unlocking the sdn and nfv transformation

30

Upload: open-networking-summits

Post on 16-Jul-2015

208 views

Category:

Technology


1 download

TRANSCRIPT

Page 3: Unlocking the SDN and NFV Transformation

Unlocking the SDN and

NFV Transformation John Healy

GM, Software Defined Networking Division

Intel Corporation

Page 4: Unlocking the SDN and NFV Transformation

Open Source, Open Standards,

Beckoning A New Dawn of Networks

Page 5: Unlocking the SDN and NFV Transformation

ORCHESTRATION

Page 6: Unlocking the SDN and NFV Transformation

Intel Contributions* to OpenStack for SDN and

NFV User Interface (Horizon)

Object Store (Swift)

Image Store (Glance)

Compute (Nova)

Block Storage (Cinder)

Network Services (Neutron)

Key Service (Barbican)

Monitoring/Metering (Ceilometer)

*Other brands and names are the property of their respective owners

Page 7: Unlocking the SDN and NFV Transformation

Intel Contributions to OpenStack for SDN and NFV

User Interface (Horizon)

Object Store (Swift)

Image Store (Glance)

Compute (Nova)

Block Storage (Cinder)

Network Services (Neutron)

Key Service (Barbican)

OVF Meta-Data Import

UX Monitoring/Metering (Ceilometer)

Metrics

Intelligent Workload Scheduling

Enhanced Platform Awareness

Enhanced Platform Awareness

PCIe SR-IOV Accelerators (Havana)

Intelligent Workload Scheduling Metrics (Havana)

CPU Feature Detection (Icehouse)

OVF Meta-Data Import (Juno)

*Other brands and names are the property of their respective owners

Page 8: Unlocking the SDN and NFV Transformation

Intel Contributions to OpenStack for SDN and NFV

User Interface (Horizon)

Object Store (Swift)

Image Store (Glance)

Compute (Nova)

Block Storage (Cinder)

Network Services (Neutron)

Key Service (Barbican)

OVF Meta-Data Import

UX Monitoring/Metering (Ceilometer)

Key Encryption and Management

Metrics

UX

Trusted Compute Pools

(Extended with Geo Tagging)

Intelligent Workload Scheduling

Enhanced Platform Awareness

Enhanced Platform Awareness

PCIe SR-IOV Accelerators (Havana)

Intelligent Workload Scheduling Metrics (Havana)

CPU Feature Detection (Icehouse)

OVF Meta-Data Import (Juno)

Security

Trusted Compute Pools (Folsom)

Trusted Compute with Geo Tagging (Icehouse)

Key Management (Icehouse)

*Other brands and names are the property of their respective owners

Page 9: Unlocking the SDN and NFV Transformation

User Interface (Horizon)

Object Store (Swift)

Image Store (Glance)

Compute (Nova)

Block Storage (Cinder)

Network Services (Neutron)

Key Service (Barbican)

OVF Meta-Data Import

Intel® DPDK vSwitch

UX UX Monitoring/Metering (Ceilometer)

Key Encryption and Management

Advanced Services in VMs

Metrics

VPN-as-a-Service (with Intel® QuickAssist Technology)

UX

Trusted Compute Pools

(Extended with Geo Tagging)

Intelligent Workload Scheduling

Enhanced Platform Awareness

Enhanced Platform Awareness

PCIe SR-IOV Accelerators (Havana)

Intelligent Workload Scheduling Metrics (Havana)

CPU Feature Detection (Icehouse)

OVF Meta-Data Import (Juno)

Security

Trusted Compute Pools (Folsom)

Trusted Compute with Geo Tagging (Icehouse)

Key Management (Icehouse)

Networking

VPN-as-a-Service with Intel® QuickAssist Acceleration (Icehouse)

Advanced Services in VMs (Icehouse/Juno)

Intel® DPDK Open vSwitch (Juno)

Intel Contributions to OpenStack for SDN and NFV

*Other brands and names are the property of their respective owners

Page 10: Unlocking the SDN and NFV Transformation

Enhanced Platform Awareness “PCIe Accelerator Devices + CPU Feature Detection” Usage Example:

Filters all server platforms

Weights all candidates to find most suitable for deploying VM.

Host 1

Host 2

Host 3

Host 4

Host 5

Host 6

Host 1

Host 2

Host 3

Host 4

Host 5

Host 6

Host 6

Host 1

Host 3

Host 5

FIlters Weighting

Page 11: Unlocking the SDN and NFV Transformation

Enhanced Platform Awareness EPA filters identify key PCIe devices, or CPU and Chipset capabilities best suited for the workload placement

E.G. Intel QuickAssist, AVX, AES-NI, Secure Key

Applies to all silicon architectures…

Host 1

Host 2

Host 3

Host 4

Host 5

Host 6

PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

Host 1

Host 2

Host 3

Host 4

Host 5

Host 6

PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

Host 6

Host 1

Host 3

Host 5 PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

PCIe Accelerator

FIlters Weighting

Page 12: Unlocking the SDN and NFV Transformation

VIRTUAL

SWITCHING AND ROUTING

Page 13: Unlocking the SDN and NFV Transformation

vSwitch, vRouter: Challenges and Opportunities

Many demands as

adoption picks up,

however…

Increased E W traffic

Network Appliances

place new demands

Higher core density =>

higher VM VM traffic

.

Requirements for High

performance VMs and

Network Appliances

Support high performance

VM (w/ up to 40Gb NIC)

Higher throughput,

low CPU utilization

Low latency, controlled

latency (jitter)

Need for multi-tenant

segmentation with

advanced layer 3

routing services within

the virtual server

Page 14: Unlocking the SDN and NFV Transformation

Expanding Moore’s Law to Networking

Nehalem 1S

Intel Forwarding Stack

Throughput

2013 Future 2009 2010 2011 2012

Westmere 1S Intel Forwarding Stack

SNB-EP 1S Intel Data Plane Development

Kit

SNB-EP 2S Intel Data Plane Development

Kit

IVB-EP 2S Intel Data Plane Development

Kit

80 Gbps*

40 Gbps*

24 Gbps*

160 Gbps*

220 Gbps*

1: Intel internal estimate

2: Intel Internal measurement of packet processing performance using Intel Xeon processors. Software and workloads used in performance tests may have been optimized for performance only on Intel

microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may

cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with

other products.

For more information go to intel.com/performance

Page 15: Unlocking the SDN and NFV Transformation

Intel® Data Plane Development Kit

Enabling vSwitch and vRouter Innovation on Moore’s

Law

01.org DPDK.org

Memory Management

Queue Ring Functions

Flow Classification

NIC Poll Mode Drivers

*Other brands and names are the property of their respective owners

Page 16: Unlocking the SDN and NFV Transformation

Intel® DPDK

Accelerated

Open vSwitch

01.org DPDK.org

Memory Management

Queue Ring Functions

Flow Classification

NIC Poll Mode Drivers

Intel® Data Plane Development Kit

Enabling vSwitch and vRouter Innovation on Moore’s

Law

*White Box represents Open Source

virtual switch projects

*Other brands and names are the property of their respective owners

Page 17: Unlocking the SDN and NFV Transformation

Intel® DPDK

Accelerated

Open vSwitch OpenvSwitch.org

01.org DPDK.org

Memory Management

Queue Ring Functions

Flow Classification

NIC Poll Mode Drivers

Intel® Data Plane Development Kit

Enabling vSwitch and vRouter Innovation on Moore’s

Law

*Other brands and names are the property of their respective owners

*White Box represents Open Source

virtual switch projects

Page 18: Unlocking the SDN and NFV Transformation

Intel® DPDK

Accelerated

Open vSwitch OpenvSwitch.org

01.org DPDK.org

Memory Management

Queue Ring Functions

Flow Classification

NIC Poll Mode Drivers

Intel® Data Plane Development Kit

Enabling vSwitch and vRouter Innovation on Moore’s

Law

SDN Software

Switch

*Other brands and names are the property of their respective owners

*White Box represents Open Source

virtual switch projects

Page 19: Unlocking the SDN and NFV Transformation

Intel® DPDK

Accelerated

Open vSwitch

Commercial Virtual Switches

& Routers OpenvSwitch.org

01.org DPDK.org

Memory Management

Queue Ring Functions

Flow Classification

NIC Poll Mode Drivers

Intel® Data Plane Development Kit

Enabling vSwitch and vRouter Innovation on Moore’s

Law

SDN Software

Switch

*White Box represents Open Source

virtual switch projects

*Other brands and names are the property of their respective owners

Page 20: Unlocking the SDN and NFV Transformation

SERVICE CHAINING

Page 21: Unlocking the SDN and NFV Transformation

Intel Network Builders - Service Chaining Demo

Security Gateway

Load Balancer

IDS / IPS

WAN Optimization

*Other brands and names are the property of their respective owners

Page 22: Unlocking the SDN and NFV Transformation

Case Study:

China Mobile Cloud EPC and IMS

Mobile Phone

(Samsung)

Mobile Phone

(Samsung)

Mobile Phone

(Samsung)

*Other brands and names are the property of their respective owners

Page 23: Unlocking the SDN and NFV Transformation

Case Study:

China Mobile Cloud EPC and IMS

Mobile Phone

(Samsung)

Mobile Phone

(Samsung)

C-RAN (IBM/Agilent)

C-RAN (ALU)

Nanocell (Comba)

vMME(ALU)

vIMS

(ZTE)

vEPC (Huawei)

vIMS

(Huawei)

vEPC

(ZTE)- vMME

vS-GW/vP-GW

(ZTE)

R

R

H

R

R

H

vEPC

vS-GW/vP-GW (Cisco)

vMME(ALU),

vHSS(Linker networks)

Mobile Phone

(Samsung)

SIP Simulator

(IXIA)

*Other brands and names are the property of their respective owners

Page 24: Unlocking the SDN and NFV Transformation

China Mobile Cloud EPC and IMS

Common Platform of

Switches and Servers

Multi-Vendor

100% Software-based

All in a rack

*Other brands and names are the property of their respective owners

Page 25: Unlocking the SDN and NFV Transformation

FROM POC TO PRODUCTION

Page 26: Unlocking the SDN and NFV Transformation

*Other brands and names are the property of their respective owners

ROBERT MCBRIDE SENIOR PRODUCT MANAGER FOR

BROCADE

SOFTWARE NETWORKING

Page 27: Unlocking the SDN and NFV Transformation

Rackspace Case Study

Customers wanted additional network services at utility pricing

To keep competitive, CSP started using H/W to provide services

Huge up-front CAPEX – many months until realizing profits

Long lead times for customers – 3 to 7 days to get services hooked up

Limited functions & scale – H/W was shared with multiple customers

PROBLEM STATEMENT

25

Page 28: Unlocking the SDN and NFV Transformation

Brocade CSP Solution

26

• Full mesh VPN between multiple

VPCs and datacenter

• Layer 2or Layer 3

• Use for cloud bursting, HA, phased

application moves . . .

Key

IPSEC VPN (L3)

OpenVPN (L2)

INTERNET

Page 29: Unlocking the SDN and NFV Transformation

Summary and Call to Action

Global opportunities and challenges across

Cloud, Telecom and Enterprise

Open Source and Open Standards are vital to

unlocking the transformation

Intel is investing with partners across the industry

to lead the transformation

Page 30: Unlocking the SDN and NFV Transformation