Cloud computing data center network architecture technology analysis

Cloud computing opens IT innovation. Network transformation should be born in the "cloud". Cloud computing will bring structural changes to the data center network. It is imperative to design a next-generation network architecture and technical standards that adapt to cloud computing. In the era of cloud computing, everything will undergo fundamental changes. As an IT infrastructure platform, the network will undergo fundamental innovation in its overall architecture, equipment components, protocol selection, and key technologies.

1. Cloud computing basic architecture

The concept of cloud computing is not specific. There are many definitions in various aspects. From the perspective of users, users are allocated on demand without having to understand resources, and computing resources are virtualized into a cloud. The current mainstream cloud computing concept is more relevant to cloud services. Now it is the virtual machine that provides the rental service, the software platform, and more likely the application.

1.1 Five characteristics of cloud computing

The five characteristics of cloud computing are user self-service on demand; wide network access to the services provided by cloud computing at any time, place and access method; need to occupy pooled resources that need not be released; timely response to user resource needs Good flexibility for expansion and contraction scheduling; provide billing services for operating public services and time measurement of resource usage.

1.2 Cloud computing layered architecture

The three levels of cloud computing services are hardware as a service IaaS (Infrastructure as a Service), platform as a service PaaS (Platform as a Service) and software as a service SaaS (Software as a Service), respectively corresponding to hardware resources and platform resources And application resources.

1.3 Centralized Cloud and Decentralized Cloud

A centralized cloud is a virtual one in the true sense. It integrates hundreds or thousands or more of server resources, performs unified computing, and provides external services. Cloud technology is divided into two types: active and standby and load balancing. Mainly used in national applications and large Internet service providers.

Decentralized cloud, using a virtual multi-technology, is to divide a server or PC into multiple virtual machines through VMware-like software to achieve the highest utilization of CPU, memory and bandwidth. The current main technologies include operating system virtualization and host virtualization And Bare-Metal virtualization. Mainly used in SMEs and individuals.

1.4 Public Cloud and Private Cloud

The public cloud is placed on the Internet, as long as it is a registered user and a paid user.

The private cloud is placed in a private environment, such as enterprises, governments, organizations, etc. built in the computer room themselves, or the operator has built it, but the whole is leased to an organization. Users outside companies, organizations, governments, etc. cannot access or use.

2. Cloud computing data center large second layer network architecture

2.1 The second-tier network architecture design

2.1.1 Design principles

1) High availability: In order to provide the most secure and reliable data storage center for cloud computing end users, the network platform must ensure highly reliable network access services and achieve "always online" network connection;

2) Ease of use: The network platform needs to have good compatibility of different terminals and access methods to maximize the scope of computing services, while reducing and simplifying the requirements for user terminal equipment, so that users can use "any terminal, location, Way "to obtain cloud computing services;

3) Scalability: The network platform must adapt to the development of cloud computing, have scalability, and be able to flexibly access new cloud computing centers and new terminals to provide services quickly.

2.1.2 Big two-tier architecture

The next-generation network platform uses a large two-layer architecture, as shown in Figure 1, divided into an access layer and a core layer. With the expansion of the cloud computing data center network scale and greater traffic bandwidth requirements, there will no longer be a bottleneck aggregation layer that reduces the forwarding performance in the middle of the network. Now it can be said that the typical architecture of the cloud computing data center is the Gigabit access shown in the above figure, and the two-layer flat network structure of the 10 Gigabit core.

2.2 The demand of cloud computing for the next network technology

1) The east-west traffic between servers will become mainstream, and the demand for network layer 2 traffic will increase.

2) The increase in the number of virtual machines and physical servers will cause the network layer 2 topology to continue to grow.

3) The pressure of internal communication in the data center increases, which has higher requirements on network bandwidth and delay.

4) Capacity expansion requirements, disaster backup, and virtual machine migration. The large second layer of the network between multiple sites in the data center requires interoperability.

5) The complexity of network routing at multiple sites in the data center has increased.

3. Cloud computing network virtualization and mutual access

Virtualization in cloud computing should include computing virtualization, storage virtualization, and network virtualization. With the continuous realization of computing and storage virtualization, the necessity and importance of network virtualization technology continue to highlight, and will become the top priority of network technology development in the next decade, and its development and changes will also become the leader The evolution direction of the data center network.

3.1 Multiple virtual networks

1) Control plane virtualization: It is to integrate the control planes of all devices into one main body, handle the work of the entire virtual switch in a unified manner, and unify the requirements of management and interface expansion. From the structure control plane virtualization, it is divided into vertical device virtualization at different levels and horizontal device virtualization at the same level.

2) Network level virtualization: TRILL and SPB protocols are used. When forwarding on the Layer 2 network, the outer layer of the packet is encapsulated and forwarded inside the TRILL / SPB area by Tag. This area network forms a large virtual switch. To achieve transparent forwarding of messages.

3.2 The network is virtual

The traditional virtual multi-network technology includes VLAN technology of the Internet, VPN technology of the IP, VSAN technology of the FC, etc. The newer technology currently appearing is the VDC of CISCO, which can realize the independent allocation of physical resources by up to 4 VDCs.

3.3 Virtualization of network card

There is also a supplementary technology for network virtualization that is the IO virtualization technology for server network cards, SR-IOV, proposed by the PCI SIG working group. SR-IOV is to establish multiple virtual IO channels on the server's physical network card and make it directly correspond to the virtual network card of multiple virtual machines one by one to improve the forwarding efficiency of the virtual server.

3.4 Network access between virtual machines in the data center

In this article 3.1 and 3.2, the network virtualization realizes the two-layer mutual access technology of cross-core servers in the network, as shown in the link of Network3 in Figure 2, this section analyzes the VM (Virtual Machine, virtual machine) The inter-access technology is shown as the link in Network1 in Figure 2.

Figure 2 Cloud computing data center network visits

In the data center, after a virtual server becomes more and more, the mutual access between internal VMs becomes more frequent. It is technically divided into physical server local mutual access and switch VM mutual access. The former uses VswITch (software switch) to solve the mutual access of the VM network inside a server, but the disadvantage is that it is not easy to manage, at the same time occupies the CPU of the server, reducing efficiency; the latter is the real cloud network access terminal, deepening the network To the inside of the server, the network forms a unified management and unified exchange platform, which will become the mainstream technology of cloud computing network VM mutual access.

At the management level, the local exchange visits of the switch VMs virtualize all the contents related to switching and addressing in the network into a logical switch, and then manage them in a unified way; at the data level, the switch provides a Virtual interface, using server NIC virtualization SR-IOV or adding switches as software drivers, mainstream technical system standards such as 802.1Qbg and 802.1Qbh.

The mutual access technology between VMs will take the hardware switch into the server as the final direction, either on the network card, or directly add a forwarding chip on the motherboard.

3.5 Data center network cross-site two-layer mutual visit and multi-site selection

2.5.1 Cross-site Layer 2 mutual visits of the data center network

In the centralized cloud computing data center, there are three or more multi-site server cluster computing, and in the case of decentralized cloud, there will be a demand for virtual machine migration and change (VMotion). Mutual visit, as shown in the Network4 link in Figure 2. There are three ways to realize the mutual access of the Layer 2 network, that is, the star or ring topology with direct fiber connection, the use of MPLS technology to build the network, and the IP Internet using a secure encryption mechanism. From the perspective of cost performance, cost savings, and reliability design, multi-site fiber optic direct connection has obvious advantages, but at present, fiber optic direct connection is established by each enterprise for a certain business and lacks the establishment of common standards.

2.5.2 Multi-site selection of data center network

In a multi-site network of a cloud computing data center, there is a multi-site routing problem for user access to the server, as shown by the network 5 link in Figure 2. There are two options for multi-site selection. One is DNS technology, which is implemented using global load balancing GSLB technology and virtual machine migration technology. The other is IP-based routing and forwarding, which uses LSIP (Locator / ID Separation Protocol) to separate location identification / identity identification. Protocol technology implements routing. It provides a data packet routing method that can seamlessly migrate virtual machines between servers without changing the terminal software.

4. Cloud computing data center back-end storage network

4.1 Traditional storage network

Traditional storage methods include DAS, NAS, SAN, and FC SAN. DAS (Direct Attached Storage) is direct-attached disk storage, and NAS (Network Attached Storage) is a network shared file server. When it reaches the data center level, SAN (Storage Area Network), through the FC or TCP / IP network, the disk array is registered to the server, and it is simulated as a directly connected storage. FC SAN is currently the most mainstream overlord technology.

4.2 Front-end and back-end fusion FCoE

The integration of the Internet and FC is the fiber channel of FCoE (Fiber Channel over Ethernet) Ethernet. As shown in the network2 link in Figure 2, the border is still the access switch. In the part from the server physical network card to the access switch, the FC data is carried in a certain VLAN for transmission through the access switch. The FCoE technology standard can map Fibre Channel to Ethernet, and insert Fibre Channel information in the Ethernet packet, allowing Fibre Channel requests and data between the server and the SAN storage device to be transmitted through the Ethernet connection, that is, in Ethernet Transfer SAN data online. The FCoE back-end converged network supports both LAN and SAN data transmission, reducing the number of data center equipment and cables, and at the same time reducing power supply and cooling load. After converging into a unified network, it reduces the number of supported points and reduces the management burden. It also protects existing investments and provides an I / O fusion solution with the FC storage protocol at its core.

5. Cloud computing and IPV6

The development of cloud computing imposes higher requirements on network security. The security mechanism of IPv6 technology, huge address space, traceability technology, definition of multicast addresses and other technologies have all improved the security of the network layer to a certain extent. In an IPv6 network, users can encrypt data at the network layer and verify IP packets, which greatly enhances the security of the network; the development of cloud computing has further expanded the scale of the network. China ’s Internet of Things and mobile The development of industries such as the Internet, cloud computing, and triple play requires massive IP addresses as support, and the serious shortage of IP addresses has become a bottleneck restricting the development of China's industry. IPv6 has greatly increased the address space and is suitable for the development direction of cloud networks. ; In addition, IPv6 integrated security and quality service mechanism, as well as automatic configuration and mobility support, higher routing stability also provides cloud computing network controllability and reliability.

Conclusion

According to statistics, IT will evolve every 15 years. The combination of new needs and innovative technologies has caused fundamental changes in computing methods. From mainframe computing to the Internet, it has gradually entered the era of virtualization. Cloud computing, virtualization, high speed Increasing data, convergence and mobility, these needs continue to choose network technologies and development directions. As an IT basic platform, network architecture and key technologies directly affect the realization of new demands on bearings in the IT era and determine the evolution process. In the era of virtualization, the large second-tier network architecture of the cloud computing data center cooperates with the corresponding key technologies. With its advantages of flatness, high efficiency, high bandwidth, interconnection, expansion, flexibility, security, and reliability, it will eventually become compatible with the characteristics of the IT era The inevitable trend of network development.

Here you can find the related products in Magnetic Light Accessories, we are professional manufacturer of Magnetic Track 1M Led Rail Track Led Track RailMagnetic Led Light. We focused on international export product development, production and sales. We have improved quality control processes of Magnetic Light Accessories to ensure each export qualified product. If you want to know more about the products in Magnetic Light Accessories, please click the product details to view parameters, models, pictures, prices and other information about Magnetic Track 1M, Led Rail Track, Led Track Rail, Magnetic Led Light.

Whatever you are a group or individual, we will do our best to provide you with accurate and comprehensive message about Magnetic Light Accessories!

LED magnetic Light

Magnetic Light Accessories

Magnetic Track 1M,Led Rail Track,Led Track Rail,Magnetic Led Light

Guangdong Decosun Lighting Technology Co.,Ltd , https://www.decosun-lighting.com

Posted on