Mobility
Virtual Operating Systems, or virtual machines (VMs) as we’ve come to know
them, started out as isolated containers forced to run on individual physical
machines. These physical machines were usually desktop devices, and virtual
machines enabled desktop users to run multiple operating systems locally. This
was a great technology for trying out different operating systems, testing new
deployments, and even adhering to corporate IT policy while running another OS.
These technologies were limited in data center adoption, however, due to their
explicit requirement of VM location. Once installed and running on a particular
physical machine, a VM had to stay on that machine unless it was powered down
and manually moved to another physical machine and spun back up. And due
to their resource consumption, running many virtual machines on one physical
machine in the data center didn’t scale as well as expected. Ultimately, this
became more expensive to support and deploy than it saved in capital costs.

Fast forward five years and the virtual machine landscape is quite a bit different
and much more advanced. Products were developed and released—such as
VMware ESX and VirtualCenter—that have moved virtual machines from the
desktop to the data center and decoupled the physical requirement of running
a virtual machine and virtual disk (VMDK) on singular physical hardware. In
addition, it is now the standard to physically separate and remove the computing
portion of the virtual machine (CPU, RAM, I/O) from the virtual disk image; the
running machine is hosted on a standard server while the virtual disk is stored
on some type of shared storage and delivered as needed to the virtual machine
via the storage network. Due to these architectural changes it is now possible,
and extremely easy, to move running virtual machines between hosts without
worrying about the physical disk image or losing state information. Further
advances in VM mobility technology enable the same migration to occur with
the virtual disk without impacting the running instance of the image. A VMDK
file can be moved from one storage disk to another while the virtual machine
continues to run uninterrupted on a single host. VMware has led the virtual pack
in bringing products to market that facilitate and manage virtual infrastructure
migration, however these products focus solely on virtual machines and disks.
Like many other virtualization technologies in the data center they remain in silos,
ignoring issues such as the network and end-user experience.




                                                                                                  3
White Paper
VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking




Elastic Data Center Limitations—
Scaling the Cloud
By creating a near-complete replica of the physical data center on top of
virtual platforms, VMware has revolutionized the role of virtualization in the data
center and opened the door for what many people are calling the New Data
Center. Like all revolutionary changes though, VMware does expose some major
limitations in how virtualization is managed with other technologies in the
data center.


DRS—Where’s the Network?
One of the critical feature functions lacking from VMware products such as
DRS and HA is factoring in network-based information as part of resource-scaling
decisions. As DRS and HA monitor VM performance across multiple hosts, they
are only monitoring what are known as computing resources: CPU and RAM.
These two factors are influenced by the guests on each ESX host in the form
of running processes, I/O tasks, disk access, and other virtual machine resource
requests on the same host. Since networking is not a computing resource,
DRS doesn’t consider host or VM network resource information when deciding
where and when to move a VM with VMotion. Networking constraints are not
classified as computing resource shortages.

For example, a VM on one ESX host may consume too many CPU cycles by
terminating and managing SSL connections for a secure web application. DRS
will correctly detect this CPU resource spike and relocate the SSL-processing VM
guest to a new host, one that is using fewer CPU resources for its other running
guests. Although other guests on the destination host may be using less CPU
and RAM, those VMs could be handling and managing thousands of network
connections and saturating the vSwitch, virtual network, and virtual ports on
that host. Network saturation and load aren’t factors in VMware’s resource
calculations; DRS will drop a VM running the SSL web app on a host that has no
available networking resources to give to that guest. In this example, DRS has
moved a CPU and network-heavy VM from one ESX host to another, ultimately
taking away resources from the migrated VM rather than freeing up resources.

The key to solving this type of problem is to factor in network information
along with CPU and RAM usage. Application servers need both computing
and networking resources whether they are physical or virtual machines. The

                                                                                                  4
White Paper
VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking




combination of CPU, RAM, and network resources are critical even though
they aren’t always interdependent. It’s important to discretely monitor each
of these components as part of an Application Delivery Network. By integrating
networking knowledge and specific data on how applications are running
across the network, BIG-IP® Local Traffic Manager™ (LTM) alleviates many of
the network challenges virtualization administrators face by implementing DRS
and HA alone.


Network Virtualization

BIG-IP LTM virtualizes the network for products such as ESX, DRS, and HA; all
application networking data sent to and from virtual machines passes through
BIG-IP LTM. Key metrics for network utilization, such as bandwidth utilization,
latency, connections, application availability, and so on, are managed by BIG-IP
LTM for every pool member and Virtual Server. This information is published
via iControl®—the F5 SOAP-based API—and SNMP and can be consumed by
VirtualCenter in order to make intelligent decisions based on network information.
VirtualCenter can instruct DRS to move an image to a host with the least amount
of network load, based on the amount of network traffic data to each guest
running on that host, as well as CPU and RAM load. If new images are needed to
mediate resource constraints on existing VMs, these images can be dynamically
added as BIG-IP LTM pool members once they are spun up by VirtualCenter and
are available on the network.


Application Awareness

One of the most important data center components is mostly ignored by OS
virtualization and VMware products: applications. Most virtual infrastructure
technologies are designed for just that, infrastructure; yet applications running on
virtual machines are at the mercy of the newly virtualized infrastructure. The F5
BIG-IP platform focuses on the application and how those apps are running on the
network through the data center. When placed in front of application servers running
on virtual machines, BIG-IP LTM can manage connections, traffic to individual VM
applications, and also load balance as resources become constrained. As DRS and
HA move images around the virtual platform infrastructure, BIG-IP LTM proxies
those connections as they’re coming in, allowing DRS/HA to move the image to a
new host without losing application data or connection state information. Even if
the machine is unable to handle new connections due to CPU or RAM issues,




                                                                                                  5
White Paper
VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking




BIG-IP LTM will divert connections to another virtual machine as necessary, making
a network remediation based on computing scarcity. BIG-IP LTM can also provide
application-specific health status to VirtualCenter as part of the overall network
status, providing the same level of security, optimization, and availability provided
for physical machines.


Resource Offloading

Once machines are moved from physical to virtual environments, any new resource
constraints tend to have an immediate impact on applications running on the virtual
machines. For example a single ESX host may be hosting 20 virtual machines, each
running SSL-enabled web applications that need to all share CPU cycles to terminate
those SSL connections. By offloading key network services, such as terminating
SSL at the edge or by implementing intelligent caching and compression, BIG-IP
LTM can take some of the application processing needs off of the virtual machine,
host CPU, and RAM, and provide more processing power for the applications.
If more resources are offloaded from the virtual machines and their running
applications, there is less need for tools like DRS to manage the individual guests
and hosts because there are fewer resource droughts. Processes such as caching
and compression can be moved off of the virtual machine applications and on to
BIG-IP LTM, allowing the virtual servers to serve new content as needed rather than
spinning cycles and flooding the virtual network with redundant and bloated data.


Connection Management

When DRS or HA migrates a machine with VMotion, only Layer 2 information,
such as the MAC address and port assignment, is moved with the virtual image
from one virtual switch to another; this allows new network connections and
application requests to find the relocated guest on the new ESX host and vSwitch.
Connections that are application-specific, however—such as SSL persistence,
host-based connection management, shopping cart data, or any process that
depends on the state of the connection to the application server—could be lost
in the VMotion migration. No Layer 3 (IP addresses), Layer 4 (protocol and
port), or Layer 7 (application) data is migrated with the VM. BIG-IP LTM proxies
connection data across all networking layers for applications running on virtual
BIG-IP LTM machines. As new application connections are managed by BIG-IP
LTM, it will verify that the application is running and available on a particular
VM pool member. During a VMotion migration, the VM being moved will not be
available as a pool member; BIG-IP LTM will direct connections to one of the


                                                                                                  6
White Paper
Accelerating Data Replication with F5 WANJet and Hitachi TrueCopy/A and Universal Replicator




other available pool members. BIG-IP LTM will also manage stateful connections
for the migrated machine and proxy those until the particular image is available
again as a pool member. If a user passes shopping cart information to an
application running on a VM and that VM is migrated to another ESX host,
vSwitch by DRS, and VMotion, BIG-IP LTM will store that information until the
host comes back online—with no noticeable impact to the user’s session.



Conclusion
Just like physical data centers, Virtual Data Center platform products, such as
VMware ESX, DRS, HA, and VMotion, are implemented to run applications. Yet
these new platform technologies focus on virtualizing the infrastructure hosting
the applications; for the most part, these products aren’t concerned with the
applications themselves. Just like a standard L2 switch doesn’t care what IP
addresses are flowing through each port, virtual platform products don’t care
what applications are running on the virtual machine guests. In order to fully take
advantage of these new technologies, application delivery availability still needs
to be the ultimate goal and focal point for these new data centers. Utilizing an
Application Delivery Controller such as BIG-IP LTM for network and application
server virtualization provides the missing component to the Virtual Data Center:
virtual network infrastructure. When coupled with VMware’s data center platform
tools, BIG-IP LTM provides application networking security, optimization, and
availability for the virtualized infrastructure. These tools work together to create
the next-generation data center and enable a true Virtual Data Center to be fluid,
mobile, and have limitless growth.




F5 Networks, Inc.                      F5 Networks                     F5 Networks Ltd.                          F5 Networks
Corporate Headquarters                 Asia-Pacific                    Europe/Middle-East/Africa                 Japan K.K.
401 Elliott Avenue West                +65-6533-6103 Phone             +44 (0) 1932 582 000 Phone                +81-3-5114-3200 Phone
Seattle, WA 98119                      +65-6533-6106 Fax               +44 (0) 1932 582 001 Fax                  +81-3-5114-3201 Fax
+1-206-272-5555 Phone                  info.asia@f5.com                emeainfo@f5.com                           info@f5networks.co.jp
(888) 88BIGIP Toll-free
+1-206-272-5556 Fax
www.f5.com
info@f5.com




VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking 08/08
© 2008 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, VIPRION, FirePass, and iControl are trademarks or registered trademarks of F5 Networks, Inc. in the U.S.
and in certain other countries.                                                                                                                                                                7

Mais conteúdo relacionado

Mais procurados

Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVishal Deshpande
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3Fas (Feisal) Mosleh
 
Citrix meanings
Citrix meaningsCitrix meanings
Citrix meaningspfunk1
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld
 
E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overviewNuno Alves
 
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
Citrix Synergy 2014 - Syn110  Transform IT with CloudCitrix Synergy 2014 - Syn110  Transform IT with Cloud
Citrix Synergy 2014 - Syn110 Transform IT with CloudCitrix
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computingAkhil Raj
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08gueste9924aa
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingAhmed Mekkawy
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetDavid J Rosenthal
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessCitrix
 
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7Principled Technologies
 

Mais procurados (20)

Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmp
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3
 
Citrix meanings
Citrix meaningsCitrix meanings
Citrix meanings
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101
 
E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overview
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
Citrix Synergy 2014 - Syn110  Transform IT with CloudCitrix Synergy 2014 - Syn110  Transform IT with Cloud
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computing
 
Cisco & VMware Products & Services as of Nov 23, 08
Cisco & VMware Products & Services as of  Nov 23, 08Cisco & VMware Products & Services as of  Nov 23, 08
Cisco & VMware Products & Services as of Nov 23, 08
 
Mid term report
Mid term reportMid term report
Mid term report
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud Compting
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote access
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Destaque

VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...
VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...
VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...VMworld
 
Vsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guideVsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guideSree Harsha Boyapati
 
VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014csharney
 
Esxi troubleshooting
Esxi troubleshootingEsxi troubleshooting
Esxi troubleshootingOvi Chis
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWaresgurnam73
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshootingglbsolutions
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingVMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingDan Brinkmann
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5Vepsun Technologies
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4Vepsun Technologies
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overviewsolarisyougood
 
VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6Vepsun Technologies
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewESXLab
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareDuncan Epping
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014David Davis
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3VMware
 

Destaque (20)

V sphere drs
V sphere drsV sphere drs
V sphere drs
 
VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...
VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...
VMworld 2013: Storage DRS: Deep Dive and Best Practices to Suit Your Storage ...
 
Vsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guideVsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guide
 
VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014
 
Esxi troubleshooting
Esxi troubleshootingEsxi troubleshooting
Esxi troubleshooting
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWare
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshooting
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingVMware vSphere Performance Troubleshooting
VMware vSphere Performance Troubleshooting
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overview
 
VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 

Semelhante a VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking

Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmwareWilson Erique
 
Automating virtual workload mobility with IBM Vmready
Automating virtual workload mobility with IBM VmreadyAutomating virtual workload mobility with IBM Vmready
Automating virtual workload mobility with IBM VmreadyIBM India Smarter Computing
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5Joe Kaluza
 
V fabricoverveiw telkom
V fabricoverveiw telkomV fabricoverveiw telkom
V fabricoverveiw telkomAbdul Zaelani
 
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...Server Virtualization and Cloud Computing: Four Hidden Impacts on ...
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...webhostingguy
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centersHarshitTaneja13
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukAssespro Nacional
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
Cloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxCloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxmonicafrancis71118
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxZarwashgulrez
 

Semelhante a VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking (20)

Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
Automating virtual workload mobility with IBM Vmready
Automating virtual workload mobility with IBM VmreadyAutomating virtual workload mobility with IBM Vmready
Automating virtual workload mobility with IBM Vmready
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5
 
V fabricoverveiw telkom
V fabricoverveiw telkomV fabricoverveiw telkom
V fabricoverveiw telkom
 
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...Server Virtualization and Cloud Computing: Four Hidden Impacts on ...
Server Virtualization and Cloud Computing: Four Hidden Impacts on ...
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centers
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
VMworld 2013: Case Study: VMware vCloud Ecosystem Framework for Network and S...
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Cloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxCloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docx
 
brocade-virtual-adx-ds
brocade-virtual-adx-dsbrocade-virtual-adx-ds
brocade-virtual-adx-ds
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 

Mais de FindWhitePapers

The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...FindWhitePapers
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application DeliveryFindWhitePapers
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksFindWhitePapers
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...FindWhitePapers
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsFindWhitePapers
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceFindWhitePapers
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementFindWhitePapers
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseFindWhitePapers
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsFindWhitePapers
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesFindWhitePapers
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...FindWhitePapers
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...FindWhitePapers
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachFindWhitePapers
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchFindWhitePapers
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...FindWhitePapers
 

Mais de FindWhitePapers (20)

The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application Delivery
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business Intelligence
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean Enterprise
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing Operations
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and Opportunities
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step Approach
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor Research
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
 

Último

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Último (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking

  • 1. F5 White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking VMware Infrastructure products provide the next generation virtual platform for the new data center, but they don’t virtualize the network or application delivery. F5 BIG-IP LTM works with VMware to provide truly virtualized Application Delivery Networking. by Alan Murphy Technical Marketing Manager, Virtualization
  • 2. White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking Contents Virtual Machine Mobility 3 Elastic Data Center Limitations—Scaling the Cloud 4 DRS—Where’s the Network? 4 Network Virtualization 5 Application Awareness 5 Resource Offloading 6 Connection Management 6 Conclusion 7 2
  • 3. White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking Virtual Machine Mobility Virtual Operating Systems, or virtual machines (VMs) as we’ve come to know them, started out as isolated containers forced to run on individual physical machines. These physical machines were usually desktop devices, and virtual machines enabled desktop users to run multiple operating systems locally. This was a great technology for trying out different operating systems, testing new deployments, and even adhering to corporate IT policy while running another OS. These technologies were limited in data center adoption, however, due to their explicit requirement of VM location. Once installed and running on a particular physical machine, a VM had to stay on that machine unless it was powered down and manually moved to another physical machine and spun back up. And due to their resource consumption, running many virtual machines on one physical machine in the data center didn’t scale as well as expected. Ultimately, this became more expensive to support and deploy than it saved in capital costs. Fast forward five years and the virtual machine landscape is quite a bit different and much more advanced. Products were developed and released—such as VMware ESX and VirtualCenter—that have moved virtual machines from the desktop to the data center and decoupled the physical requirement of running a virtual machine and virtual disk (VMDK) on singular physical hardware. In addition, it is now the standard to physically separate and remove the computing portion of the virtual machine (CPU, RAM, I/O) from the virtual disk image; the running machine is hosted on a standard server while the virtual disk is stored on some type of shared storage and delivered as needed to the virtual machine via the storage network. Due to these architectural changes it is now possible, and extremely easy, to move running virtual machines between hosts without worrying about the physical disk image or losing state information. Further advances in VM mobility technology enable the same migration to occur with the virtual disk without impacting the running instance of the image. A VMDK file can be moved from one storage disk to another while the virtual machine continues to run uninterrupted on a single host. VMware has led the virtual pack in bringing products to market that facilitate and manage virtual infrastructure migration, however these products focus solely on virtual machines and disks. Like many other virtualization technologies in the data center they remain in silos, ignoring issues such as the network and end-user experience. 3
  • 4. White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking Elastic Data Center Limitations— Scaling the Cloud By creating a near-complete replica of the physical data center on top of virtual platforms, VMware has revolutionized the role of virtualization in the data center and opened the door for what many people are calling the New Data Center. Like all revolutionary changes though, VMware does expose some major limitations in how virtualization is managed with other technologies in the data center. DRS—Where’s the Network? One of the critical feature functions lacking from VMware products such as DRS and HA is factoring in network-based information as part of resource-scaling decisions. As DRS and HA monitor VM performance across multiple hosts, they are only monitoring what are known as computing resources: CPU and RAM. These two factors are influenced by the guests on each ESX host in the form of running processes, I/O tasks, disk access, and other virtual machine resource requests on the same host. Since networking is not a computing resource, DRS doesn’t consider host or VM network resource information when deciding where and when to move a VM with VMotion. Networking constraints are not classified as computing resource shortages. For example, a VM on one ESX host may consume too many CPU cycles by terminating and managing SSL connections for a secure web application. DRS will correctly detect this CPU resource spike and relocate the SSL-processing VM guest to a new host, one that is using fewer CPU resources for its other running guests. Although other guests on the destination host may be using less CPU and RAM, those VMs could be handling and managing thousands of network connections and saturating the vSwitch, virtual network, and virtual ports on that host. Network saturation and load aren’t factors in VMware’s resource calculations; DRS will drop a VM running the SSL web app on a host that has no available networking resources to give to that guest. In this example, DRS has moved a CPU and network-heavy VM from one ESX host to another, ultimately taking away resources from the migrated VM rather than freeing up resources. The key to solving this type of problem is to factor in network information along with CPU and RAM usage. Application servers need both computing and networking resources whether they are physical or virtual machines. The 4
  • 5. White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking combination of CPU, RAM, and network resources are critical even though they aren’t always interdependent. It’s important to discretely monitor each of these components as part of an Application Delivery Network. By integrating networking knowledge and specific data on how applications are running across the network, BIG-IP® Local Traffic Manager™ (LTM) alleviates many of the network challenges virtualization administrators face by implementing DRS and HA alone. Network Virtualization BIG-IP LTM virtualizes the network for products such as ESX, DRS, and HA; all application networking data sent to and from virtual machines passes through BIG-IP LTM. Key metrics for network utilization, such as bandwidth utilization, latency, connections, application availability, and so on, are managed by BIG-IP LTM for every pool member and Virtual Server. This information is published via iControl®—the F5 SOAP-based API—and SNMP and can be consumed by VirtualCenter in order to make intelligent decisions based on network information. VirtualCenter can instruct DRS to move an image to a host with the least amount of network load, based on the amount of network traffic data to each guest running on that host, as well as CPU and RAM load. If new images are needed to mediate resource constraints on existing VMs, these images can be dynamically added as BIG-IP LTM pool members once they are spun up by VirtualCenter and are available on the network. Application Awareness One of the most important data center components is mostly ignored by OS virtualization and VMware products: applications. Most virtual infrastructure technologies are designed for just that, infrastructure; yet applications running on virtual machines are at the mercy of the newly virtualized infrastructure. The F5 BIG-IP platform focuses on the application and how those apps are running on the network through the data center. When placed in front of application servers running on virtual machines, BIG-IP LTM can manage connections, traffic to individual VM applications, and also load balance as resources become constrained. As DRS and HA move images around the virtual platform infrastructure, BIG-IP LTM proxies those connections as they’re coming in, allowing DRS/HA to move the image to a new host without losing application data or connection state information. Even if the machine is unable to handle new connections due to CPU or RAM issues, 5
  • 6. White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking BIG-IP LTM will divert connections to another virtual machine as necessary, making a network remediation based on computing scarcity. BIG-IP LTM can also provide application-specific health status to VirtualCenter as part of the overall network status, providing the same level of security, optimization, and availability provided for physical machines. Resource Offloading Once machines are moved from physical to virtual environments, any new resource constraints tend to have an immediate impact on applications running on the virtual machines. For example a single ESX host may be hosting 20 virtual machines, each running SSL-enabled web applications that need to all share CPU cycles to terminate those SSL connections. By offloading key network services, such as terminating SSL at the edge or by implementing intelligent caching and compression, BIG-IP LTM can take some of the application processing needs off of the virtual machine, host CPU, and RAM, and provide more processing power for the applications. If more resources are offloaded from the virtual machines and their running applications, there is less need for tools like DRS to manage the individual guests and hosts because there are fewer resource droughts. Processes such as caching and compression can be moved off of the virtual machine applications and on to BIG-IP LTM, allowing the virtual servers to serve new content as needed rather than spinning cycles and flooding the virtual network with redundant and bloated data. Connection Management When DRS or HA migrates a machine with VMotion, only Layer 2 information, such as the MAC address and port assignment, is moved with the virtual image from one virtual switch to another; this allows new network connections and application requests to find the relocated guest on the new ESX host and vSwitch. Connections that are application-specific, however—such as SSL persistence, host-based connection management, shopping cart data, or any process that depends on the state of the connection to the application server—could be lost in the VMotion migration. No Layer 3 (IP addresses), Layer 4 (protocol and port), or Layer 7 (application) data is migrated with the VM. BIG-IP LTM proxies connection data across all networking layers for applications running on virtual BIG-IP LTM machines. As new application connections are managed by BIG-IP LTM, it will verify that the application is running and available on a particular VM pool member. During a VMotion migration, the VM being moved will not be available as a pool member; BIG-IP LTM will direct connections to one of the 6
  • 7. White Paper Accelerating Data Replication with F5 WANJet and Hitachi TrueCopy/A and Universal Replicator other available pool members. BIG-IP LTM will also manage stateful connections for the migrated machine and proxy those until the particular image is available again as a pool member. If a user passes shopping cart information to an application running on a VM and that VM is migrated to another ESX host, vSwitch by DRS, and VMotion, BIG-IP LTM will store that information until the host comes back online—with no noticeable impact to the user’s session. Conclusion Just like physical data centers, Virtual Data Center platform products, such as VMware ESX, DRS, HA, and VMotion, are implemented to run applications. Yet these new platform technologies focus on virtualizing the infrastructure hosting the applications; for the most part, these products aren’t concerned with the applications themselves. Just like a standard L2 switch doesn’t care what IP addresses are flowing through each port, virtual platform products don’t care what applications are running on the virtual machine guests. In order to fully take advantage of these new technologies, application delivery availability still needs to be the ultimate goal and focal point for these new data centers. Utilizing an Application Delivery Controller such as BIG-IP LTM for network and application server virtualization provides the missing component to the Virtual Data Center: virtual network infrastructure. When coupled with VMware’s data center platform tools, BIG-IP LTM provides application networking security, optimization, and availability for the virtualized infrastructure. These tools work together to create the next-generation data center and enable a true Virtual Data Center to be fluid, mobile, and have limitless growth. F5 Networks, Inc. F5 Networks F5 Networks Ltd. F5 Networks Corporate Headquarters Asia-Pacific Europe/Middle-East/Africa Japan K.K. 401 Elliott Avenue West +65-6533-6103 Phone +44 (0) 1932 582 000 Phone +81-3-5114-3200 Phone Seattle, WA 98119 +65-6533-6106 Fax +44 (0) 1932 582 001 Fax +81-3-5114-3201 Fax +1-206-272-5555 Phone info.asia@f5.com emeainfo@f5.com info@f5networks.co.jp (888) 88BIGIP Toll-free +1-206-272-5556 Fax www.f5.com info@f5.com VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking 08/08 © 2008 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, VIPRION, FirePass, and iControl are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. 7