Beruflich Dokumente
Kultur Dokumente
Confidential
2009 VMware Inc. All rights reserved
Cloud Web Client/Server + Distributed CPU utilization + Simple to deploy and manage + Broader access + Frictionless deployment + Simplified mgmt thru abstraction + On-demand scale
Cloud is not a destination, but a way + Scale + Unparalleled of doing computing. + Added flexibility flexibility + Centralized mgmt - Limited flexibility
Mainframe + Secure - Limited access - Inflexible - Costly - Complex / costly Paul Maritz - Limited efficiency to deploy & President & CEO, manage - NotVMware secure - Not secure - Not efficient + Secure + Highly efficient
Confidential
CIO Technology
2010 Priority
2009 Priority
Virtualization
Cloud Computing
14
Efficiency thru Utilization and Automation Pooling From machines to on-demand, highly elastic resource pools
Freedom of Choice
Open & Interoperable Application mobility between clouds, based on open standards
Control Application-aware infrastructure with built-in availability, scalability, security and performance guarantees
Leverage Existing Investments Benefits of cloud computing to existing applications and datacenters
Confidential
Confidential
Enterprises
Private Cloud
Operated solely for an organization, typically within the firewall Low total cost of ownership Greater control over security, compliance, QoS Easier integration Support existing applications
Confidential
The Cloud The Giant Computer 32 hosts 2,048 processor cores 1,280 virtual machines 3 Million IOPs 32TB of RAM 16PB of storage
Confidential
95% of Applications
VMware Infrastructure 3
VMware vSphere 4
CPU
1 to 2 CPUs
4 VCPUs
8 VCPUs
% of Applications
Memory
< 4 GB per VM
64 GB per VM
256 GB per VM
Network
9 Gb/s
30 Gb/s
IOPS
< 10,000
100,000
350,000
HPC
Applications Performance Requirements
Confidential
SaaS
Zimbra
File/ Print
Directory
PaaS
Enterprise vSphere: View : Desktop Computing Platform for Cloud via Cloud Infrastructure
Private Cloud
Public Cloud
10
Confidential
11 Confidential
vCloud
APIs
VDC vService vSphere Security & Network vServices VMware vSphere Compute | Storage | Network Cluster vShield Manager vCenter Server
12
Confidential
13
Confidential
Secure Networking
Installation
Organization vDC 1 vApp vDC 2 vApp
Network
A VLAN or Portgroup, plus gateway, netmask, and IP range, named and associated to a container A single network can be shared between multiple organizations with soft restrictions set on IP address usage
ND
ND
Private Public VLAN 1 VLAN 2
Created and configured at attachment time. create an isolated vDC, deploy fenced
14
Confidential
User Security
Organizations and Multi-Tenancy
Org 1: Coke Org 2: Pepsi Org 3: Dr Pepper
Users only get access to resources that are associated with their organizations Authentication off of central or tenant specific LDAP Roles and Rights The system comes with built-in roles that range from root to view-only users Custom roles can be defined by those with the rights from a set of over 50 rights If a user has multiple roles he/she gets the union of rights
15
Confidential
Image Transfer
Client
Transfer session
Message Bus
Datastore
Spooling FS
70%
30%
15%
How?
17 Confidential