application delivery 2 0application delivery 2
TRANSCRIPT
Application Delivery 2 0Application Delivery 2.0What is it?What is it?
What does it mean to you?
Goals and NonGoals and Non--GoalsGoals
Goals of the Presentation:h Identify factors that currently impact
application deliveryapplication deliveryh Describe how a new generation
of technology is impacting of technology is impacting application delivery
Non-Goals:Non Goals:h Read every bullet on every slide
Factors That Make Application Delivery Difficult TodayToday
Consolidation of IT resources
Distribution of employees
The deployment of protocols that are: hChatty; e.g., CIFS
hComputationally intense; e.g., SSLp y ; g ,
The prevalence of hacking
Factors That Make Application Delivery Difficult TodayToday
Lack of visibility
Stovepipes & MTTI
Applications have different characteristics
Complexity n-tier applications
Today’s Complex N-Tier IT Environment
End Users Application Servers
Web Servers
Database WANLANEnd Database Servers
DatabaseServers
ApplicationServers
Web ServersADCWANLANEnd Users
ADC refers to an Application Delivery Controller
Application and Infrastructure Complexity Increases TheThe
Probability of a performance problemy p pTime it takes to identify the root cause of performance problemsperformance problemsProbability of a security intrusiony yTime, cost, difficulty and risk of evolving the infrastructureinfrastructure
The Application Delivery Framework
The four components of the application delivery p pp yframework are:hPlanning & DesignPlanning & DesignhManagementhControlhNetwork and Application OptimizationNetwork and Application Optimization
Key Planning & Design Tasks Include:
Create a roadmap for each major component of ITIdentify the interdependencies Identify the critical applications and servicesEstablish goals for the performance of the key Establish goals for the performance of the key applications and servicesDesign for the appropriate levels of availability and performanceDevelop a management architecture
Application Performance Management Framework
Automatically map the business critical applications to the relevant components of the infrastructure.
Quantify how the performance of the infrastructure Quantify how the performance of the infrastructure impacts the performance of the applications.
Employ predictive and proactive monitoring of the infrastructure and applications to identify the infrastructure and applications to identify the components that are causing the degradation.I l t id t l i Implement rapid root cause analysis capabilities.
Control Control hClassify traffic based on myriad criterionhPrioritize traffic that is business critical and delay sensitivehPerform traffic management and dynamically allocate network resources hDetermine who has access to which assetshBlock unauthorized access at the perimeter of the companyhIdentify and shut down attacks
Application Response Time Equation1
R A li ti R TiR: Application Response TimePayload: Amount of data to be transmittedApp Turns: Required number of round tripsApp Turns: Required number of round tripsRTT: Round Trip TimeConcurrent Requests: # Simultaneous sessionsqCs: Server Side Compute timeCc: Client Compute time
1: Variation of an equation in “Why Centralizing Microsoft Servers Hurts Performance”, Peter Sevcik and Rebecca Wetzel, http://www.juniper.net/solutions/literature/ms_server_centralization.pdf
Common Optimization Techniques
To Reduce Payload: To Reduce Apps Turns:yhCompressionhCaching
pphRequest PredictionhRequest SpoofinghCaching
hDe-duplicationhRequest Spoofing
To Reduce Server Side C t TiTo Increase Goodput:
hForward Error Correction
Compute Time:hTCP MultiplexingForward Error Correction
To Reduce the Impact of RTT: hSSL Offload
To Reduce the Impact of hProtocol acceleration To Reduce the Impact of
Congestion:Q ShQoS
Characteristics of the Current Optimization Solutions
There are three general classes of solutions:hWAN Optimization Controllers (WOCs) & soft WOCshApplication Delivery Controllers (ADCs) & soft ADCshApplication Delivery Services (ADSs)
The goal of a WOC is to improve the performance of gapplications delivered from the data center to users in the branch office over a WAN such as ATM or MPLS.ADCs provide functionality such as reverse caching and compression and also offload computational intense tasks off the servers; i e TCP multiplexing processing of SSLthe servers; i.e., TCP multiplexing, processing of SSL
ADS Functionality
Unlike a WOC or an ADC, an ADS improves the , pperformance of the WAN by providing:hRoute OptimizationphTransport Optimization
HTTP O ti i tihHTTP OptimizationhContent OffloadhFirewall-like Security
Computer Crime: More Organized and More SophisticatedSophisticated
McAfee estimated that the global damage from data g gloss to exceed $1 trillion.Credit card fraud is now a “cash cow” and cyber Credit card fraud is now a cash cow and cyber criminals are now focusing on intellectual property.Some malware writers now have R&D departments and test labs.A black market has evolved - botnets are available for rent; malware authors who sell their code and provide rent; malware authors who sell their code and provide support.
Virtualization Defined
Virtualization typically involves a logical abstraction yp y gof physical systems that allows one of the following:h A single physical system to be partitioned to appear as A single physical system to be partitioned to appear as
multiple independent logical systems; e.g., multiple VLANs defined on a single physical LAN.g p y
hMultiple physical systems to appear as single logical system; e.g., a compute cluster with a single system system; e.g., a compute cluster with a single system image or RAID disk array appearing to be a single large, reliable disk.
Virtual Servers
Application1
ApplicationN
Vi t l Vi t l
Guest OS 1 Guest OS N…
VM Monitor/Hypervisor
VirtualMachine 1
VirtualMachine N
VM Monitor/Hypervisor
Physical MachinePhysical Machine
Management Challenges Associated with Server Virtualizationwith Server Virtualization
Loss of insight into inter-VM trafficVM sprawlEffective capacity planningp y p gThe ease of (automatically) creating and/or moving a VM creates challenges:hEnsuring the VM has the same security, storage
access, and QoS configurations and policies. hKeeping track of where an application is running.
Virtual Desktops
A VM on a data center server hosts a complete user desktop i l di ll it li ti fi ti d i il including all its applications, configurations, and privileges. On the client device, the enterprise desktop is isolated from
h t l i i th PCwhatever else is running on the PC.Client-side virtualization – applications are delivered to the
d t ’ i l ti i t ft i t l end system’s isolation environment, often using a protocol such as CIFS.S id i t li ti th li ti d th d t i Server-side virtualization – the application and the data remain at the central side and are accessed using protocols such as Microsoft’s Remote Desktop Protocol (RDP), Citrix’s ICA, p ( ), ,and/or Teradici’s PCoIP.
The Challenges of Virtual Desktops
Cost of the extra servers in the data center.Virtual desktop systems need to be tightly integrated with policy management systems and user authorization to ensure that the desktop characteristics match the users' needs and permission profiles. Delivering acceptable application performance to the virtual desktop over the WAN. pThe inefficiencies associated with LAN-centric remote display protocols such as RDP limit the performance of display protocols, such as RDP, limit the performance of these protocols over the WAN.
Virtual Appliances
A Virtual Appliance (VA) is based on network appliance pp ( ) ppsoftware, together with its operating system.A VA runs in a virtual machine (VM) over the hypervisor A VA runs in a virtual machine (VM) over the hypervisor in a virtualized server. A VA can include WOCs ADCs firewalls routers and A VA can include WOCs, ADCs, firewalls, routers and performance monitoring solutions among others.A VA can alleviate some of the management burdens if the key management tasks can be automated and
t li d t th d t t centralized at the data center.
Silly Things That Get Said About Cloud ComputingComputing
Providing IT is like providing electricityProviding IT is like providing electricityYou know, it is like Salesforce.comYou no longer need to know how services are providedprovidedYou will always save a lot of moneyIt is a fundamentally new approach to IT
Cloud: A Lot of Things Old
Time sharingVirtualized computersVirtualized computersOut-taskingRenting applications
Cloud: A Few Things New
D i M t f Vi t l Dynamic Movement of Virtual Machines and the associated f ti litfunctionalityOn demand provisioning of On demand provisioning of IT resourcesN i l t ti d lNew implementation models
So, what is cloud computing?
D fi iti D d h t lk tDefinition: Depends upon who you talk to.Goal: A significant improvement in g pthe cost-effective, elastic provisioning of IT services.
Key Characteristics of a Cloud Computing SolutionSolution
Dynamic creation & movement of resources yVirtualization of IT resourcesAutomation of IT processesCentralization of IT resourcesCentralization of IT resourcesSimplification of IT servicespIncreased reliance on the WAN/Internet
Classes of Cloud Computing
PublicPublichSoftware as a ServicehInfrastructure as a ServicehPlatform as a ServicePlatform as a Service
PrivateHybrid
Planning for Cloud Computing
Determine your cost structureyIdentify what you will provide yourself and what will be provided by a third partybe provided by a third partyPerform due diligence on potential third partiesg p pSimplify the services and applications you provideStandardize the infrastructureIdentify how your implementation of server Identify how your implementation of server virtualization impacts other aspects of IT
Next Generation Management
Need visibility into inter-VM trafficyFocus management tasks at the VM levelNot just applications, but also servicesAutomate processes such as change and Automate processes such as change and configuration managementIntegrate processes such as fault and performance managementManage over multiple management domains
Next Generation ControlImplement virtualized desktops and mobile devicesEnsure that business managers do not bypass ITGuarantee that you can:Guarantee that you can:hControl where your data is storedhPass compliance auditshGet your data back whenever you want itGet your data back whenever you want it
Ensure that any third party provider will:K d f f i i ihKeep your data safe from security intrusionshHave adequate disaster recovery capabilities
Defense in Depth
Next Generation Network Acceleration & OptimizationOptimization
Resigned data center LAN and branch officesgIs the network “good enough”?Increased use of ADCs, WOCs – some of which are virtualized
Increased use of Application Delivery Services for Increased use of Application Delivery Services – for performance and distributed securityMore distributed access to the Internet
Agenda
Application Delivery 1.0A New Generation of Challenges & SolutionsChallenges & SolutionsSummaryy
Summary
Ensuring acceptable application delivery is Ensuring acceptable application delivery is challenging today.A new generation of challenges and solutions will dramatically impact application delivery.y p pp yIT organizations MUST plan for the challenges and solutions associated with Application Delivery 2 0solutions associated with Application Delivery 2.0.
References
The 2009 Application Delivery Handbookhttp://webtorials.com/abstracts/2009-Application-Delivery-Handbook.htmA Guide to Understanding Cloud Computingg p ghttp://www.webtorials.com/content/2009/11/a-guide-for-understanding-cloud-computing.htmlCloud Computing: A Guide to Risk Mitigationhttp://www.webtorials.com/content/2009/12/cloud-computing-a-reality-p p g ycheck-guide-to-risk-mitigation.htmlThe Challenges of Managing Virtualized Server Environmentshttp://www.ashtonmetzler.com/