Sie sind auf Seite 1von 38

NET1674

Advanced Topics & Future


Directions in Network
Virtualization with NSX
Bruce Davie, VMware, Inc

Disclaimer
This presentation may contain product features that are currently under development.
This overview of new technology represents no commitment from VMware to deliver these

features in any generally available product.

Features are subject to change, and must not be included in contracts, purchase orders, or

sales agreements of any kind.

Technical feasibility and market demand will affect final delivery.


Pricing and packaging for any new technologies or features discussed or presented have not

been determined.

CONFIDENTIAL

Objectives
Provide an update on latest NSX capabilities
Provide some insight into future NSX direction
Deepen your understanding of network virtualization and its value

CONFIDENTIAL

Overview
Network Virtualization in One Slide
Physical Network Integration
Encapsulations
Service Chaining
Multi-site Network Virtualization
Summary

CONFIDENTIAL

Network Virtualization an Analogy


Application

Application

Workload

Application

Virtual
Machine

Workload

L2, L3, L4-7 Network Services

x86 Environment
Virtual
Machine

Workload

Virtual
Machine

Hypervisor
Requirement: x86

Physical Compute & Memory

Virtual
Network

Decoupled

Virtual
Network

Virtual
Network

Network Virtualization Platform


Requirement: IP Transport

Physical Network
CONFIDENTIAL

NSX Network Virtualization Platform


Virtual Network

Controller Cluster

Cloud Management
Platform

L2
L3
L2

Northbound
NSX API
VTEP API
Software

HW Partner

NSX vSwitch

NSX vSwitch

vSphere Host

vSphere Host

Open vSwitch

KVM

Open vSwitch

Xen Server

NSX Edge

Hardware
VLAN
VLAN

Physical Network

Connecting the Physical to the Virtual


Logical network

Controller Cluster
VM MACS
API (OVSDB)

DB

Tunnels (VXLAN)
vSwitch
vSwitch
vSwitch
Hypervisor
vSwitch
Hypervisor
Hypervisor
Hypervisor

IP Underlay
(no mulitcast required)

PHYMACS

Physical
Workloads

Distributed Logical Routing (P

V)
192.168.1.1

192.168.1.254

192.168.2.254

vSwitch
Hypervisor

192.168.1.1

192.168.2.1

Logical View

192.168.2.1

Physical View

Packet Walk
ARP: IP=192.168.1.254
SRCMAC=VM
192.168.1.1
ARP_REP: IP=192.168.1.254
MAC=LogicalRouter_A
vSwitch
Hypervisor

ARP: IP=192.168.2.1
SRCMAC=Hypervisor
VNI=2

ARP_REP: IP=192.168.2.1
MAC=Physical
ARP: IP=192.168.2.1
VNI=2
SRCMAC=LogicalRouter_B
ARP_REP: IP=192.168.2.1
MAC=Physical
192.168.2.1

Distributed L3
The other paths (PV, VV, PP) are similar
Routers ARP reply always comes from nearby VTEP or vswitch
That node then ARPs toward the ultimate destination

Note that the LR is fully distributed among VTEPs and vswitches


Any E-W traffic will travel directly between hypervisors
No single device does all routing

CONFIDENTIAL

10

VTEP Futures
BFD health monitoring
Mitigate service node failures
Provide overlay health monitoring/troubleshooting

ACL configuration
QoS DSCP setting
Higher layer services (e.g. ADCs)

CONFIDENTIAL

11

Handling Elephant Flows


1.

Detect Elephants

Must be long-lived and high-bandwidth

vSwitch ideally suited for task, maybe combine with central control

2.

Do something with them:

Mark the outer DSCP

Put them in a queue separated from mice

Route along their own path or network

Convert to mice

CONFIDENTIAL

12

Results flow statistic detection & alternate queue reaction


1000

10

950

900

850

800

750

700

650

600

550

500

0
1

11

21

31

41

51

61
71
81
Time (Secs)

91

101

111

121

131

Latency ms)

Bandwidth (Mbps)

Mice vs Elephants (Detection off)

Elephant
Mice

cumulusnetworks.com
13

Results flow statistic detection & alternate queue reaction


1000

10

950

900

850

800

750

700

650

600

550

500

Latency (ms)

Bandwidth (Mbps)

Mice vs Elephants (Detection on)

Elephant
Mice

0
1

11

21

31

41

51

61
71
81
Time (Secs)

91

101

111

121

131

cumulusnetworks.com
14

Tunneling
Networking people love to argue about tunnel formats
Primarily a low-level detail of the implementation
But tunnel format matters:
Interoperability (HW + SW endpoints)
ECMP on current switches
Extensibility
Performance
Visibility

Current options (VXLAN, NVGRE, STT) all fall short somewhere


Enter Geneve (Generic Network Virtualization Encapsulation)
VMware, Microsoft, Red Hat, Intel (the x86 world)

CONFIDENTIAL

15

Tunnels are like cables


Virtual Network

Physical

WORLD

Copper Cable
Controller

Third party hardware

Geneve

Geneve

VXLAN
Cable
Hypervisor

VXLAN
Cable
STT
Geneve
Cable

Hypervisor

Geneve Header
MAC
IP
UDP
Geneve
Options
Inner Eth
Inner IP
Inner L4
Payload

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Ver| Opt Len |O|C|
Rsvd. |
Protocol Type
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Virtual Network Identifier (VNI)
|
Reserved
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Variable Length Options
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

CONFIDENTIAL

17

How the Options Are Used


<Type, length, value> structure
Type is structured to allow vendor-specific options

C bit indicates critical options


Example use:
convey the source or dest of a packet when that info cant be determined from other fields
e.g. ARP request from a logical router could be from anywhere physically
Mirrored packets might be sent somewhere other than dest address
Indicate traceflow packets
Carry logical port info for egress policy
State versioning
Service chaining
etc.

CONFIDENTIAL

18

What about VXLAN, STT, etc.?


Hardware that supports VXLAN and STT will be around for a long time
If youre buying switches today, theyll support VXLAN
VXLAN NIC offloads also available today
Of course well continue to support VXLAN & STT
Easy for us to support multiple encapsulation types
We mix & match STT & VXLAN (and GRE) today

Geneve goal is that we dont need another encap for a long time

CONFIDENTIAL

19

Service Chaining

VPN
IPsec/SSL

Firewall

Partner
VNF

Creating a graph of services (e.g. load balance, firewall, WAN optimize, etc.)
Network virtualization provides a natural way to do this in automated manner
Creating virtual topologies

Often need to pass metadata along the chain


e.g. make the results of a classification step available to a later node
Ongoing argument about how to pass this metadata Geneve provides a reasonable option

CONFIDENTIAL

20

Service Chaining Example: E-W Firewall & Routing


Logical View
Web

App

Web

App
3rd Party FW

vSwitch
Hypervisor1

3rd Party FW
vSwitch
Hypervisor1
Hypervisor2

Physical View

Multi-Site Network Virtualization


We support some multi-site scenarios today (see NET1974)
E.g. stretched metro cluster
Snapshot, clone, restore across locations

Important to think of the full picture, not just networking


E.g. do you want to migrate a VM across the WAN without its data?
Where does your Cloud Management Platform live? How many CMP instances?

Lots of distinct use cases plenty of work ongoing

22

The Multi-Site Spectrum

Single DC
Federation
Sub-ms latency
High BW

Metro Area
DCs
Low-ms latency
High BW

Geographically
Dispersed DCs
100-ms latency
Constrained BW

CONFIDENTIAL

23

Connecting Virtualized Data Centers to the WAN

NSX
Edge

IP/MPLS CORE

To Customer Sites

PE

vSwitch
Hypervisor

vSwitch
Hypervisor

vSwitch
Hypervisor

Using Option B to Map Logical Networks to MPLS Labels


Logical Network Prefixes
advertised in MP-BGP with MPLS
labels

NSX
Edge

MPLS Core
To Customer Sites

ASBR
MPLS Labelled Packets mapped
to/from logical networks
Treat interface like
inter-AS (RFC 4364)

Multi-site using MP-BGP

MP-BGP

vSwitch
Hypervisor

vSwitch
Hypervisor

vSwitch
Hypervisor

NSX
Edge

WAN

NSX
Edge

vSwitch
Hypervisor

vSwitch
Hypervisor

vSwitch
Hypervisor

Multi-site using MP-BGP


NSX API
VM

NSX API
VM

VM

MP-BGP

vSwitch
Hypervisor

vSwitch
Hypervisor

vSwitch
Hypervisor

NSX
Edge

WAN

NSX
Edge

vSwitch
Hypervisor

vSwitch
Hypervisor

vSwitch
Hypervisor

Controller State Distribution


Transport
Network

WebService
API

NSX Controller

NSX Controller

Persistent
Storage

NSX Controller

NSX Controller

Logical
Network

NSX Controller

Controller
Cluster

Node1

Node2

Node3

Node4

All nodes active


Workload sliced among nodes
Logical network state semantically rich

Node5

Controller State Distribution


Transport
Network

WebService
API

NSX Controller

NSX Controller

Persistent
Storage

NSX Controller

Logical
Network

NSX Controller

NSX Controller

Controller
Cluster

Node1

Node2

Node3

Node4

Node5

Summary
Network virtualization not just for the bleeding edge
Physical networks are part of the story
Control the physical edge for non-virtualized workloads and north-south traffic
Communicate with the underlay for congestion/elephant flow mitigation
Keep moving up the stack

Tunneling a detail, but an important one


Multi-site
Consider use case & complete system
Some solutions today, more soon

Exciting times for networking!

30

Related Sessions

Hands-on Labs
SDC-1402
SDC-1420

vSphere Distributed Switch from A to Z


Introduction to VMware NSX
OpenStack with VMware vSphere and NSX

SDC-1423

vCloud Suite Basic Networking

SDC-1424

VMware NSX and SDDC

SDC-1425

VMware NSX Advanced

SDC-1403

32

Advanced Technical Track - Networking


NET1949
NET1589

VMware NSX for Docker, Containers & More


Reference Design for SDDC with NSX & vSphere

NET1583

NSX for vSphere Logical Routing Deep Dive

NET1974
NET1966

Multi-Site Data Center Solutions with VMware NSX


Operational Best Practices for VMware NSX

NET1592

Under the Hood: Network Virtualization with OpenStack Neutron & VMware NSX

Group Discussions - Networking


NET3441-GD

vSphere Distributed Switch


NET3442-GD vCAC and NSX
NET3443-GD NSX Routing Design Best Practices
NET3445-GD

NSX Multi Site Deployments

NET3444-GD

NSX Network Services


CONFIDENTIAL

33

Technical Track - Networking


NET1846
NET1743

Introduction to NSX
VMware NSX A Technical Deep Dive

NET1957

NFV for Telco Infrastructure

NET1468
NET1586

A Tale of Two Perspectives: IT Operations with VMware NSX


Advanced Network Services with NSX

NET1560

The NSX Guide to Horizon View

NSX1883
NSX1588

NSX Performance Overview


Load Balancer as a Service, using NSX or Partner Solutions

NET1401

vSphere Distributed Switch Best Practices for NSX

NET2318
NET1581

Scale-Out NSX Deployments: With VMware-powered SDDC


Reference Design for SDDC with NSX for Multi-Hypervisors

NET2379

Dynamically Configuring Application Specific Network Services for vCAC &NSX

NET2225

NSX Platform: Enabling 3rd Party Network & Security Solutions

CONFIDENTIAL

34

Thank You
Bruce Davie
bdavie@vmware.com

Thank You

Fill out a survey


Every completed survey is entered into a
drawing for a $25 VMware company store
gift certificate

NET1674

Advanced Topics & Future


Directions in Network
Virtualization with NSX
Bruce Davie, VMware, Inc

Das könnte Ihnen auch gefallen