SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
FRS FY16 Confidential
Network Infrastructure for Optimizing VDI
July, 2016
Khuong Nguyen – Dell Networking South Asia
Virtualization 1.0
Virtualization 2.0
VDI Impact on Network Infrastructure
4
L2
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
VM
Storage Compute
VDI User
iSCSI
Quality Of
Experience
Boot Storm
Highly
Virtualized
Users simultaneously
boot their virtual
desktops in the
morning resulting in
traffic spike
Each desktop session
tends to use as much
bandwidth as possible
for better QoE
Desktop are small VMs
deployed in large
numbers, the
endpoint density
clutters management
“The world’s most innovative,
disruptive & visionary
networking vendor”
Data Center
Operating System Network Overlay Control Plane
Software Defined Networking
Dell Open Networking
+ + +
Disaggregating networking technologies to maximize capability and choice
Switching Hardware
Switching Software
Physical Networking
Virtual Networking
Control Plane
Forwarding Plane
Open Networking is Dell’s SDN Strategy
Open Networking
With Place in the Network
Linux on the switch, unified
server, network management
Feature-rich L2/L3 Data
Center networking
WAN, MPLS/VPLS
functionality
• Network tapping
• Leaf-spine SDN fabricFabric Switching
In Rack Switching
Distributed fabric with
analytics & security
Feature-rich L2/L3 Data
Center networking
Feature-rich L2/L3 Data
Center networking
8
Pluribus Open Netvisor Linux Fabric Introduction
“A computer cluster consists of a set of loosely or
tightly connected computers that work together so
that, in many respects, they can be viewed as a
single system”
ONVL Fabric is a software based, controller-less, fully distributed
and highly available server-style cluster of Ethernet Switches
Single CLI/API For Agility & Automation
Open Netvisor Linux Architecture
L2/L3 stack
Dell Open Networking
Open Networking
Java/C
RESTful,
JSON API
AnsibleC APICLI OpenStack Python Fabric-wide Programmability
L2/L3 stack L2/L3 stack
Controller-less Fabric
Ubiquitous Control Without Controllers!
Agility, Automation
Telemetry, Visibility
ONVL Advanced Features
 Application flows
 Client-Server
connections
 Network Traffic
Tap-less Fabric Telemetry
vPort
Visibility/control of end point/VM
lifecycle across the fabric
vFlow
Granular flow control for
security and QoS policies
Single CLI/API For Agility & Automation
Built on top of
Open Networking
Hardware…
…and standard L2/L3
protocols!
How Pluribus ONVL for Dell Enhances VDI
Quality of
Experience
Boot Storm
Highly
Virtualized
Network Admin
(login to any ONVL switch
L2
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
iSCSI
VM
Storage Compute
VDI User
iSCSI
1MB
ONVL Fabric
Bandwidth
Hot spots
VMs
mgmt and
troublesh
ooting
Fabric-wide
database to track
VM lifecycle
through the
fabric (vPort)
Heath map of
storage and
desktop flows
throughput/laten
cy
Fair share of
bandwidth
to each desktop
session (vFlow)
L2
L3
L2
3rd Party
Spine
All Pluribus + Dell
All Pluribus + Dell
Brownfield Spine
Brownfield Spine
3rd Party
Spine
L3
L3
ONVL Controller-less Fabric POD Solutions
Controller-less fabric designed to work across 3rd party networks
L3 L3
L2
iSCSI
How about Security?
Security begins with visibility
You can’t protect what you can’t see
Who is on the Network?
And what are they up to?
Event: Attempted Privilege Gain
Target: 96.16.242.135
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: Blackberry
Applications: Mail, Browser, Twitter
Location: Whitehouse, US
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: Blackberry
Applications: Mail, Browswer, Twitter
Location: Whitehouse, US
User ID: bobama
Full Name : Barack Obama
Department: Executive Branch
Context is everything
VCF IA Fit In Pluribus Architecture
16
L2/L3 stackL2/L3 stackL2/L3 stack
Dell ON Hardware
Open Networking
Virtualization-Centric Fabric
Centralized control and programmability without
external controllers
Netvisor Distributed Fabric
Built-in TCP Flow and Network Telemetry
Engines
(NO taps, NO brokers)
Fabric-wide Visibility and Aggregation of Telemetry
Data
Fabric-wide API
Programmability
(REST, Java/C, CLI, Ansible)
VCF Insight Analytics
Analytics Applications
(runs in a VM outside the switch)
17 Dell - Internal Use - Confidential
What Can You Answer With VCF IA? – Examples
1. How many concurrent connections were
open between Client A to Server B between
2am and 5am last week (EST)? Did it happen
before? Did client A try to flood other servers
at the same time?
2. What was the average connection setup
latency for the database server between 4pm
and 4:15pm when user X reported slow
responsiveness? How many concurrent clients
were connected at that time?
3. Are we load balancing LDAP servers as
expected? From which geography are most of
the connections to my servers originating?
18 Dell - Internal Use - Confidential
What Can You Answer With VCF IA? – Examples
4. What switch ports are transporting the
most connections and are there any
packet drops or errors on these ports?
5. Is any of my secure servers being
accessed using unsecure protocols
such as telnet/http/ftp? Which client is
doing that?
6. How many times did user X connect
to foo.com in the past 36 hours? Did
anybody else behave the same in the
last four weeks?
19 Dell - Internal Use - Confidential
What Can You Answer With VCF IA? – Examples
7. How many connections have been reset
(RST) and closed on server Z since 5am
today? Are these reset always associated to
a specific application?
8. Who are the Top Talkers for Application Y
on server Z since 2pm last Monday? And one
week ago when the engineering team from
our acquisition was still using the old server?
9. How many VM moves occurred on the
Nutanix cluster since last week? Was the
CVM unresponsive at any point in time
(SYN)?
VCF IA Deployment Model For Third Party Networks
ONVL
Telemetry API
VCF-IA Server
(VM)
Dell S4048 or S6000
Appliance as Flow Collector
$0
$100,000
$200,000
$300,000
$400,000
$500,000
$600,000
$700,000
$800,000
VCF
IA
Other
5 Years TCO
Gigamon 48+ports
Tool/Appliance
Tools
Pkt Broker
~85% savings over traditional solutions
1. VDI requirements for Network Infrastructure
2. Dell Open Networking
3. Pluribus Open Netvisor Linux
4. Pluribus VCF IA for Security and Visibility
Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương

Contenu connexe

Tendances

Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare WorkstationHitesh Gupta
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMwarertchandu
 
30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answersLatif Siddiqui
 
Hyper V in Windows Server 2012
Hyper V in Windows Server 2012Hyper V in Windows Server 2012
Hyper V in Windows Server 2012Lai Yoong Seng
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksAmit Gatenyo
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshareYogesh Kumar
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
V Mware Workstation 6 Ivnua
V Mware Workstation 6 IvnuaV Mware Workstation 6 Ivnua
V Mware Workstation 6 Ivnua-
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Tuan Yang
 
Implementing a Hyper-V Virtualization Infrastructure
Implementing a Hyper-V Virtualization InfrastructureImplementing a Hyper-V Virtualization Infrastructure
Implementing a Hyper-V Virtualization InfrastructureASPE, Inc.
 
Windows Server "10": что нового в виртуализации
Windows Server "10": что нового в виртуализацииWindows Server "10": что нового в виртуализации
Windows Server "10": что нового в виртуализацииВиталий Стародубцев
 
Presentation at VMware Workstation Instalation
Presentation at VMware Workstation InstalationPresentation at VMware Workstation Instalation
Presentation at VMware Workstation InstalationMuzammul
 
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
XenServer, Hyper-V, and ESXi -  Architecture, API, and CodingXenServer, Hyper-V, and ESXi -  Architecture, API, and Coding
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
 
Top Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsTop Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsDavid McGeough
 
What's new in System Center 2012 R2: Virtual Machine Manager
What's new in System Center 2012 R2: Virtual Machine ManagerWhat's new in System Center 2012 R2: Virtual Machine Manager
What's new in System Center 2012 R2: Virtual Machine ManagerTomica Kaniski
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloudChetna Purohit
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 

Tendances (20)

Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMware
 
30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers
 
Hyper V in Windows Server 2012
Hyper V in Windows Server 2012Hyper V in Windows Server 2012
Hyper V in Windows Server 2012
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and Tricks
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
V Mware Workstation 6 Ivnua
V Mware Workstation 6 IvnuaV Mware Workstation 6 Ivnua
V Mware Workstation 6 Ivnua
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)
 
Hypervisor and Nova
Hypervisor and NovaHypervisor and Nova
Hypervisor and Nova
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Implementing a Hyper-V Virtualization Infrastructure
Implementing a Hyper-V Virtualization InfrastructureImplementing a Hyper-V Virtualization Infrastructure
Implementing a Hyper-V Virtualization Infrastructure
 
Vm Vs Hyperv
Vm Vs HypervVm Vs Hyperv
Vm Vs Hyperv
 
Windows Server "10": что нового в виртуализации
Windows Server "10": что нового в виртуализацииWindows Server "10": что нового в виртуализации
Windows Server "10": что нового в виртуализации
 
Presentation at VMware Workstation Instalation
Presentation at VMware Workstation InstalationPresentation at VMware Workstation Instalation
Presentation at VMware Workstation Instalation
 
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
XenServer, Hyper-V, and ESXi -  Architecture, API, and CodingXenServer, Hyper-V, and ESXi -  Architecture, API, and Coding
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
 
Top Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer DeploymentsTop Troubleshooting Tips and Techniques for Citrix XenServer Deployments
Top Troubleshooting Tips and Techniques for Citrix XenServer Deployments
 
What's new in System Center 2012 R2: Virtual Machine Manager
What's new in System Center 2012 R2: Virtual Machine ManagerWhat's new in System Center 2012 R2: Virtual Machine Manager
What's new in System Center 2012 R2: Virtual Machine Manager
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 

En vedette

Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn Thắng
Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn ThắngDự án triển khai giải pháp VDI thành công - Mr Hoàng Văn Thắng
Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn ThắngLac Viet Computing Corporation
 
Vmware horizon6
Vmware horizon6Vmware horizon6
Vmware horizon6laonap166
 
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVER
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVERTÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVER
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVERlaonap166
 
Công nghệ ảo hóa
Công nghệ ảo hóaCông nghệ ảo hóa
Công nghệ ảo hóaSrbIT
 
Hướng dẫn xây dựng mô hình mạng với vmware
Hướng dẫn xây dựng mô hình mạng với vmwareHướng dẫn xây dựng mô hình mạng với vmware
Hướng dẫn xây dựng mô hình mạng với vmwarelaonap166
 
Báo cáo trần trong an
Báo cáo trần trong anBáo cáo trần trong an
Báo cáo trần trong anTrọng An
 
Cài đặt Genmymotion
 Cài đặt Genmymotion Cài đặt Genmymotion
Cài đặt GenmymotionTrọng An
 
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )Tạo mã độc trên kali linux để xâm nhập android (mạng lan )
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )Trọng An
 
Tạo mã độc trên vps để xâm nhập android ( môi trường internet )
Tạo mã độc trên vps để xâm nhập android ( môi trường internet  )Tạo mã độc trên vps để xâm nhập android ( môi trường internet  )
Tạo mã độc trên vps để xâm nhập android ( môi trường internet )Trọng An
 
Cách tạo mã độc trên kali linux và triển khai trên android ảo
Cách tạo mã độc trên kali linux và triển khai trên android ảoCách tạo mã độc trên kali linux và triển khai trên android ảo
Cách tạo mã độc trên kali linux và triển khai trên android ảothach28
 
Cài đặt kali linux trên máy ảo VMware
Cài đặt kali linux trên máy ảo VMwareCài đặt kali linux trên máy ảo VMware
Cài đặt kali linux trên máy ảo VMwareNguyen Stone
 
Slide Báo cáo thực tập athena
Slide Báo cáo thực tập athenaSlide Báo cáo thực tập athena
Slide Báo cáo thực tập athenaCon Ranh
 
Tìm hiểu về Vmware
Tìm hiểu về VmwareTìm hiểu về Vmware
Tìm hiểu về VmwareBich Tuyen
 
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVER
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVERTRIỂN KHAI OPENVPN TRÊN UBUNTU SERVER
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVERBảo Bối
 
VMware Network design project example
VMware Network design project exampleVMware Network design project example
VMware Network design project exampleDaniel Nilles
 

En vedette (16)

Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn Thắng
Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn ThắngDự án triển khai giải pháp VDI thành công - Mr Hoàng Văn Thắng
Dự án triển khai giải pháp VDI thành công - Mr Hoàng Văn Thắng
 
Vmware horizon6
Vmware horizon6Vmware horizon6
Vmware horizon6
 
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVER
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVERTÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVER
TÌM HIỂU VÀ TRIỂN KHAI VIRTUAL SAN TRONG VMWARE SERVER
 
Công nghệ ảo hóa
Công nghệ ảo hóaCông nghệ ảo hóa
Công nghệ ảo hóa
 
Hướng dẫn xây dựng mô hình mạng với vmware
Hướng dẫn xây dựng mô hình mạng với vmwareHướng dẫn xây dựng mô hình mạng với vmware
Hướng dẫn xây dựng mô hình mạng với vmware
 
Horizon
HorizonHorizon
Horizon
 
Báo cáo trần trong an
Báo cáo trần trong anBáo cáo trần trong an
Báo cáo trần trong an
 
Cài đặt Genmymotion
 Cài đặt Genmymotion Cài đặt Genmymotion
Cài đặt Genmymotion
 
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )Tạo mã độc trên kali linux để xâm nhập android (mạng lan )
Tạo mã độc trên kali linux để xâm nhập android (mạng lan )
 
Tạo mã độc trên vps để xâm nhập android ( môi trường internet )
Tạo mã độc trên vps để xâm nhập android ( môi trường internet  )Tạo mã độc trên vps để xâm nhập android ( môi trường internet  )
Tạo mã độc trên vps để xâm nhập android ( môi trường internet )
 
Cách tạo mã độc trên kali linux và triển khai trên android ảo
Cách tạo mã độc trên kali linux và triển khai trên android ảoCách tạo mã độc trên kali linux và triển khai trên android ảo
Cách tạo mã độc trên kali linux và triển khai trên android ảo
 
Cài đặt kali linux trên máy ảo VMware
Cài đặt kali linux trên máy ảo VMwareCài đặt kali linux trên máy ảo VMware
Cài đặt kali linux trên máy ảo VMware
 
Slide Báo cáo thực tập athena
Slide Báo cáo thực tập athenaSlide Báo cáo thực tập athena
Slide Báo cáo thực tập athena
 
Tìm hiểu về Vmware
Tìm hiểu về VmwareTìm hiểu về Vmware
Tìm hiểu về Vmware
 
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVER
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVERTRIỂN KHAI OPENVPN TRÊN UBUNTU SERVER
TRIỂN KHAI OPENVPN TRÊN UBUNTU SERVER
 
VMware Network design project example
VMware Network design project exampleVMware Network design project example
VMware Network design project example
 

Similaire à Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương

Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlowLancope, Inc.
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageMayaData Inc
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Dorian Hernandez
 
Executive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of ContainersExecutive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of ContainersNVISIA
 
Introduction to Filecoin
Introduction to Filecoin   Introduction to Filecoin
Introduction to Filecoin Vanessa Lošić
 
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on Demand
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on DemandLinux VDI with OpenStack – How to Deliver Linux Virtual Desktops on Demand
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on DemandLeostream
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanCohesive Networks
 
Open solaris customer presentation
Open solaris customer presentationOpen solaris customer presentation
Open solaris customer presentationxKinAnx
 
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre HillScaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hillwebhostingguy
 
Linuxcon 2011 Crash Course in Open Source Cloud Computing
Linuxcon 2011   Crash Course in Open Source Cloud ComputingLinuxcon 2011   Crash Course in Open Source Cloud Computing
Linuxcon 2011 Crash Course in Open Source Cloud ComputingMark Hinkle
 
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
Ohio LinuxFest:  Crash Course in Open Source Cloud ComputingOhio LinuxFest:  Crash Course in Open Source Cloud Computing
Ohio LinuxFest: Crash Course in Open Source Cloud ComputingMark Hinkle
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Ryan Koop
 
Introduction to IPFS & Filecoin
Introduction to IPFS & FilecoinIntroduction to IPFS & Filecoin
Introduction to IPFS & FilecoinTinaBregovi
 
InfiniBand for the enterprise
InfiniBand for the enterpriseInfiniBand for the enterprise
InfiniBand for the enterpriseAnas Kanzoua
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignJenny Mancini
 

Similaire à Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
 
Executive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of ContainersExecutive Briefing: The Why, What, and Where of Containers
Executive Briefing: The Why, What, and Where of Containers
 
Introduction to Filecoin
Introduction to Filecoin   Introduction to Filecoin
Introduction to Filecoin
 
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on Demand
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on DemandLinux VDI with OpenStack – How to Deliver Linux Virtual Desktops on Demand
Linux VDI with OpenStack – How to Deliver Linux Virtual Desktops on Demand
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Open solaris customer presentation
Open solaris customer presentationOpen solaris customer presentation
Open solaris customer presentation
 
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre HillScaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hill
 
Forward unisys
Forward unisysForward unisys
Forward unisys
 
Linuxcon 2011 Crash Course in Open Source Cloud Computing
Linuxcon 2011   Crash Course in Open Source Cloud ComputingLinuxcon 2011   Crash Course in Open Source Cloud Computing
Linuxcon 2011 Crash Course in Open Source Cloud Computing
 
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
Ohio LinuxFest:  Crash Course in Open Source Cloud ComputingOhio LinuxFest:  Crash Course in Open Source Cloud Computing
Ohio LinuxFest: Crash Course in Open Source Cloud Computing
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
 
Introduction to IPFS & Filecoin
Introduction to IPFS & FilecoinIntroduction to IPFS & Filecoin
Introduction to IPFS & Filecoin
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
 
Open Source in the Enterprise
Open Source in the EnterpriseOpen Source in the Enterprise
Open Source in the Enterprise
 
InfiniBand for the enterprise
InfiniBand for the enterpriseInfiniBand for the enterprise
InfiniBand for the enterprise
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
 

Plus de Lac Viet Computing Corporation

[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế
[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế
[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuếLac Viet Computing Corporation
 
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương Mai
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương MaiNhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương Mai
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương MaiLac Viet Computing Corporation
 
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...Lac Viet Computing Corporation
 
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn Thắng
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn ThắngXây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn Thắng
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn ThắngLac Viet Computing Corporation
 
Brochure - Microsoft Business Intelligence and Analytics
Brochure - Microsoft Business Intelligence and AnalyticsBrochure - Microsoft Business Intelligence and Analytics
Brochure - Microsoft Business Intelligence and AnalyticsLac Viet Computing Corporation
 
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016Lac Viet Computing Corporation
 
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016Lac Viet Computing Corporation
 
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016Lac Viet Computing Corporation
 
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...Lac Viet Computing Corporation
 
Giải pháp quản trị doanh nghiệp Business Intelligence
Giải pháp quản trị doanh nghiệp Business IntelligenceGiải pháp quản trị doanh nghiệp Business Intelligence
Giải pháp quản trị doanh nghiệp Business IntelligenceLac Viet Computing Corporation
 
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụng
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụngPhần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụng
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụngLac Viet Computing Corporation
 

Plus de Lac Viet Computing Corporation (13)

Giới thiệu Dịch vụ IT Lạc Việt 2016
Giới thiệu Dịch vụ IT Lạc Việt 2016Giới thiệu Dịch vụ IT Lạc Việt 2016
Giới thiệu Dịch vụ IT Lạc Việt 2016
 
[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế
[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế
[Tài liệu] Kinh nghiệm thực tế cần biết khi quyết toán thuế
 
DellEMC Networking Product Portfolio Guide
DellEMC Networking Product Portfolio GuideDellEMC Networking Product Portfolio Guide
DellEMC Networking Product Portfolio Guide
 
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương Mai
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương MaiNhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương Mai
Nhận diện những nguy cơ đe dọa an ninh mạng - Ms Nguyễn Ngọc Phương Mai
 
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...
Giải pháp nâng cao năng lực bảo toàn hệ thống thông tin doanh nghiệp - Mr Đỗ ...
 
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn Thắng
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn ThắngXây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn Thắng
Xây dựng và vận hành hệ thống an ninh mạng hiệu quả - Mr Hoàng Văn Thắng
 
Brochure - Microsoft Business Intelligence and Analytics
Brochure - Microsoft Business Intelligence and AnalyticsBrochure - Microsoft Business Intelligence and Analytics
Brochure - Microsoft Business Intelligence and Analytics
 
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016
Giới thiệu Công ty Cổ phần Tin học Lạc Việt 2016
 
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016
Giới thiệu Phần mềm quản lý nhân sự SureHCS 2016
 
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016
Giới thiệu Phần mềm văn phòng thông minh SurePortal 2016
 
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...
Xu hướng và giải pháp phát triển ứng dụng di động đa nền tảng cho doanh nghiệ...
 
Giải pháp quản trị doanh nghiệp Business Intelligence
Giải pháp quản trị doanh nghiệp Business IntelligenceGiải pháp quản trị doanh nghiệp Business Intelligence
Giải pháp quản trị doanh nghiệp Business Intelligence
 
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụng
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụngPhần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụng
Phần mềm kế toán Cloud AccNetC - Tài liệu hướng dẫn sử dụng
 

Dernier

VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 

Dernier (20)

VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 

Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương

  • 1. FRS FY16 Confidential Network Infrastructure for Optimizing VDI July, 2016 Khuong Nguyen – Dell Networking South Asia
  • 4. VDI Impact on Network Infrastructure 4 L2 iSCSI iSCSI iSCSI iSCSI iSCSI iSCSI iSCSI VM Storage Compute VDI User iSCSI Quality Of Experience Boot Storm Highly Virtualized Users simultaneously boot their virtual desktops in the morning resulting in traffic spike Each desktop session tends to use as much bandwidth as possible for better QoE Desktop are small VMs deployed in large numbers, the endpoint density clutters management
  • 5. “The world’s most innovative, disruptive & visionary networking vendor” Data Center
  • 6. Operating System Network Overlay Control Plane Software Defined Networking Dell Open Networking + + + Disaggregating networking technologies to maximize capability and choice Switching Hardware Switching Software Physical Networking Virtual Networking Control Plane Forwarding Plane Open Networking is Dell’s SDN Strategy
  • 7. Open Networking With Place in the Network Linux on the switch, unified server, network management Feature-rich L2/L3 Data Center networking WAN, MPLS/VPLS functionality • Network tapping • Leaf-spine SDN fabricFabric Switching In Rack Switching Distributed fabric with analytics & security Feature-rich L2/L3 Data Center networking Feature-rich L2/L3 Data Center networking
  • 8. 8 Pluribus Open Netvisor Linux Fabric Introduction “A computer cluster consists of a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system” ONVL Fabric is a software based, controller-less, fully distributed and highly available server-style cluster of Ethernet Switches Single CLI/API For Agility & Automation
  • 9. Open Netvisor Linux Architecture L2/L3 stack Dell Open Networking Open Networking Java/C RESTful, JSON API AnsibleC APICLI OpenStack Python Fabric-wide Programmability L2/L3 stack L2/L3 stack Controller-less Fabric Ubiquitous Control Without Controllers! Agility, Automation Telemetry, Visibility
  • 10. ONVL Advanced Features  Application flows  Client-Server connections  Network Traffic Tap-less Fabric Telemetry vPort Visibility/control of end point/VM lifecycle across the fabric vFlow Granular flow control for security and QoS policies Single CLI/API For Agility & Automation Built on top of Open Networking Hardware… …and standard L2/L3 protocols!
  • 11. How Pluribus ONVL for Dell Enhances VDI Quality of Experience Boot Storm Highly Virtualized Network Admin (login to any ONVL switch L2 iSCSI iSCSI iSCSI iSCSI iSCSI iSCSI iSCSI VM Storage Compute VDI User iSCSI 1MB ONVL Fabric Bandwidth Hot spots VMs mgmt and troublesh ooting Fabric-wide database to track VM lifecycle through the fabric (vPort) Heath map of storage and desktop flows throughput/laten cy Fair share of bandwidth to each desktop session (vFlow)
  • 12. L2 L3 L2 3rd Party Spine All Pluribus + Dell All Pluribus + Dell Brownfield Spine Brownfield Spine 3rd Party Spine L3 L3 ONVL Controller-less Fabric POD Solutions Controller-less fabric designed to work across 3rd party networks L3 L3 L2 iSCSI
  • 14. Security begins with visibility You can’t protect what you can’t see Who is on the Network? And what are they up to?
  • 15. Event: Attempted Privilege Gain Target: 96.16.242.135 Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: Blackberry Applications: Mail, Browser, Twitter Location: Whitehouse, US Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: Blackberry Applications: Mail, Browswer, Twitter Location: Whitehouse, US User ID: bobama Full Name : Barack Obama Department: Executive Branch Context is everything
  • 16. VCF IA Fit In Pluribus Architecture 16 L2/L3 stackL2/L3 stackL2/L3 stack Dell ON Hardware Open Networking Virtualization-Centric Fabric Centralized control and programmability without external controllers Netvisor Distributed Fabric Built-in TCP Flow and Network Telemetry Engines (NO taps, NO brokers) Fabric-wide Visibility and Aggregation of Telemetry Data Fabric-wide API Programmability (REST, Java/C, CLI, Ansible) VCF Insight Analytics Analytics Applications (runs in a VM outside the switch)
  • 17. 17 Dell - Internal Use - Confidential What Can You Answer With VCF IA? – Examples 1. How many concurrent connections were open between Client A to Server B between 2am and 5am last week (EST)? Did it happen before? Did client A try to flood other servers at the same time? 2. What was the average connection setup latency for the database server between 4pm and 4:15pm when user X reported slow responsiveness? How many concurrent clients were connected at that time? 3. Are we load balancing LDAP servers as expected? From which geography are most of the connections to my servers originating?
  • 18. 18 Dell - Internal Use - Confidential What Can You Answer With VCF IA? – Examples 4. What switch ports are transporting the most connections and are there any packet drops or errors on these ports? 5. Is any of my secure servers being accessed using unsecure protocols such as telnet/http/ftp? Which client is doing that? 6. How many times did user X connect to foo.com in the past 36 hours? Did anybody else behave the same in the last four weeks?
  • 19. 19 Dell - Internal Use - Confidential What Can You Answer With VCF IA? – Examples 7. How many connections have been reset (RST) and closed on server Z since 5am today? Are these reset always associated to a specific application? 8. Who are the Top Talkers for Application Y on server Z since 2pm last Monday? And one week ago when the engineering team from our acquisition was still using the old server? 9. How many VM moves occurred on the Nutanix cluster since last week? Was the CVM unresponsive at any point in time (SYN)?
  • 20. VCF IA Deployment Model For Third Party Networks ONVL Telemetry API VCF-IA Server (VM) Dell S4048 or S6000 Appliance as Flow Collector $0 $100,000 $200,000 $300,000 $400,000 $500,000 $600,000 $700,000 $800,000 VCF IA Other 5 Years TCO Gigamon 48+ports Tool/Appliance Tools Pkt Broker ~85% savings over traditional solutions
  • 21. 1. VDI requirements for Network Infrastructure 2. Dell Open Networking 3. Pluribus Open Netvisor Linux 4. Pluribus VCF IA for Security and Visibility