EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

AF

Understanding Key Datacenter Technologies and Solutions

Understanding key Datacenter technologies and Solutions:

As we have growing in technologies, we are moving towards innovation and enhancement around all technologies in very fast manner, and same applies to Datacenter technologies.

From Traditional Datacenter technologies there has been a paradigm shift where we moved from first generation technologies to fourth gen technologies that is from monolithic servers to virtualized environment.

When we work with various technologies, it is always required to learn how these technologies works, what are the available solution that we can use to integrate it with our customer environment.

Here we will be discussing some key datacenter technologies and what are its solutions:

Cloud Computing

  • It is type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand.
  • It is a model for enabling ubiquitous, on-demand access to shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services) provisioned minimal management effort.
  • This relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid over an electricity network.)

There are four delivery models in Cloud Computing:

  1. Private Cloud
  2. Public Cloud
  3. Hybrid Cloud
  4. Community Cloud

Some example which are very much used in today’s environment are: AWS , Azure , Google Cloud etc.

Three unique categories within Cloud Computing:

  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)

Software as a Service (SaaS)

  • Capability to run applications on a cloud infrastructure.
  • Applications are accessible from several client devices via either a thin client interface, like a web browser e.g., web-based email
  • Interplay between outside world and organization. e.g., email newsletter campaign software
  • Software for a short term requirement. e.g., collaboration software for particular project
  • “Vanilla” offerings where the solution is not differentiated.
  • Consumer does not control or manage the underlying cloud infrastructure, which includes servers, network, operating systems and storage.
  • SaaS is not suitable in scenarios where the application
  • processes quick real time data.
  • has a regulation or legislation that does not allow data being hosted externally.
  • existing on-premise solution that satisfies all of the requirements of organization.

Platform as a Service (PaaS)

  • Computing platform that permits creating web applications effortlessly, fast, with no complexity of buying or maintaining the infrastructure and software.
  • Services to develop and test applications, as well as deploy, host and maintain applications in the similar integrated development environment.
  • Ability to deploy on cloud infrastructure with the help of programming languages, services, libraries, and tools.
  • Built in scalability of deployed software with failover and load balancing.
  • Integration with databases and web services through common standards.

Infrastructure as a Service (IaaS)

Capableness to provide networks, processing, storage, and other fundamental computing resources, and ability to deploy, run arbitrary software that can include operating systems and applications. Here, the consumer is incapable of controlling or managing the underlying cloud infrastructure.

  • Resources are distributed as a service and enables dynamic scaling
  • Utility pricing model
  • Multiple users on one hardware Applicability-
  • New organizations with less capital could invest in hardware easily
  • Organizations growing rapidly
  • Pressure on the organization to restrict capital expenditure and to migrate to operating expenditure

Next Generation Security:

As we have moved from standard firewall Security appliances that is by using both physical and virtual, in this generation we are now offering security products with greater amounts of security. The best security products must have ability to offer granular control over content which comes and leave the datacenter environment, now a days there are two types of models working, providing cloud based security, Proxy or providing strong Hardware appliance which has the capability of protecting internal applications and prevent the leakage of information through powerful Data Loss Prevention engines.

There are various Vendors which are providing various security products like l4-L7 capable Firewall, IDS, IPS, Proxy (Appliance based, cloud based), Antivirus systems protecting malware. There are following models which are mostly used:

  • Virtual and Physical Firewalls
  • Cloud Security
  • IPS/DLP
  • Application Firewalls

Virtualization: These are days of Virtualization, We have moved from high tower ends servers called monolithic servers to Blade servers which can be virtualized to have multiple Virtual machines or virtual servers to host different application, while doing, this not only preserve the datacenter resources like Power, Space, cabling , CopEx and Opex  but also provide good control over the server farms.

From servers, we have now moved to virtualize our networking and security products and most of the OEM providing VNF to integrate the virtual appliance in DC installed of Physical appliance:

Some of the very fine virtualized technologies which are being used are:

  • Application (ThinApp, XenApp, App-V)
  • Server (VMware, Hyper-V, XenServer)
  • Desktop (XenDesktop, View)
  • Network (SDN, VMware, NetScaler, Cisco)
  • Storage (NetApp, IBM, Compellent, etc.)

Introduction to SDN

The main idea behind SDN is to separate control and data plane and to make networks agile and flexible.

SDN is a trend that is gaining importance with established vendors such as Brocade, Cisco, HP, and VMware. We can briefly see in the later sections about the different vendors.

Let's see the timelines of SDN.

  • 1990 - 2000 -- Programmable functions in the network is introduced by Active networks to enable greater innovation.
  • 2001 - 2007 -- Separation of control and data plane, which developed open interfaces between the control and data planes.
  • 2007 - 2010 -- The OpenFlow API and network operating systems, developed ways to make control-data plane separation scalable and practical.

Network virtualization played an important role throughout the evolution of SDN

Mobile & Micro Device: As are moving from micro to nano technologies, there has been shift from accessing the data or application from servers or desktops to mobile devices or from tablets, IPODs etc.

Various accessing devices like more phones, tablets, and PCs are now being used as different method to conducting a meetings, accessing data and do business. End users are getting benefits by using their own devices in accessing data, doing office work instead of using company provided machine which sometimes very difficult in case of mobile users. Using their own devices proves to be more productive. To support this various companies have used one Model like BYOD (Bring your own devices), which this model, anyone can use its own devices to work and can be able to connect to corporate network.

 

 



Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.