Cloud Data Center Network Architectures and Technologies
Cloud Data Center Network Architectures and Technologies
Network Architectures
and Technologies
Data Communication Series
Cloud Data Center Network Architectures and Technologies
Lei Zhang and Le Chen
Campus Network Architectures and Technologies
Ningguo Shen, Bin Yu, Mingxiang Huang and Hailin Xu
Enterprise Wireless Local Area Network Architectures and Technologies
Rihai Wu, Xun Yang, Xia Zhou and Yibo Wang
Software-Defined Wide Area Network Architectures and Technologies
Cheng Sheng, Jie Bai and Qi Sun
SRv6 Network Programming: Ushering in a New Era of IP Networks
Zhenbin Li, Zhibo Hu and Cheng Li
The right of Lei Zhang and Le Chen to be identified as authors of this work has been asserted by them in accordance with
sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted
to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permis-
sion to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized
in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any i nformation storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not
available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identi-
fication and explanation without intent to infringe.
English Version by permission of Posts and Telecom Press Co., Ltd.
Typeset in Minion
by codeMantra
Contents
Summary, xiii
Acknowledgments, xvii
Authors, xix
v
vi ◾ Contents
10.3 O
PENNESS OF THE FORWARDER 367
10.3.1 Northbound Openness of the Forwarder 367
10.3.2 Openness of Forwarder Interconnection 371
This book has been written with the support of Huawei’s large accumula-
tion of technical knowledge and experience in the data center network
(DCN) field as well as its understanding of customer service requirements.
It describes in detail the architecture design, technical implementation,
planning and design, and deployment suggestions for cloud DCNs based
on the service challenges faced by cloud DCNs. It starts by describing the
overall architecture and technical evolution of DCNs, with the aim of
helping readers understand the development of DCNs. It then proceeds
to explain the design and implementation of cloud DCNs, including the
service model of a single data center (DC), construction of physical and
logical networks of DCs, construction of multiple DCNs, and security
solutions of DCs. Next, it dives deep into practices of cloud DCN deploy-
ment based on real-world cases to help readers better understand how to
build cloud DCNs. Finally, it introduces DCN openness and some of the
hottest forward-looking technologies.
In summary, you can use this book as a reference to help you to build
secure, reliable, efficient, and open cloud DCNs. It is intended for technical
professionals of enterprises, research institutes, information departments,
and DCs, as well as teachers and students of computer network-related
majors in colleges and universities.
xiii
xiv ◾ Summary
Members
Shaowei Liu, President of Huawei Data Communication Product Line
R&D Department
Zhipeng Zhao, Director of Huawei Data Communication Marketing
Department
Xing Li, President of Campus Network Domain, Huawei Data
Communication Product Line
Xiongfei Gu, President of WAN Domain, Huawei Data Communication
Product Line
Leon Wang, President of Data Center Network Domain, Huawei Data
Communication Product Line
Mingsong Shao, Director of Switch & Enterprise Gateway Product
Department, Huawei Data Communication Product Line
Mingzhen Xie, Director of Information Digitalization and Experience
Assurance Department, Huawei Data Communication Product Line
Jianbing Wang, Director of Architecture & Design Department, Huawei
Data Communication Product Line
INTRODUCTION
This book first looks at the service characteristics of cloud computing
and describes the impact of cloud computing on DCNs, evolution of the
overall architecture and technical solution of DCs, and physical network,
logical network, multi-DC, and security design solutions of DCs. Then,
based on practical experiences of cloud DC deployment, it provides the
recommended planning before deployment and key steps in implementa-
tion. Finally, it explains the hottest technologies of DCNs and the con-
struction solution of Huawei cloud DCNs.
This book is a useful guide during SDN DCN planning and design,
as well as engineering deployment, for ICT practitioners such as network
engineers. For network technology enthusiasts and students, it can also be
used as a reference for learning and understanding the cloud DCN archi-
tecture, common technologies, and cutting-edge technologies.
How Is the Book Organized
This book consists of 12 chapters. Chapter synopses follow below.
Chapter 1: Introduction to Cloud DCNs
This chapter covers basic features of cloud computing, development
and evolution of virtualization technologies, and basics of cloud DCNs.
It also describes characteristics of SDN network development and the
Summary ◾ xv
xvii
Authors
Mr. Lei Zhang is the Chief Architect of Huawei’s DCN solution. He has
more than 20 years’ experience in network product and solution design, as
well as a wealth of expertise in product design and development, network
planning and design, and network engineering project implementation.
He has led the design and deployment of more than ten large-scale DCNs
for Fortune Global 500 companies worldwide.
xix
Chapter 1
Introduction to
Cloud DCNs
1.1 CLOUD COMPUTING
Before examining cloud DCNs in more detail, we should first take a
closer look at cloud computing. The pursuit of advanced productivity is
never ending. Each industrial revolution has represented a leap in human
productivity, as our society evolved from the mechanical and electric eras
through to the current automatic and intelligent era.
Since the 1980s, and owing to the advances of global science and tech-
nology, culture, and the economy, we have gradually transitioned from an
1
2 ◾ Cloud Data Center Network Architectures and Technologies
1.2 VIRTUALIZATION TECHNOLOGIES
INTRODUCED BY CLOUD COMPUTING
Virtualization is a broad term. According to the Oxford Dictionary,
“virtual” refers to something that is “physically non-existent, but imple-
mented and presented through software.” Put another way, a virtual ele-
ment is a specific abstraction of an element. Virtualization simplifies the
expression, access, and management of computer resources, including
infrastructures, systems, and software, and provides standard interfaces
for these resources. Virtualization also reduces the dependency of service
software on the physical environment, enabling enterprises to achieve
higher stability and availability based on simplified operation processes,
improve resource utilization, and reduce costs.
Throughout the years, virtualization technologies have flourished in
the computing, network, and storage domains, and have become inter-
dependent on one another. The development of computing virtualization
technologies is undoubtedly critical, while the development of network
and storage virtualization technologies is intended to adapt to the changes
and challenges introduced by the former. In computing virtualization, one
physical machine (PM) is virtualized into one or more virtual machines
(VMs) using a Virtual Machine Manager (VMM), which increases utiliza-
tion of computer hardware resources and improves IT support efficiency.
A VMM is a software layer between physical servers and user oper-
ating systems (OSs). By means of abstraction and conversion, the VMM
enables multiple user OSs and applications to share a set of basic physical
hardware. Consequently, the VMM can be regarded as a meta OS in a vir-
tual environment. It can allocate the correct amount of logical resources
(such as memory, CPU, network, and disk) based on VM configurations,
load the VM’s guest OS, and coordinate access to all physical devices on
the VM and server, as shown in Figure 1.1.
The following types of VMMs are available:
1. Full virtualization
Also known as original virtualization. As shown in Figure 1.2,
this model uses a VM as the hypervisor to coordinate the guest OS
and original hardware. The hypervisor obtains and processes vir-
tualization-sensitive privileged instructions so that the guest OS
can run without modification. As all privileged instructions are
processed by the hypervisor, VMs offer lower performance than
PMs. While such performance varies depending on implementa-
tion, it is usually sufficient to meet user requirements. With the help
of hardware-assisted virtualization, full virtualization gradually
3. Hardware emulation
The most complex virtualization technology is undoubtedly
hardware emulation. As shown in Figure 1.4, hardware emula-
tion creates a hardware VM program on the OS of a PM in order
to emulate the required hardware (VM) and runs this on the VM
program. If hardware-assisted virtualization is not available, each
instruction must be emulated on the underlying hardware, reduc-
ing operational performance to less than one percent of that of a
PM in some cases. However, hardware emulation can enable an OS
designed for PowerPC to run on an ARM processor host without any
4. OS-level virtualization
As shown in Figure 1.5, this technique implements virtualization
by simply isolating server OSs. As a result, OS-level virtualization
can achieve smaller system overheads, preemptive compute resource
scheduling, and faster elastic scaling. However, its weaknesses include
resource isolation and security. Container technology, as a typical
OS-level virtualization technology, is becoming increasingly popular.
5. Hardware-assisted virtualization
Hardware vendors such as Intel and AMD improve virtualiza-
tion performance by implementing software technologies used in full
virtualization and paravirtualization based on hardware. Hardware-
assisted virtualization is often used to optimize full virtualization and
paravirtualization, rather than operating as a parallel. The best-known
Introduction to Cloud DCNs ◾ 7
(e) Speed 30%–80% More than 80% Less than 30% 80% More than 80%
(compared
with
physical
servers)
Strengths The Guest OS Compared with full The Guest OS does Highly Centralized
does not need to virtualization, it not need to be cost- virtualization
be modified. It is offers a more modified. Typically effective provides the
fast and easy to simplified applicable to fastest speed
use, and provides architecture, which hardware, firmware,
useful functions enables a faster speed and OS development
Weaknesses Performance, The Guest OS must be Very slow speed. (In Limited OS The hardware
especially I/O, is modified, which some cases, speeds support implementation
poor in hosted affects user are lower than one requires more
mode experience percent of that of the optimization
physical server)
Trend Becoming Significant use Phasing out, but still Used for Widely used
8 ◾ Cloud Data Center Network Architectures and Technologies
The requirements for quality attributes vary according to the cloud ser-
vice layer. IaaS is dedicated to providing high-quality hardware services,
while SaaS and PaaS emphasize software flexibility and overall availability.
Based on the hierarchical decoupling and mutual distrust principles, they
decrease the reliability requirement for a single service to 99.9%, meaning
a service can only be interrupted for less than 8.8 hours over the course of
a year. For example, users may encounter one or two malfunctions in the
email system, instant messaging (IM) software, or even the OS, but no real
faults in hardware systems or driver software.
In terms of software technologies, the software architecture and tech-
nology selection of cloud services offer varying quality attributes. Legacy
software can be classified into IT and embedded software. IT software is
applicable to the SaaS and PaaS layers, and focuses on elastic expansion and
fast rollout. In fault recovery scenarios, or those that require high reliability,
IT software uses methods such as overall rollbacks and restarts. Embedded
software focuses more on the control of software and hardware statuses to
achieve higher reliability, and is more widely applicable to the IaaS layer.
As IaaS systems become more automated and elastic, and as new soft-
ware technologies such as distribution, service-orientation, Cloud Native,
and Service Less continue to emerge, SaaS/PaaS systems are being sub-
verted, and IT software is undergoing an accelerated transformation to
Internet software. Based on the DevOps agile development mode, as well
as technical methods such as stateless services and distributed computing,
SaaS/PaaS systems provide self-service, real-time online, and quick rollout
capabilities for services. This transformation drives the development of
new Internet business models.
At the same time, users are beginning to re-examine whether IaaS sys-
tems have high requirements on real-time performance across all scenarios
and whether refined control over systems is required. This kind of think-
ing also influences the development of SDN, splitting system development
along two different paths: control-oriented and orchestration-oriented.
1.4 DCN PROSPECTS
1. Intent-driven network
According to Gartner’s technology maturity model, shown in
Figure 1.6, SDN/NFV technologies are now ready for large-scale
commercial use following many years of development.
In the future, as the development of automation, big data, and
cloud technologies continues, autonomous networks (ANs) will
gradually be put into practice, once again driving the rapid develop-
ment and evolution of the entire industry. However, SDN still has a
long way to go before reaching the AN goal. While SDN technology
activates physical networks through automation, there are still broad
gaps separating business intent and user experience. For example,
an enterprise’s business intent is to quickly expand 100 servers due
to the expected service surge of a big event. To address this intent,
the enterprise needs to perform a series of operations, such as undo-
ing interface shutdown, enabling LLDP, checking the topology,
and enabling the server to manage the network. There are a lot of