SlideShare a Scribd company logo
1 of 8
Download to read offline
Happiest People Happiest Customers
Network Virtualization
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved2
Document Information 2
• Document Distribution List
• Version History
Introduction 5
Scope 6
• Purpose
• Executive Summary
Benefits of Network Functions Virtualization 7
Current market trends
Network virtualization services comparison 8
• Network Virtualization of WAN
• Benefit of WAN virtualization:
What are the hardware and software elements of network virtualization? 9
What planning or upgrades may be needed for network virtualization?
Virtualization Scope 11
Our Services 12
• WAN Virtualization
• LAN Virtualization
Current and future market trend 13
References 14
Contents
Introduction
Network operators’ networks comprises of wide variety of hardware appliances. In a big and globally distributed network; the
network would comprise of multi-vendor equipment and variety of proprietary services offered by the vendor.
Any change and/or extension in the existing network would involve cost and effort at multiple folds as below:
• Cost of hardware
• Cost of energy
• Skill
• Physical space for the placement of devices
With the pace of invent of new technologies and current market demands it becomes necessary to upgrade the existing
network hardware at regular interval which includes replacement of the devices as well. On top of it there is no direct revenue
benefit of the new hardware purchases.
In the current age of fast changing and internet connected world there is need for new ways of network services which should
be cost effective, frequent change prone, easy to configure and manageable.
Scope
This document has been produced to provide the information to explain the philosophy of network virtualization and services
being offered by different vendors as per current market trends. The documentation is written as a reference guide for all the
concerned people from Happiest Minds.
Purpose
The purpose of this document is to provide an overview of the network virtualization services that can be offered and the
current market offerings.
Executive Summary
Virtualization technique is highly accepted and has a proven history of implementation in case of servers and other infrastruc-
ture domain. When it comes to network virtualization, it is basically the virtualization of different network resources. It is
defining a dummy hardware piece on top of a physical box that can work independently and provide its services independently.
It is achieved by separating the control and data plane of the logically defined resource from that of the physical resource.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved3
Network virtualization services
comparison
There are 2 types of network virtualization services:
External network virtualization: In this type of service
more than one local networks are used and broken down
into virtual networks. Intent is to improve the performance,
optimize and increase the efficiency of corporate data
center network. Prime components of an external virtual
network in a corporate data center are VLANs and Switch-
es.By implementing VLAN and switch technology, system
administrators can easily manage and configure systems
physically attached to the same local network into different
virtual networks. On the contrary, VLAN technology
empowers the system administrators to merge the
systems on separate local networks into a VLAN on both
sides of the segments of a large corporate network or
datacenter.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved4
There is a related term to Network Virtualization which is
SDN (Software Defined Networking). Since SDN is out of
scope so I would only give a brief of the relationship
between SDN and Network Virtualization.
The relationship is that Network virtualization provides
infrastructure on top of which the SDN runs. However
both are independent with each other.
Network virtualization can be implemented in below areas
but not limited to:
• Switching elements include Broadband Network Gate,
routers and Carrier Grade Network Address Translation.
• Mobile network nodes consist of HLR/HSS, MME,
GGSN/PDN-GW, Node B, eNode B,RNC SGSN.
• Functions in set top boxes and home routers create
virtualization in home environments.
• Tunnelling gateway elements such as IPsec/SSL VPN
gateways.
• Traffic analysis in DPI, QoE measurement.
• Service Assurance, service level agreement monitoring,
Test and Diagnostics.
• NGN signalling: SBCs, IMS.
• Converged and network-wide functions for authentication
authorization accounting servers, charging
platforms and policy control.
• Application-level optimization for load balancers, appli
cation accelerators, content delivery network and
cache servers.
• Security functions in firewalls, virus scanners, intrusion
detection systems, spam protection.
Benefits of Network Functions
Virtualization
• Reduced equipment costs and reduced power consumption
• Better scalability
• Running multiple environments on the same infrastruture.
• Geographical independence
• Multi-tenancy
• Improved operational efficiency by taking advantage of
the higher uniformity of the physical network platform.
Current market trends
Network virtualization is offered by several equipment
and software vendors through:
• Network hardware like switches and network adapt
ers. These are also known as network interface cards
(NICs)
• Network components like Load balancers, Firewalls,
Virtual LANs (VLANs) and containers such as virtual
machines (VMs)
• Storage equipments
• M2M elements such as telecommunications 4G HLR
and SLR devices
• Mobile elements (End users devices/equipments like
smart phones)
• Ethernet and Fibre Channel media
Operators that can benefit from
virtualization could be:
• Mobile/fixed network operators
• Network as a service providers
• Virtual mobile/fixed network operator
• Virtual wholesalers
• Exchange brokers
• Resellers
• Virtual network providers
• Resource providers
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved5
Internal network virtualization: As the name suggests in
internal virtualization service, a single network system is
configured using network containers like Xen domain and
this is pooled with hypervisor control programs like VNIC.
This helps in creating “consolidated network boxes”. In
this type of virtualization service there is improved
efficiency of a single system that is achieved by separat-
ing the applications to detached containers.
Internal network virtualization:
As the name suggests in internal virtualization service, a
single network system is configured using network
containers like Xen domain and this is pooled with hyper-
visor control programs like VNIC. This helps in creating
“consolidated network boxes”. In this type of virtualization
service these is improved efficiency of a single system
that is achieved by separating the applications to detached
containers. .
Network Virtualization of WAN
Create multiple virtual network "channels" on the same
physical network.
Creating virtual channels and passing on each of these
individual channels to individual applications. This
enables organizations to make certain that every critical
application can be flawlessly transferred across the
network to ensure that new technology rollouts are not
causing any worsening of existing business services .
Merge networks for better performance, bandwidth and
management.
Merging several ISPs connections together.
Benefit of WAN virtualization:
Optimum network utilization and high availability: Prime
benefit of network virtualization is optimization of network
utilization. This is achieved by sharing of physical
connectivity by multiple virtual networks, ensuring higher
network utilization. Besides this, high availability is the
benefit which is achieved by making supporting clusters
appear as one device from a network management and
topology perspective. This further helps to simplify the
WAN architecture and allied WAN management complexity.
Improved Visibility:
Using DCI and WAN virtualization,the data center
network appears as dedicated adjoining channels. This is
very crucial from policy, security and performance man-
agement perspectives. This empowers network
managers with the capability of tracing a VLAN from
server-to-LAN-to-WAN–to-end user while correlating core
physical infrastructure for troubleshooting and capacity
planning. This can radically improve mean-time-to-isolate
and tackle network performance and security issues.
Benefit of WAN virtualization:
Convergence:Adopting network virtualization helps
decrease the number of physical devices followed by
reducing operations and improving ease of management.
Improved Security:Virtualization security comprises of
three prime aspects: Access control, Path seclusion, and
services edge management. Access control means
implementing authentication and authorization across the
enterprise data center. An example to this can be in the
form of a Cisco TACACS+ or a RADIUS server that
supports in determining the entity that may access a
particular VLAN. Path seclusion happens through MPLS,
GRE and Virtual Routing and Forwarding (VRF) to segre-
gate one stream of data from another over the WAN.
Lastly, services edge management is used to segregate
the application environments and control the interface to
storage and computing. These functions are used to
extend the contiguous security across the WAN in a
convenient manner.
Planning or upgrades required for net-
work virtualization:
• Robust deployment planning
• Bandwidth considerations
• Security considerations while creating multiple virtual
networks.
• Upgrade considerations either to 1 or 10 Gigabit
Ethernet.
• Switching requirements for virtualization environment.
• CPU and memory considerations of switches/routers
to handle the additional workloads in certain scenarios
• Mitigating SPOF or single points of failure and taking
remedial action to ensure high availability.
• Need for virtualization friendly management tools that
can manage end to end virtual networks
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved6
Need for virtualization friendly manage-
ment tools that can manage end to end
virtual networks
To virtualize an enterprise network, basic functional
blocks of the modular enterprise must be enhanced to
provide the following functionalities:
• Authentication and Authorization must be dynamically
done for various user groups.
• Connectivity isolation to promise privacy within the
groups.
• Form precise and handy ingress and egress points at
the boundary of each Virtual network.
• Impose autonomous security policies on each group
at the network boundary
• Centralization of boundary security policies must be
enforced on diverse Virtual networks by allowing:
• Secured collaboration mechanisms within groups
• Secured sharing of common resources
• Offer fundamental networking services to
shared/dedicated groups.
• Offer autonomous routing domains and address
spaces to each group
These functional areas provide a framework for the
virtualization of networks:
• Transport virtualization
• Edge authorization
• Central services access (VN perimeter)
Virtualization Scope
Support for multi-tenancy has become a core require-
ment of data centres. Three key requirements needed to
support multi-tenancy are:
• Isolating traffic, to ensure that tenant's traffic is not
visible to any other tenant
• Address independence to ensure that one address
ing scheme does not smash together with other
tenant's addressing schemes.
• Supporting the placement and migration of VMs
within the data center by overcoming traditional DC
network constraints like IP subnet boundaries etc.
• Rapid provisioning of virtual networks
• End to end management of virtual networks that is
free of the underlying physical network
• Overcome limitations of physical networks, includ
ing VLAN limitations, by creating isolated and
overlapping address spaces
• Distributed architecture provides scalability, resil
iency and avoids single points of failure
• Works with already configured networks infrastruc
ture and with any existing hardware
• Connect virtual networks with physical networks
using VTEP/L2 bridging
• Virtual Switching –distributed on each compute
node
• Virtual Routing –distributed on each compute
node, provide dynamic routing between virtual
and physical networks
• MidoNet API –To integrate with any Cloud Man
agement platform, and to program networks
• Virtual Load Balancer –Provides load balancer as
a service
• Virtual Firewall –Provides firewall as a service
• VXLAN and GRE -Support for popular encapsula
tion protocols like VXLAN and GRE
• Layer 2 Gateway –bridges MidoNet logical
networks with physical VLAN enabled networks,
offers VLAN tagging and translation
• Layer 3 Gateway-¬‐Distributed gateway to con
nect external networks using eBGP
Our Services
WAN Virtualization
• Global Load Balancers – Provides the edge to
manage the traffic intelligently and has seam
less fall back provisions
• WAN Accelerators – To optimize WAN link utilization
and enhance the application response time
• VRF Aware Protocols – Helps in managing WAN and
overcomes there-usage limitation of IP address
spaces. It also provides the extra security and helps
in implementing VRF based solutions like VPN
• GRE, DMVPN and MPLS services – MPLS, MGRE
and GRE based solution helps in segmenting the
traffic and allow multiple sharing of a single band
width by different business units.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved7
LAN Virtualization
• Access control to recognize and classify legitimate
users & devices and authorize them to enter
assigned portions of the network
• Path isolation to map validated users or devices to
the correct set of available resources. The VLANs,
Private VLANS, GRE, VRF Lite and MPLS
VPN are some of our techniques used for LAN
Virtualization
• Services edge to provide access to services for a
legitimate set of user and devices by using central
ized policy enforcement.
http://www.marketresearchreports.com/signals-and-systems-tele-
com/sdn-nfv-network-virtualization-bible-2014-2020
http://www.transparencymarketresearch.com/network-virtualization-market.html
http://www.prnewswire.com/news-releases/sdn-nfv--network-virtualization-market-at-4-bil-in-2014-248402321.html
Sub-Areas
• Switching and Routing
• Security
• Multi-Tenancy
• High Availability
• L2-L4 network services
• L2-L3 Gateway service
Current and future market trend
References
$45,000
$50,000
$250,00
$200,00
$100,00
$5,000
$150,00
2014
2015
2016
2017
2018
2019
2020
Western Europe
Eastern Europe
Asia Pacific
North America
Middle East & Africa
Latin & Central
America
SDN & NFV Induced Service Provider CapEx Saving Potential by Region: 2014-2050 ($ Million)
Happiest Minds is focused on helping customers build Smart Secure and Connected experience
by leveraging disruptive technologies like mobility, analytics, security, cloud computing, social
computing and unified communications. Enterprises are embracing these technologies to imple-
ment Omni-channel strategies, manage structured & unstructured data and make real time
decisions based on actionable insights, while ensuring security for data and infrastructure. Happi-
est Minds also offers high degree of skills, IPs and domain expertise across a set of focused areas
that include IT Services, Product Engineering Services, Infrastructure Management, Security,
Testing and Consulting.
Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore and
Australia. It secured a $45 million Series-A funding led by Canaan Partners, Intel Capital and
Ashok Soota.
About the Author
Happiest Minds
Kapil Chaturvedi
6 © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
© 2014 Happiest Minds. All Rights Reserved.
E-mail: Business@happiestminds.com
Visit us: www.happiestminds.com
Follow us on
This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd.
11 years of IT experience, including 3 years in Data center planning and imple-
mentation and 2 years in wireless planning and implementation. He has worked
in multivendor environment including Cisco, Aruba, HP, Nortel, F5, Watchguard,
Fortigate and others. He has also worked in Open source technologies and
providing solutions based upon them. Key past project includes: Data center
planning for one of the client at Malaysia having multiple sites geographically
distributed across the globe, NOC planning and new project implementation for
Standard Chartered bank, Wireless implementation for Aruba Networks Inc.

More Related Content

What's hot

Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpiMohammed Abdallah
 
Introduction to Software-defined Networking
Introduction to Software-defined NetworkingIntroduction to Software-defined Networking
Introduction to Software-defined NetworkingAnees Shaikh
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVHimawan Nugroho
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinarpmohapat
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)Aalok Shah
 
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data CentersCisco Russia
 
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...Juniper Networks
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1nixon
 
REVOLUTION - Transforming the network with Open SDN
REVOLUTION - Transforming the network with Open SDNREVOLUTION - Transforming the network with Open SDN
REVOLUTION - Transforming the network with Open SDNOpen Networking Summits
 
Network Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and ScaleNetwork Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and ScaleJuniper Networks
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and SolutionsGoS Networks Ltd
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalEmily Pechal
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderIdan Hershkovich
 

What's hot (20)

Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
Introduction to Software-defined Networking
Introduction to Software-defined NetworkingIntroduction to Software-defined Networking
Introduction to Software-defined Networking
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFV
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
 
Containing Chaos
Containing ChaosContaining Chaos
Containing Chaos
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
 
REVOLUTION - Transforming the network with Open SDN
REVOLUTION - Transforming the network with Open SDNREVOLUTION - Transforming the network with Open SDN
REVOLUTION - Transforming the network with Open SDN
 
Network Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and ScaleNetwork Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and Scale
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and Solutions
 
CenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily PechalCenturyLink SD-WAN Executive Brief -- Emily Pechal
CenturyLink SD-WAN Executive Brief -- Emily Pechal
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
 

Viewers also liked

Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsWhitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsHappiest Minds Technologies
 
Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...Happiest Minds Technologies
 
Whitepaper: Omni-Channel Retail - Happiest Minds
Whitepaper: Omni-Channel Retail - Happiest MindsWhitepaper: Omni-Channel Retail - Happiest Minds
Whitepaper: Omni-Channel Retail - Happiest MindsHappiest Minds Technologies
 
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest Minds
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest MindsWhitepaper: Flow Document – A solution to text readers in .Net - Happiest Minds
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest MindsHappiest Minds Technologies
 
Whitepaper: Evolution of the Software Defined Data Center - Happiest Minds
Whitepaper: Evolution of the Software Defined Data Center - Happiest MindsWhitepaper: Evolution of the Software Defined Data Center - Happiest Minds
Whitepaper: Evolution of the Software Defined Data Center - Happiest MindsHappiest Minds Technologies
 
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...Happiest Minds Technologies
 
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...Happiest Minds Technologies
 

Viewers also liked (9)

Started with-apache-spark
Started with-apache-sparkStarted with-apache-spark
Started with-apache-spark
 
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest MindsWhitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
 
Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...Whitepaper: Unified Communications Solution on Communication Enabled Business...
Whitepaper: Unified Communications Solution on Communication Enabled Business...
 
Whitepaper: Omni-Channel Retail - Happiest Minds
Whitepaper: Omni-Channel Retail - Happiest MindsWhitepaper: Omni-Channel Retail - Happiest Minds
Whitepaper: Omni-Channel Retail - Happiest Minds
 
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest Minds
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest MindsWhitepaper: Flow Document – A solution to text readers in .Net - Happiest Minds
Whitepaper: Flow Document – A solution to text readers in .Net - Happiest Minds
 
Whitepaper: Evolution of the Software Defined Data Center - Happiest Minds
Whitepaper: Evolution of the Software Defined Data Center - Happiest MindsWhitepaper: Evolution of the Software Defined Data Center - Happiest Minds
Whitepaper: Evolution of the Software Defined Data Center - Happiest Minds
 
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...
Whitepaper: DEVELOPER ENGAGEMENT SOLUTION KEY TO SUCCESS OF YOUR PLATFORM - H...
 
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...
Whitepaper: AirAudit: Intelligent Audit Solution for Airlines - Reducing Reve...
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 

Similar to Whitepaper: Network Virtualization - Happiest Minds

01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptxXeniaRaquel1
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?idrajeev
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologyIRJET Journal
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization techniquemonalissadeivasigamani
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
A Unified Network for the Mobile Era
A Unified Network for the Mobile EraA Unified Network for the Mobile Era
A Unified Network for the Mobile EraAvaya Inc.
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'OpenStack Korea Community
 
Vmware vcloud nfv sdwan
Vmware vcloud nfv   sdwanVmware vcloud nfv   sdwan
Vmware vcloud nfv sdwanVersos
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000Fauzil Rizqi
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivityIT Brand Pulse
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
 
Service provider-considerations
Service provider-considerationsService provider-considerations
Service provider-considerationsWeam Salem
 
brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpAnuj Dewangan
 
SDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersSDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersBenjamin Eggerstedt
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseSheryl Zhang
 

Similar to Whitepaper: Network Virtualization - Happiest Minds (20)

01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx01-235182-105-9455967283-18042022-125731pm.pptx
01-235182-105-9455967283-18042022-125731pm.pptx
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization technique
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
A Unified Network for the Mobile Era
A Unified Network for the Mobile EraA Unified Network for the Mobile Era
A Unified Network for the Mobile Era
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Chapter1-Introduction
Chapter1-IntroductionChapter1-Introduction
Chapter1-Introduction
 
Vmware vcloud nfv sdwan
Vmware vcloud nfv   sdwanVmware vcloud nfv   sdwan
Vmware vcloud nfv sdwan
 
Sdn whitepaper
Sdn whitepaperSdn whitepaper
Sdn whitepaper
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivity
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
Service provider-considerations
Service provider-considerationsService provider-considerations
Service provider-considerations
 
brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wp
 
SDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersSDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data Centers
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-case
 

More from Happiest Minds Technologies

AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Happiest Minds Technologies
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Happiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITHappiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITHappiest Minds Technologies
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITHappiest Minds Technologies
 

More from Happiest Minds Technologies (20)

BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
Contact Centre Growing Digital
Contact Centre Growing DigitalContact Centre Growing Digital
Contact Centre Growing Digital
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 

Recently uploaded

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 

Recently uploaded (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 

Whitepaper: Network Virtualization - Happiest Minds

  • 1. Happiest People Happiest Customers Network Virtualization
  • 2. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved2 Document Information 2 • Document Distribution List • Version History Introduction 5 Scope 6 • Purpose • Executive Summary Benefits of Network Functions Virtualization 7 Current market trends Network virtualization services comparison 8 • Network Virtualization of WAN • Benefit of WAN virtualization: What are the hardware and software elements of network virtualization? 9 What planning or upgrades may be needed for network virtualization? Virtualization Scope 11 Our Services 12 • WAN Virtualization • LAN Virtualization Current and future market trend 13 References 14 Contents
  • 3. Introduction Network operators’ networks comprises of wide variety of hardware appliances. In a big and globally distributed network; the network would comprise of multi-vendor equipment and variety of proprietary services offered by the vendor. Any change and/or extension in the existing network would involve cost and effort at multiple folds as below: • Cost of hardware • Cost of energy • Skill • Physical space for the placement of devices With the pace of invent of new technologies and current market demands it becomes necessary to upgrade the existing network hardware at regular interval which includes replacement of the devices as well. On top of it there is no direct revenue benefit of the new hardware purchases. In the current age of fast changing and internet connected world there is need for new ways of network services which should be cost effective, frequent change prone, easy to configure and manageable. Scope This document has been produced to provide the information to explain the philosophy of network virtualization and services being offered by different vendors as per current market trends. The documentation is written as a reference guide for all the concerned people from Happiest Minds. Purpose The purpose of this document is to provide an overview of the network virtualization services that can be offered and the current market offerings. Executive Summary Virtualization technique is highly accepted and has a proven history of implementation in case of servers and other infrastruc- ture domain. When it comes to network virtualization, it is basically the virtualization of different network resources. It is defining a dummy hardware piece on top of a physical box that can work independently and provide its services independently. It is achieved by separating the control and data plane of the logically defined resource from that of the physical resource. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved3
  • 4. Network virtualization services comparison There are 2 types of network virtualization services: External network virtualization: In this type of service more than one local networks are used and broken down into virtual networks. Intent is to improve the performance, optimize and increase the efficiency of corporate data center network. Prime components of an external virtual network in a corporate data center are VLANs and Switch- es.By implementing VLAN and switch technology, system administrators can easily manage and configure systems physically attached to the same local network into different virtual networks. On the contrary, VLAN technology empowers the system administrators to merge the systems on separate local networks into a VLAN on both sides of the segments of a large corporate network or datacenter. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved4 There is a related term to Network Virtualization which is SDN (Software Defined Networking). Since SDN is out of scope so I would only give a brief of the relationship between SDN and Network Virtualization. The relationship is that Network virtualization provides infrastructure on top of which the SDN runs. However both are independent with each other. Network virtualization can be implemented in below areas but not limited to: • Switching elements include Broadband Network Gate, routers and Carrier Grade Network Address Translation. • Mobile network nodes consist of HLR/HSS, MME, GGSN/PDN-GW, Node B, eNode B,RNC SGSN. • Functions in set top boxes and home routers create virtualization in home environments. • Tunnelling gateway elements such as IPsec/SSL VPN gateways. • Traffic analysis in DPI, QoE measurement. • Service Assurance, service level agreement monitoring, Test and Diagnostics. • NGN signalling: SBCs, IMS. • Converged and network-wide functions for authentication authorization accounting servers, charging platforms and policy control. • Application-level optimization for load balancers, appli cation accelerators, content delivery network and cache servers. • Security functions in firewalls, virus scanners, intrusion detection systems, spam protection. Benefits of Network Functions Virtualization • Reduced equipment costs and reduced power consumption • Better scalability • Running multiple environments on the same infrastruture. • Geographical independence • Multi-tenancy • Improved operational efficiency by taking advantage of the higher uniformity of the physical network platform. Current market trends Network virtualization is offered by several equipment and software vendors through: • Network hardware like switches and network adapt ers. These are also known as network interface cards (NICs) • Network components like Load balancers, Firewalls, Virtual LANs (VLANs) and containers such as virtual machines (VMs) • Storage equipments • M2M elements such as telecommunications 4G HLR and SLR devices • Mobile elements (End users devices/equipments like smart phones) • Ethernet and Fibre Channel media Operators that can benefit from virtualization could be: • Mobile/fixed network operators • Network as a service providers • Virtual mobile/fixed network operator • Virtual wholesalers • Exchange brokers • Resellers • Virtual network providers • Resource providers
  • 5. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved5 Internal network virtualization: As the name suggests in internal virtualization service, a single network system is configured using network containers like Xen domain and this is pooled with hypervisor control programs like VNIC. This helps in creating “consolidated network boxes”. In this type of virtualization service there is improved efficiency of a single system that is achieved by separat- ing the applications to detached containers. Internal network virtualization: As the name suggests in internal virtualization service, a single network system is configured using network containers like Xen domain and this is pooled with hyper- visor control programs like VNIC. This helps in creating “consolidated network boxes”. In this type of virtualization service these is improved efficiency of a single system that is achieved by separating the applications to detached containers. . Network Virtualization of WAN Create multiple virtual network "channels" on the same physical network. Creating virtual channels and passing on each of these individual channels to individual applications. This enables organizations to make certain that every critical application can be flawlessly transferred across the network to ensure that new technology rollouts are not causing any worsening of existing business services . Merge networks for better performance, bandwidth and management. Merging several ISPs connections together. Benefit of WAN virtualization: Optimum network utilization and high availability: Prime benefit of network virtualization is optimization of network utilization. This is achieved by sharing of physical connectivity by multiple virtual networks, ensuring higher network utilization. Besides this, high availability is the benefit which is achieved by making supporting clusters appear as one device from a network management and topology perspective. This further helps to simplify the WAN architecture and allied WAN management complexity. Improved Visibility: Using DCI and WAN virtualization,the data center network appears as dedicated adjoining channels. This is very crucial from policy, security and performance man- agement perspectives. This empowers network managers with the capability of tracing a VLAN from server-to-LAN-to-WAN–to-end user while correlating core physical infrastructure for troubleshooting and capacity planning. This can radically improve mean-time-to-isolate and tackle network performance and security issues. Benefit of WAN virtualization: Convergence:Adopting network virtualization helps decrease the number of physical devices followed by reducing operations and improving ease of management. Improved Security:Virtualization security comprises of three prime aspects: Access control, Path seclusion, and services edge management. Access control means implementing authentication and authorization across the enterprise data center. An example to this can be in the form of a Cisco TACACS+ or a RADIUS server that supports in determining the entity that may access a particular VLAN. Path seclusion happens through MPLS, GRE and Virtual Routing and Forwarding (VRF) to segre- gate one stream of data from another over the WAN. Lastly, services edge management is used to segregate the application environments and control the interface to storage and computing. These functions are used to extend the contiguous security across the WAN in a convenient manner. Planning or upgrades required for net- work virtualization: • Robust deployment planning • Bandwidth considerations • Security considerations while creating multiple virtual networks. • Upgrade considerations either to 1 or 10 Gigabit Ethernet. • Switching requirements for virtualization environment. • CPU and memory considerations of switches/routers to handle the additional workloads in certain scenarios • Mitigating SPOF or single points of failure and taking remedial action to ensure high availability. • Need for virtualization friendly management tools that can manage end to end virtual networks
  • 6. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved6 Need for virtualization friendly manage- ment tools that can manage end to end virtual networks To virtualize an enterprise network, basic functional blocks of the modular enterprise must be enhanced to provide the following functionalities: • Authentication and Authorization must be dynamically done for various user groups. • Connectivity isolation to promise privacy within the groups. • Form precise and handy ingress and egress points at the boundary of each Virtual network. • Impose autonomous security policies on each group at the network boundary • Centralization of boundary security policies must be enforced on diverse Virtual networks by allowing: • Secured collaboration mechanisms within groups • Secured sharing of common resources • Offer fundamental networking services to shared/dedicated groups. • Offer autonomous routing domains and address spaces to each group These functional areas provide a framework for the virtualization of networks: • Transport virtualization • Edge authorization • Central services access (VN perimeter) Virtualization Scope Support for multi-tenancy has become a core require- ment of data centres. Three key requirements needed to support multi-tenancy are: • Isolating traffic, to ensure that tenant's traffic is not visible to any other tenant • Address independence to ensure that one address ing scheme does not smash together with other tenant's addressing schemes. • Supporting the placement and migration of VMs within the data center by overcoming traditional DC network constraints like IP subnet boundaries etc. • Rapid provisioning of virtual networks • End to end management of virtual networks that is free of the underlying physical network • Overcome limitations of physical networks, includ ing VLAN limitations, by creating isolated and overlapping address spaces • Distributed architecture provides scalability, resil iency and avoids single points of failure • Works with already configured networks infrastruc ture and with any existing hardware • Connect virtual networks with physical networks using VTEP/L2 bridging • Virtual Switching –distributed on each compute node • Virtual Routing –distributed on each compute node, provide dynamic routing between virtual and physical networks • MidoNet API –To integrate with any Cloud Man agement platform, and to program networks • Virtual Load Balancer –Provides load balancer as a service • Virtual Firewall –Provides firewall as a service • VXLAN and GRE -Support for popular encapsula tion protocols like VXLAN and GRE • Layer 2 Gateway –bridges MidoNet logical networks with physical VLAN enabled networks, offers VLAN tagging and translation • Layer 3 Gateway-¬‐Distributed gateway to con nect external networks using eBGP Our Services WAN Virtualization • Global Load Balancers – Provides the edge to manage the traffic intelligently and has seam less fall back provisions • WAN Accelerators – To optimize WAN link utilization and enhance the application response time • VRF Aware Protocols – Helps in managing WAN and overcomes there-usage limitation of IP address spaces. It also provides the extra security and helps in implementing VRF based solutions like VPN • GRE, DMVPN and MPLS services – MPLS, MGRE and GRE based solution helps in segmenting the traffic and allow multiple sharing of a single band width by different business units.
  • 7. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved7 LAN Virtualization • Access control to recognize and classify legitimate users & devices and authorize them to enter assigned portions of the network • Path isolation to map validated users or devices to the correct set of available resources. The VLANs, Private VLANS, GRE, VRF Lite and MPLS VPN are some of our techniques used for LAN Virtualization • Services edge to provide access to services for a legitimate set of user and devices by using central ized policy enforcement. http://www.marketresearchreports.com/signals-and-systems-tele- com/sdn-nfv-network-virtualization-bible-2014-2020 http://www.transparencymarketresearch.com/network-virtualization-market.html http://www.prnewswire.com/news-releases/sdn-nfv--network-virtualization-market-at-4-bil-in-2014-248402321.html Sub-Areas • Switching and Routing • Security • Multi-Tenancy • High Availability • L2-L4 network services • L2-L3 Gateway service Current and future market trend References $45,000 $50,000 $250,00 $200,00 $100,00 $5,000 $150,00 2014 2015 2016 2017 2018 2019 2020 Western Europe Eastern Europe Asia Pacific North America Middle East & Africa Latin & Central America SDN & NFV Induced Service Provider CapEx Saving Potential by Region: 2014-2050 ($ Million)
  • 8. Happiest Minds is focused on helping customers build Smart Secure and Connected experience by leveraging disruptive technologies like mobility, analytics, security, cloud computing, social computing and unified communications. Enterprises are embracing these technologies to imple- ment Omni-channel strategies, manage structured & unstructured data and make real time decisions based on actionable insights, while ensuring security for data and infrastructure. Happi- est Minds also offers high degree of skills, IPs and domain expertise across a set of focused areas that include IT Services, Product Engineering Services, Infrastructure Management, Security, Testing and Consulting. Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore and Australia. It secured a $45 million Series-A funding led by Canaan Partners, Intel Capital and Ashok Soota. About the Author Happiest Minds Kapil Chaturvedi 6 © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved © 2014 Happiest Minds. All Rights Reserved. E-mail: Business@happiestminds.com Visit us: www.happiestminds.com Follow us on This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd. 11 years of IT experience, including 3 years in Data center planning and imple- mentation and 2 years in wireless planning and implementation. He has worked in multivendor environment including Cisco, Aruba, HP, Nortel, F5, Watchguard, Fortigate and others. He has also worked in Open source technologies and providing solutions based upon them. Key past project includes: Data center planning for one of the client at Malaysia having multiple sites geographically distributed across the globe, NOC planning and new project implementation for Standard Chartered bank, Wireless implementation for Aruba Networks Inc.