SlideShare a Scribd company logo
1 of 16
Download to read offline
A Hitchhiker’s Guide to
                     the Inter-Cloud

                                                                                          Krishna Sankar
                                                                                         ksankar@cisco.com
                                                                                                             1
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Agenda
                    A Quick Elevator Pitch
                    On Inter-Cloud

  Thanks to David Bernstein, Glenn Dasmalchi, Doug
  Gourlay, James Urquhart, …




                                                                                         2
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Data Center Evolution Path


                            Virtualization                                                            Cloud Computing


                                                                                                           Utility
             Consolidation                        Abstraction                            Automation                      Market




                                                                                                                     Inter-Cloud
                                                                                                      Private Clouds
                                                                            Unified Computing
                                    Unified Fabric
 Data Center Networking


                                                                                                                                   3
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Cisco Cloud Strategy

                    Build Right Products                                                            Technology
                                  Unified Fabric                                             Enhanced IP core with tight
                                                                                                coupling to Software
                                Unified Compute
                               Virtualization Aware




                  Multi-Phased
                                                                                                         Services/
                  Standalone Clouds
                           to
                                                                                                       Reference SW
                   Enterprise-Class
                                                                                                    Services-led Cloud blueprints
                           to
                                                                                                     Reference software stacks
                      Inter-Cloud
                                                                           Open Standards
                                                                      Accelerate Cloud deployment
                                                                         and federation through
                                                                            Cloud standards

                                                                                                                                    4
Presentation_ID     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Essential Cloud Monikers
                                         a.k.a. defining clouds without defining them


                 Elasticity
                 Multi-tenancy

SaaS                                                SaaS
  Abstraction




                                                                                               Abstraction
                                                       Inter-Cloud
                                                                                               Federation
                                                                                               Trust Boundary
                       Private
IaaS
                       Cloud
                                                                                               Ownership
                                                                                                Boundary
                                      Federation
                                                                                                                 5
     Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Cloud Adoption Phases


                                                                                          Enterprise-
           Standalone                                                                                          Inter-Cloud
                                                                                         Class Clouds
             Clouds


    External,
   Off-Premise Internal,
              On-Premise


                                       Key challenges:                                       Key challenges:
                                           Security                                            Federation
                                           SLAs                                                Portability
                                           Control                                             Market
                                                                                                                             6
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Vision—The Inter-Cloud
          Flexible Infrastructure and a New Application Platform



                                                                                         Apps Integrate Services
                   Dynamic
                                                                                          from Multiple Clouds
                   Workload
                   Migration




                               A Federation of Clouds Based on Open Standards:
                                  Naming/Discovery
                                  Trust
                                  Exchange/Peering
                                                                                                                   7
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Virtual Private Inter-Cloud / CloudBursting

                                                                                                                    1. Established Trust
                                    Internal
                                                                                     External
                                    Cloud                                                                              Relationship
                                                                                     Cloud
                                                                                                                    2. Compatible
                                                                                                                       Infrastructure
                                                                                 Multi-Tenant
                                                                                 SP Cloud



                                                                                                                           Trust Boundary
                                                                                                                               (same)
                                                                                                                                  Vs.
                                   Internal
                                                                                                                             Ownership
                                   Cloud
                                                                                                                          Boundary (may be
                                                                                                                              different)
Seamless Extension of the Enterprise DC (IaaS)
8                                                                                                                                            8
    Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc. All rights reserved.
                                                                © 2009 Cisco Confidential                        Cisco Confidential
Virtual Private Inter-Cloud / CloudBursting

           When enterprise applications can seamlessly move between their
            internal & external clouds leveraging the elasticity & multi-tenancy
            that a cloud infrastructure offers
           Extend secure data center to the cloud computing era
           In order to get a portion of the SP cloud as a „seamless extension‟
            of the enterprise data center, one also needs
                  • To migrate network context like VPN/VRF, VLAN, Load Balancing,
                    firewall/NAT, QoS and may be some port profiles (for IKV/1K/5K) and
                    configuration (for others).
           This will require a convergence of
                  • Current ideas, as well as
                  • A slice of new technologies (like LISP) at appropriate levels to tackle
                    this challenge.



                                                                                              9
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Inter-Cloud: Key Questions

           What is the “network model” ?
                  - network-based isolation for the multitenant SP cloud
                  - network abstractions for the enterprise tenants (seamless)
           What are the “network features” that differentiate?
                  - isolation (per above), QoS, monitoring, CPE linkages
           How are the network features exposed/integrated?
                  - control APIs (and underlying abstractions)
                  - cloud OS linkages
           To what extent will we support workload mobility?
                  - live migration requirement?
                  - moving workload context
                  -Dude, where is my VM ?
                                                                                         10
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Inter-Cloud In A Nutshell
                                   Virtualized                                               Enterprise-
                                                                                                                    Inter-Cloud
                                  Data Centers                                              Class Clouds




                                                                                                                 Application APIs
                                                                                         Application APIs

                                                                                                                  Integration Services
                                                                                          Compute Services
                                 Orchestration
                                                                                          Select Workload
                                                                                                                 Cross Cloud:
                                  App Deployment
                                                                                           Mobility
                                                                                                                    Load Balancing
                                 Billing/Charge-back
                                                                                          Data
                                                                                                                 Fault Tolerance
                                  SLA Monitoring                                           Access/Mobility
                                                                                                                  Workload Exchange
                                                                                                                 Identity/Presence
                                  Traffic Isolation                                       Address Mobility
                                                                                                                 Discovery
                                  Security                                                Monitoring/
                                                                                                                 Network Search
                                                                                           Event Processing
                                  QoS
                                                                                          Intelligent Caching
                                                                                                                 CloudBursting
                                  Virtual Switching
                                                                                          Policy-Based
                                                                                                                      simpler case
                                  Cluster
                                                                                           Selection
                                  Communications
                                                                                                                                         11
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Inter-Cloud Example
          Dynamic Workload Migration – Simple VM Mobility


                                                                                         Cloud 1 / Cloud 2 transport
                                                                                         → XMPP

                                                                                         Cloud 1 finds Cloud 2
                                                                                         → Naming, Presence

                                                                                         Cloud 1 trusts Cloud 2
                                                                                         → Certificates, Trustsec
                                                                                         Cloud 1/2 negotiate
                                                                                         → Policy, Entitlement,
                                                                                          Security, Metering
                                                                                         Cloud 1 sets up Cloud 2
                                                                                         → Placement, Deployment,
                                                                                          Format, Motion
                                                                                         Cloud 1 sends to Cloud 2
                                                                                         → Transfer, Management
                                                                                         VM Runs in Cloud 2
                                                                                         → Addressing, VLAN,
                                                                                          WWN, Filesystem           12
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Inter-Cloud Example
          Dynamic Workload Federation – Generalized Service Access


                                                                                         Cloud 1 / Cloud 2 transport
                                                                                         → XMPP

                                                                                         Cloud 1 finds Cloud 2
                                                                                         → Naming, Presence

                                                                                         Cloud 1 trusts Cloud 2
                                                                                         → Certificates, Trustsec
                                                                                         Cloud 1 queries Cloud 2
                                                                                         for Services
                                                                                         → RDF/SPARQL, OWL
                                                                                         Cloud 1 selects; receives
                                                                                         protocols, interface
                                                                                         → Web Services; REST API
                                                                                         Cloud 1 calls services in
                                                                                         Cloud 2
                                                                                         → Metering, SLAs


                                                                                                                     13
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Specific Inter-Cloud Projects

  Addressing – IETF LISP


                                                                                                  UCI – W3C,
                                                                     Conversations –
                                                                                                   Google Code
                                                                      XMPP.org




                                                                                          Distributed Storage
                                                                                           Acceleration -
 Virtual Machines
                                                                                           opencloudconsortium.org,
  DMTF OVF
                                                                                           udt.sourceforge.net
                                                           Media Enablement
                                                                                                               14
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
Inter-Cloud                                                 Deployment                                                                     Presence
                                                            Placement
Standards &                                                                                                                                Identity
                                                                                           Events                 Naming/DNS
                                                            Instrumentation                                                                Geospatial
                                                                                           Logs                   Discovery
                                                            Metering
 Protocols                                                                                                        Trust/Certificates
                                                            SLA

 Roadmap                                                                Management                                          Endpoints

                                                                                                 Security
Lots of Work to                                                                                  Policy              Remote Desktop
                                                                                                 Entitlement         Spice, RDP
                                                  HTTP, XMPP, P2P, UDT Transport                                                             Transactions
      do                                                                                         Audit
                                                  REST, XML Invocation                                                                       Synchronization
                                                  XML Schema, SOAP Description                                                               Orchestration
                                                                                                      Communication
Cisco Strategy:
use technology                                                                                                                  Users        Directory
                                                                                                                                Identity     Search
                                                                            Server profiles
to enable                                                                   VM Management
enhanced,                                                                                                      Blob Storage                Streaming Audio
                                                                                                               Block Storage               Streaming Video
interoperable                                           VM Format                                              Map/Table Model
                                                        VM Mobility                                            Query Model
network based                                                                            Drives                                        Load Balancer
                                                        VM Management                                          Content Addressable
                                                                                         Filesystem                                    Distributed Memory
services                                                                                                                               Grid / MPI

                                                      Physical                                                 Platform         Content (URL, Cache)
Industry                                                                                                                        Message (Queue, Email)
                                                      Metaphor                                                 Metaphor
Associations,
partnerships
                                                                                         MAC Addresses
inevitable                                                                               IP Addressing         Time Synchronization
                                                                                                                                             WWN
                                                                                         VLAN                  Power Management
                                                                                                                                             FC
                                                                                         Multicast
                                                                                                                                             iSCSI
                                                        Intel VT, AMD-V
                                                                                                                                             VSAN
                                                        VNtag                                         Actual Physical

                                                                                                                                                               15
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential
A Hitchhiker's Guide to the Inter-Cloud

More Related Content

What's hot

Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
OpenStack Foundation
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
Lilian Schaffer
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
RamnivasLaddad
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
drewz lin
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
Symantec
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NAB
IntelAPAC
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОД
Cisco Russia
 

What's hot (17)

Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Why We Fail: How an architect learned to stop worrying and love the cloud
Why We Fail:  How an architect learned to stop worrying and love the cloudWhy We Fail:  How an architect learned to stop worrying and love the cloud
Why We Fail: How an architect learned to stop worrying and love the cloud
 
Cisco entel summit2010
Cisco entel summit2010Cisco entel summit2010
Cisco entel summit2010
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
 
Presenter manual cloud computing (specially for summer interns)
Presenter manual   cloud computing (specially for summer interns)Presenter manual   cloud computing (specially for summer interns)
Presenter manual cloud computing (specially for summer interns)
 
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
 
Cloud circle Simon Withers
Cloud circle Simon WithersCloud circle Simon Withers
Cloud circle Simon Withers
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NAB
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОД
 

Similar to A Hitchhiker's Guide to the Inter-Cloud

Cisco cloud connected solution
Cisco cloud connected solutionCisco cloud connected solution
Cisco cloud connected solution
#Jão Pablo
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
Cisco Public Relations
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
OpenSourceCamp
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
Lew Tucker
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud Implementation
Morphlabs
 
Cloud computing
Cloud computingCloud computing
Cloud computing
saralaanuj
 
Cloud Deployment Models
Cloud Deployment ModelsCloud Deployment Models
Cloud Deployment Models
Stanton Jones
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
HKISPA
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 

Similar to A Hitchhiker's Guide to the Inter-Cloud (20)

Cisco cloud connected solution
Cisco cloud connected solutionCisco cloud connected solution
Cisco cloud connected solution
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
The unified data center for cloud david yen
The unified data center for cloud david yenThe unified data center for cloud david yen
The unified data center for cloud david yen
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud Implementation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011
 
Cloud Deployment Models
Cloud Deployment ModelsCloud Deployment Models
Cloud Deployment Models
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Hybrid IT Delivery Model - Loughborough University
Hybrid IT Delivery Model - Loughborough UniversityHybrid IT Delivery Model - Loughborough University
Hybrid IT Delivery Model - Loughborough University
 

More from GovCloud Network

Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
GovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

A Hitchhiker's Guide to the Inter-Cloud

  • 1. A Hitchhiker’s Guide to the Inter-Cloud Krishna Sankar ksankar@cisco.com 1 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 2. Agenda A Quick Elevator Pitch On Inter-Cloud Thanks to David Bernstein, Glenn Dasmalchi, Doug Gourlay, James Urquhart, … 2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 3. Data Center Evolution Path Virtualization Cloud Computing Utility Consolidation Abstraction Automation Market Inter-Cloud Private Clouds Unified Computing Unified Fabric Data Center Networking 3 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 4. Cisco Cloud Strategy Build Right Products Technology Unified Fabric Enhanced IP core with tight coupling to Software Unified Compute Virtualization Aware Multi-Phased Services/ Standalone Clouds to Reference SW Enterprise-Class Services-led Cloud blueprints to Reference software stacks Inter-Cloud Open Standards Accelerate Cloud deployment and federation through Cloud standards 4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 5. Essential Cloud Monikers a.k.a. defining clouds without defining them  Elasticity  Multi-tenancy SaaS SaaS Abstraction  Abstraction Inter-Cloud  Federation  Trust Boundary Private IaaS Cloud  Ownership Boundary Federation 5 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 6. Cloud Adoption Phases Enterprise- Standalone Inter-Cloud Class Clouds Clouds External, Off-Premise Internal, On-Premise Key challenges: Key challenges:  Security  Federation  SLAs  Portability  Control  Market 6 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 7. Vision—The Inter-Cloud Flexible Infrastructure and a New Application Platform Apps Integrate Services Dynamic from Multiple Clouds Workload Migration A Federation of Clouds Based on Open Standards:  Naming/Discovery  Trust  Exchange/Peering 7 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 8. Virtual Private Inter-Cloud / CloudBursting 1. Established Trust Internal External Cloud Relationship Cloud 2. Compatible Infrastructure Multi-Tenant SP Cloud Trust Boundary (same) Vs. Internal Ownership Cloud Boundary (may be different) Seamless Extension of the Enterprise DC (IaaS) 8 8 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc. All rights reserved. © 2009 Cisco Confidential Cisco Confidential
  • 9. Virtual Private Inter-Cloud / CloudBursting  When enterprise applications can seamlessly move between their internal & external clouds leveraging the elasticity & multi-tenancy that a cloud infrastructure offers  Extend secure data center to the cloud computing era  In order to get a portion of the SP cloud as a „seamless extension‟ of the enterprise data center, one also needs • To migrate network context like VPN/VRF, VLAN, Load Balancing, firewall/NAT, QoS and may be some port profiles (for IKV/1K/5K) and configuration (for others).  This will require a convergence of • Current ideas, as well as • A slice of new technologies (like LISP) at appropriate levels to tackle this challenge. 9 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 10. Inter-Cloud: Key Questions  What is the “network model” ? - network-based isolation for the multitenant SP cloud - network abstractions for the enterprise tenants (seamless)  What are the “network features” that differentiate? - isolation (per above), QoS, monitoring, CPE linkages  How are the network features exposed/integrated? - control APIs (and underlying abstractions) - cloud OS linkages  To what extent will we support workload mobility? - live migration requirement? - moving workload context -Dude, where is my VM ? 10 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 11. Inter-Cloud In A Nutshell Virtualized Enterprise- Inter-Cloud Data Centers Class Clouds Application APIs Application APIs Integration Services Compute Services  Orchestration  Select Workload   Cross Cloud: App Deployment Mobility  Load Balancing  Billing/Charge-back  Data   Fault Tolerance SLA Monitoring Access/Mobility  Workload Exchange   Identity/Presence Traffic Isolation  Address Mobility   Discovery Security  Monitoring/   Network Search Event Processing QoS  Intelligent Caching   CloudBursting Virtual Switching  Policy-Based   simpler case Cluster Selection Communications 11 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 12. Inter-Cloud Example Dynamic Workload Migration – Simple VM Mobility Cloud 1 / Cloud 2 transport → XMPP Cloud 1 finds Cloud 2 → Naming, Presence Cloud 1 trusts Cloud 2 → Certificates, Trustsec Cloud 1/2 negotiate → Policy, Entitlement, Security, Metering Cloud 1 sets up Cloud 2 → Placement, Deployment, Format, Motion Cloud 1 sends to Cloud 2 → Transfer, Management VM Runs in Cloud 2 → Addressing, VLAN, WWN, Filesystem 12 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 13. Inter-Cloud Example Dynamic Workload Federation – Generalized Service Access Cloud 1 / Cloud 2 transport → XMPP Cloud 1 finds Cloud 2 → Naming, Presence Cloud 1 trusts Cloud 2 → Certificates, Trustsec Cloud 1 queries Cloud 2 for Services → RDF/SPARQL, OWL Cloud 1 selects; receives protocols, interface → Web Services; REST API Cloud 1 calls services in Cloud 2 → Metering, SLAs 13 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 14. Specific Inter-Cloud Projects  Addressing – IETF LISP  UCI – W3C,  Conversations – Google Code XMPP.org  Distributed Storage Acceleration -  Virtual Machines opencloudconsortium.org, DMTF OVF udt.sourceforge.net  Media Enablement 14 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 15. Inter-Cloud Deployment Presence Placement Standards & Identity Events Naming/DNS Instrumentation Geospatial Logs Discovery Metering Protocols Trust/Certificates SLA Roadmap Management Endpoints Security Lots of Work to Policy Remote Desktop Entitlement Spice, RDP HTTP, XMPP, P2P, UDT Transport Transactions do Audit REST, XML Invocation Synchronization XML Schema, SOAP Description Orchestration Communication Cisco Strategy: use technology Users Directory Identity Search Server profiles to enable VM Management enhanced, Blob Storage Streaming Audio Block Storage Streaming Video interoperable VM Format Map/Table Model VM Mobility Query Model network based Drives Load Balancer VM Management Content Addressable Filesystem Distributed Memory services Grid / MPI Physical Platform Content (URL, Cache) Industry Message (Queue, Email) Metaphor Metaphor Associations, partnerships MAC Addresses inevitable IP Addressing Time Synchronization WWN VLAN Power Management FC Multicast iSCSI Intel VT, AMD-V VSAN VNtag Actual Physical 15 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential