Cisco Live Las Vegas is again around the corner – So back to Mandalay Bay , like it or not
This year will be a very special one with a 2 years celebration of the UCS launch!
In case you missed the comments on this incredible journey, check some of our recent blogs on the subject.
At this point, I am pretty sure that you have already made your plan for this conference (Flying in or not)
Whether you’re coming or not, first thing you want to do is to follow and use our special hash tag #cldc11 in addition of the general #cl11 hash tag
So if you registered to the physical event, here a website to visit to know the data center activities
Please check to make sure that you don’t miss an opportunity to educate yourself, and to meet great people
If you are a data center blogger , please let us know using the following spreadsheet.
I will send you an invitation for a special meet up /happy hours on Monday July 11th -5:00 to 6:30 pm
It will be an additional opportunity to meet our team of bloggers , as well as other bloggers – The virtual world as certainly a lot of virtues, but sometimes it’s great to have face to face conversations .
To thank you for coming , I am organizing also a little raffle with the opportunity to win an iPad
I want also to bring your attention on the presence of numerous Data Center partners who are instrumental in creating with us very compelling solutions : Vblock, Flexpod , Desktop Virtualization, Cloud computing, UCS, Mission Critical applications.
If you are not coming to Cisco Live in Las Vegas , you still can attend some of the sessions on Cisco Live Virtual. So I invite you to register on the website, as the key notes and a significant numbers of sessions will be streamed .
I hope to see you in Las vegas
Tags: Cisco, cisco live, cloud, virtualization
Today, I wanted to point out a couple of great resources to develop a deeper understanding of Cisco’s virtual switch, the Nexus 1000V.
First, we were excited to have Prashant Gandhi, our Sr. Director of Product Management for the Nexus 1000V, be invited onto the latest Packet Pushers Podcast, hosted by Greg Ferro. If you aren’t yet familiar with the PP Podcasts, they are an entertaining technical dive into a wide range of networking concepts with guests from vendors as well as large IT organizations. Greg’s expertise lies in the data center and with all things networking, including virtualization and L4-7 application services. In this podcast, all about the Nexus 1000V, Greg, Prashant and the other co-hosts talk about the architecture and deployment issues. There’s an extensive comparison of Cisco’s 802.1Qbh virtual Ethernet bridge protocol with the 802.1Qbg proposal from HP, VEPA. Listen to the full podcast here.
Greg had made an earlier plea on his blog that he wasn’t getting enough Cisco guests. We were happy to help out and enjoyed the interaction. We talked about having Prashant back on a future show to talk about vPath and the Virtual Security Gateway (VSG), the virtual firewall running on the Nexus 1000V. We look forward to that as well.
For a deeper, hand-on dive into the Nexus 1000V, nothing beats the Cisco CloudLab (http://cloudlab.cisco.com). We’ve set up an online workbench configured with all the tools and software to play around with the virtual switch yourself. Cisco Cloudlab is available to folks outside Cisco, but you will have enter the name of a Cisco employee sponsor to approve access. There are a number of lab exercises you can walk through to get a general overview, install or upgrade the Nexus 1000V, as well as VSG.
Of course, if you are really ready to test it out on your own, you can always download a trial version for your own system at the Nexus 1000V page (http://www.cisco.com/go/nexus1000v).
Tags: Nexus 1000v, Virtual Security Gateway
I’m not a car person and I don’t worry too much about what’s under the hood. That means that I’m just a car user, I only want to turn the ignition key and drive. In the Data Center world, the server team is typically a user of the network. Server guys don’t want to know how the network is implemented. They just want their VLANs to extend to the whole network so that they can connect their devices with no constraint, without having to worry about high availability, risk containment, link provisioning… network stuff. That’s precisely what FabricPath is designed to offer them: a network that looks like a single switch, the simplest networking entity. This “Fabric” offers efficient any-to-any connectivity with high bandwidth and low latency, all without having to understand how it works.
Of course, this user perspective is an abstraction. The following Figure 2 represents an example of the physical topology of the network, a Clos fabric, typical in Data Center environments. Note that this could just as well be a ring, a star, or even a network distributed across two sites. FabricPath turns an arbitrary topology into a Fabric and does not lock you into a particular model.
Read More »
Tags: ethernet, Ethernet Fabric, fabric architecture, FabricPath, l2mp, Layer 2, multipathing, nexus, STP, switching, TRILL, Unified Fabric
Virtualizating Microsoft SQL on Cisco UCS, The Usual Suspects of why people don’t virtualize SQL Server
Read More »
Tags: Cisco, Cisco UCS, Data Warehouse, Hyper-V, Microsoft SQL Server, OLTP, Server Consolidation, SQL, SQL Server 2008R2, UCS, UCS B250 M2, virtualization, VMware vSphere
This week’s focus on Cisco’s Unified Network Services (UNS) portfolio looks at cloud orchestration and the concept of a Network Hypervisor. What is a “Network Hypervisor”?
In the same way that a traditional hypervisor can offer up a modular, replicable set of virtual server resources (including OS, CPU slice, network interfaces), a network hypervisor is a modular abstraction of reusable network services to assemble a flexible data center or cloud infrastructure. Sounds interesting so far, but what does the network hypervisor actually do?
The first function is to allow organizations to pre-define and replicate the modular network containers that abstract a rigid underlying network infrastructure from the needs of individual applications and services. An example of a network container might be defined to include individual components such as logical VM ports, load balancer and firewall. This logical network environment can be assigned and isolated to a particular tenant to provide the network services a particular application needs and where the application VMs can be placed. The figure below shows how some modular, pre-defined containers can be nested and plugged together to offer customized services for a particular tenant. A small number of defined containers can be replicated and plugged together in a large number of permutations to address a wide range of application requirements.
These flexible, pre-defined containers can be device agnostic, just like their server counterparts, and help provide security and quality of service through tenant isolation, as well as application resiliency. During the application and VM provisioning process, the defined network containers advertise their capabilities and are deployed along with the VM in the proper locations. Just like the VMs they are aligned with, the network containers are location-independent and handle all the changes required during VM-mobility, ensuring that the application has the same network services in the new location. Obviously this goes well beyond just the layer 2 and 3 networking services, through to the layer 4-7 application services like load balancing, WAN optimization, and security as mentioned earlier.
Read More »
Tags: cloud, IaaS, OverDrive, Service Orchestration, UNS