application delivery 2 0application delivery 2

38
Application Delivery 2 0 Application Delivery 2.0 What is it? What is it? What does it mean to you? Jim Metzler [email protected]

Upload: others

Post on 21-Mar-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Application Delivery 2 0Application Delivery 2.0What is it?What is it?

What does it mean to you?

Jim [email protected]

Goals and NonGoals and Non--GoalsGoals

Goals of the Presentation:h Identify factors that currently impact

application deliveryapplication deliveryh Describe how a new generation

of technology is impacting of technology is impacting application delivery

Non-Goals:Non Goals:h Read every bullet on every slide

Agenda

Application Delivery 1.0A N G ti f A New Generation of Challenges & SolutionsSummary

Factors That Make Application Delivery Difficult TodayToday

Consolidation of IT resources

Distribution of employees

The deployment of protocols that are: hChatty; e.g., CIFS

hComputationally intense; e.g., SSLp y ; g ,

The prevalence of hacking

Factors That Make Application Delivery Difficult TodayToday

Lack of visibility

Stovepipes & MTTI

Applications have different characteristics

Complexity n-tier applications

Today’s Complex N-Tier IT Environment

End Users Application Servers

Web Servers

Database WANLANEnd Database Servers

DatabaseServers

ApplicationServers

Web ServersADCWANLANEnd Users

ADC refers to an Application Delivery Controller

Application and Infrastructure Complexity Increases TheThe

Probability of a performance problemy p pTime it takes to identify the root cause of performance problemsperformance problemsProbability of a security intrusiony yTime, cost, difficulty and risk of evolving the infrastructureinfrastructure

The Application Delivery Framework

The four components of the application delivery p pp yframework are:hPlanning & DesignPlanning & DesignhManagementhControlhNetwork and Application OptimizationNetwork and Application Optimization

Key Planning & Design Tasks Include:

Create a roadmap for each major component of ITIdentify the interdependencies Identify the critical applications and servicesEstablish goals for the performance of the key Establish goals for the performance of the key applications and servicesDesign for the appropriate levels of availability and performanceDevelop a management architecture

Application Performance Management Framework

Automatically map the business critical applications to the relevant components of the infrastructure.

Quantify how the performance of the infrastructure Quantify how the performance of the infrastructure impacts the performance of the applications.

Employ predictive and proactive monitoring of the infrastructure and applications to identify the infrastructure and applications to identify the components that are causing the degradation.I l t id t l i Implement rapid root cause analysis capabilities.

Control Control hClassify traffic based on myriad criterionhPrioritize traffic that is business critical and delay sensitivehPerform traffic management and dynamically allocate network resources hDetermine who has access to which assetshBlock unauthorized access at the perimeter of the companyhIdentify and shut down attacks

Application Response Time Equation1

R A li ti R TiR: Application Response TimePayload: Amount of data to be transmittedApp Turns: Required number of round tripsApp Turns: Required number of round tripsRTT: Round Trip TimeConcurrent Requests: # Simultaneous sessionsqCs: Server Side Compute timeCc: Client Compute time

1: Variation of an equation in “Why Centralizing Microsoft Servers Hurts Performance”, Peter Sevcik and Rebecca Wetzel, http://www.juniper.net/solutions/literature/ms_server_centralization.pdf

Common Optimization Techniques

To Reduce Payload: To Reduce Apps Turns:yhCompressionhCaching

pphRequest PredictionhRequest SpoofinghCaching

hDe-duplicationhRequest Spoofing

To Reduce Server Side C t TiTo Increase Goodput:

hForward Error Correction

Compute Time:hTCP MultiplexingForward Error Correction

To Reduce the Impact of RTT: hSSL Offload

To Reduce the Impact of hProtocol acceleration To Reduce the Impact of

Congestion:Q ShQoS

Characteristics of the Current Optimization Solutions

There are three general classes of solutions:hWAN Optimization Controllers (WOCs) & soft WOCshApplication Delivery Controllers (ADCs) & soft ADCshApplication Delivery Services (ADSs)

The goal of a WOC is to improve the performance of gapplications delivered from the data center to users in the branch office over a WAN such as ATM or MPLS.ADCs provide functionality such as reverse caching and compression and also offload computational intense tasks off the servers; i e TCP multiplexing processing of SSLthe servers; i.e., TCP multiplexing, processing of SSL

Structure of an Application Delivery Service (ADS)

ADS Functionality

Unlike a WOC or an ADC, an ADS improves the , pperformance of the WAN by providing:hRoute OptimizationphTransport Optimization

HTTP O ti i tihHTTP OptimizationhContent OffloadhFirewall-like Security

Agenda

Application Delivery 1.0A New Generation of Challenges & SolutionsgSummary

Computer Crime: More Organized and More SophisticatedSophisticated

McAfee estimated that the global damage from data g gloss to exceed $1 trillion.Credit card fraud is now a “cash cow” and cyber Credit card fraud is now a cash cow and cyber criminals are now focusing on intellectual property.Some malware writers now have R&D departments and test labs.A black market has evolved - botnets are available for rent; malware authors who sell their code and provide rent; malware authors who sell their code and provide support.

Virtualization Defined

Virtualization typically involves a logical abstraction yp y gof physical systems that allows one of the following:h A single physical system to be partitioned to appear as A single physical system to be partitioned to appear as

multiple independent logical systems; e.g., multiple VLANs defined on a single physical LAN.g p y

hMultiple physical systems to appear as single logical system; e.g., a compute cluster with a single system system; e.g., a compute cluster with a single system image or RAID disk array appearing to be a single large, reliable disk.

Virtual Servers

Application1

ApplicationN

Vi t l Vi t l

Guest OS 1 Guest OS N…

VM Monitor/Hypervisor

VirtualMachine 1

VirtualMachine N

VM Monitor/Hypervisor

Physical MachinePhysical Machine

Management Challenges Associated with Server Virtualizationwith Server Virtualization

Loss of insight into inter-VM trafficVM sprawlEffective capacity planningp y p gThe ease of (automatically) creating and/or moving a VM creates challenges:hEnsuring the VM has the same security, storage

access, and QoS configurations and policies. hKeeping track of where an application is running.

Virtual Desktops

A VM on a data center server hosts a complete user desktop i l di ll it li ti fi ti d i il including all its applications, configurations, and privileges. On the client device, the enterprise desktop is isolated from

h t l i i th PCwhatever else is running on the PC.Client-side virtualization – applications are delivered to the

d t ’ i l ti i t ft i t l end system’s isolation environment, often using a protocol such as CIFS.S id i t li ti th li ti d th d t i Server-side virtualization – the application and the data remain at the central side and are accessed using protocols such as Microsoft’s Remote Desktop Protocol (RDP), Citrix’s ICA, p ( ), ,and/or Teradici’s PCoIP.

The Challenges of Virtual Desktops

Cost of the extra servers in the data center.Virtual desktop systems need to be tightly integrated with policy management systems and user authorization to ensure that the desktop characteristics match the users' needs and permission profiles. Delivering acceptable application performance to the virtual desktop over the WAN. pThe inefficiencies associated with LAN-centric remote display protocols such as RDP limit the performance of display protocols, such as RDP, limit the performance of these protocols over the WAN.

Virtual Appliances

A Virtual Appliance (VA) is based on network appliance pp ( ) ppsoftware, together with its operating system.A VA runs in a virtual machine (VM) over the hypervisor A VA runs in a virtual machine (VM) over the hypervisor in a virtualized server. A VA can include WOCs ADCs firewalls routers and A VA can include WOCs, ADCs, firewalls, routers and performance monitoring solutions among others.A VA can alleviate some of the management burdens if the key management tasks can be automated and

t li d t th d t t centralized at the data center.

Silly Things That Get Said About Cloud ComputingComputing

Providing IT is like providing electricityProviding IT is like providing electricityYou know, it is like Salesforce.comYou no longer need to know how services are providedprovidedYou will always save a lot of moneyIt is a fundamentally new approach to IT

Cloud: A Lot of Things Old

Time sharingVirtualized computersVirtualized computersOut-taskingRenting applications

Cloud: A Few Things New

D i M t f Vi t l Dynamic Movement of Virtual Machines and the associated f ti litfunctionalityOn demand provisioning of On demand provisioning of IT resourcesN i l t ti d lNew implementation models

So, what is cloud computing?

D fi iti D d h t lk tDefinition: Depends upon who you talk to.Goal: A significant improvement in g pthe cost-effective, elastic provisioning of IT services.

Key Characteristics of a Cloud Computing SolutionSolution

Dynamic creation & movement of resources yVirtualization of IT resourcesAutomation of IT processesCentralization of IT resourcesCentralization of IT resourcesSimplification of IT servicespIncreased reliance on the WAN/Internet

Classes of Cloud Computing

PublicPublichSoftware as a ServicehInfrastructure as a ServicehPlatform as a ServicePlatform as a Service

PrivateHybrid

Planning for Cloud Computing

Determine your cost structureyIdentify what you will provide yourself and what will be provided by a third partybe provided by a third partyPerform due diligence on potential third partiesg p pSimplify the services and applications you provideStandardize the infrastructureIdentify how your implementation of server Identify how your implementation of server virtualization impacts other aspects of IT

Next Generation Management

Need visibility into inter-VM trafficyFocus management tasks at the VM levelNot just applications, but also servicesAutomate processes such as change and Automate processes such as change and configuration managementIntegrate processes such as fault and performance managementManage over multiple management domains

Next Generation ControlImplement virtualized desktops and mobile devicesEnsure that business managers do not bypass ITGuarantee that you can:Guarantee that you can:hControl where your data is storedhPass compliance auditshGet your data back whenever you want itGet your data back whenever you want it

Ensure that any third party provider will:K d f f i i ihKeep your data safe from security intrusionshHave adequate disaster recovery capabilities

Defense in Depth

Next Generation Network Acceleration & OptimizationOptimization

Resigned data center LAN and branch officesgIs the network “good enough”?Increased use of ADCs, WOCs – some of which are virtualized

Increased use of Application Delivery Services for Increased use of Application Delivery Services – for performance and distributed securityMore distributed access to the Internet

Agenda

Application Delivery 1.0A New Generation of Challenges & SolutionsChallenges & SolutionsSummaryy

Summary

Ensuring acceptable application delivery is Ensuring acceptable application delivery is challenging today.A new generation of challenges and solutions will dramatically impact application delivery.y p pp yIT organizations MUST plan for the challenges and solutions associated with Application Delivery 2 0solutions associated with Application Delivery 2.0.

References

The 2009 Application Delivery Handbookhttp://webtorials.com/abstracts/2009-Application-Delivery-Handbook.htmA Guide to Understanding Cloud Computingg p ghttp://www.webtorials.com/content/2009/11/a-guide-for-understanding-cloud-computing.htmlCloud Computing: A Guide to Risk Mitigationhttp://www.webtorials.com/content/2009/12/cloud-computing-a-reality-p p g ycheck-guide-to-risk-mitigation.htmlThe Challenges of Managing Virtualized Server Environmentshttp://www.ashtonmetzler.com/

Thank oThank you.

Jim [email protected]