Click here to close now.

Welcome!

Microservices Journal Authors: Lori MacVittie, Alena Prokharchyk, Carmen Gonzalez, Srinivasan Sundara Rajan, Elizabeth White

Related Topics: SDN Journal, Java, Microservices Journal, Linux, Virtualization, Cloud Expo

SDN Journal: Blog Post

Different Shades of Invisible

We need to get to a network that is invisible enough to allow you to create coarse provisioning policies

We love analogies. No matter what the topic, analogies are a great way to explain something in a different context to make a specific point with a frame of reference that may be more familiar to those we are making a point to. There is one that seems to come back over and over again in our industry, the one that compares the network to the power grid, network connections to power plugs.  I had not heard it for a while but at Interop last week, I heard it used twice in booth demonstrations as part of plug and play pitches. And I really do not like that analogy.

The comparison to power comes from the angle of it just being there and available. Plug something in and it turns on. Its universal and it’s simple, anyone can use it. It’s highly standardized, you can buy bits and pieces that work together in any hardware store. It’s reliable. You just get a bill each month, pay it, and in many places you can even pick your provider different from the owner of the cable that actually plugs into your house. It’s all good, it’s mostly invisible.

Except that all of these come with their own challenges. The overall power grid reliability is well below 99.99%. Across the US, the average outage minutes per year is hovering in the 2 hour range, in the Northeast almost double that. There are only very people I know that do not have a backup generator, just in case, and get to use it at least once a year, ignoring the smaller outages where we just live in the dark for a few minutes. It is very standardized, with plenty of standard variations from country to country, thank goodness for $30 converters. And the cost, well, it’s rising faster than inflation (almost twice as fast in fact).

Now, this article is not meant to be a complaining session about power. When power works and you forget about the bill, it is very much invisible, which is the only piece of the analogy I do like, maybe.

Networks should be invisible, but not in the same sense power should be invisible. When comparing networks to power it always comes down to “it’s just there, plentiful, accessible, and just works”. And (not surprising), I think the network can do much better than “just be there”. Networks need to migrate away from an entity that is architected, designed, implemented, managed and debugged separately from the applications it serves. Networks have to become an integral part of the application infrastructure.

Now, any two (or more) distinctly different entities need to be glued together. No different for applications, servers and networks. Applications are glued to servers by means of the OS. As a consumer of an application, or even an administrator, the amount of work you have to do to put these two together is (usually) fairy minimal. The creator of the OS has provided tons of hooks and tools to give the application what it needs, the application provides to and asks what it wants from the OS.

The glue between the server and the network is much harsher, much less refined. There is an expectation of matching configuration, very little is actually transacted between the two to get them to work together nicely. Yes there is DHCP and perhaps you can even count LLDP in that, but the amount of alignment of information between the two so they can work together seamlessly without human intervention is minimal. And if something is not quite working the way it should, you need heavily certified network engineers and tons of homegrown tools and scripts to figure out why. That is by no means a knock on network certifications (that is for @cloudtoad to comment on), but it should not be that hard. The exchange is extremely focused on data plane traffic for transportation, very little provisioning, debug and other feedback is exchanged and reacted to.

We need to get to a network that is invisible enough to allow you to create coarse provisioning policies created from application templates. There should be no need for me to configure individual ports and protocols on ports. There should be no need for me to configure how network components are tied together and provide optimized connectivity based on the needs of its customers. The network needs to provide debugging tools that interact with applications in feedback loops. It needs to provide enough details for orchestration systems to adjust their placement of apps. Or in Plexxi’s case, take in information from orchestration systems to change the L1, L2 and L3 behavior of the network to the requested demand. And that orchestration system could be a specialized Hadoop controller or a far more generic cloud orchestrator.

The network needs to cease to exist as a separate entity, it needs to become an integrated part of the application infrastructure that uses its services. That’s the kind of invisible we need to achieve.

[Today's Fun Fact: An Iranian man paid $500 to a wizard to become invisible. The man then walked into a bank and grabbed money from people's hands believing he was invisible. He was promptly arrested and convicted. Conclusion: pay more or pick a better wizard next time.]

The post Different shades of invisible appeared first on Plexxi.

Read the original blog entry...

More Stories By Marten Terpstra

Marten Terpstra is a Product Management Director at Plexxi Inc. Marten has extensive knowledge of the architecture, design, deployment and management of enterprise and carrier networks.

@MicroservicesExpo Stories
Security is one the more prominent of the application service categories, likely due to its high profile impact. After all, if security fails, we all hear about it. The entire Internet. Forever. So when one conducts a survey on the state of application delivery (which is implemented using application services) you kinda have to include security. Which of course, we did.
One of the most frequently requested Rancher features, load balancers are used to distribute traffic between docker containers. Now Rancher users can configure, update and scale up an integrated load balancing service to meet their application needs, using either Rancher's UI or API. To implement our load balancing functionality we decided to use HAproxy, which is deployed as a contianer, and managed by the Rancher orchestration functionality. With Rancher's Load Balancing capability, users ...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
The concept and subsequent adoption of 'Containerization'' is growing at a rapid speed with the support of almost every other major player in the industry. This concept is much more efficient than the Virtualization which has been a major option for Infrastructure optimization in the past decade. The following factors distinguish a Container from a Virtual Machine. Containers contain Only the Application Specific libraries and binaries. They do not include a guest operating system. Rather ...
Chef and Canonical announced a partnership to integrate and distribute Chef with Ubuntu. Canonical is integrating the Chef automation platform with Canonical's Machine-As-A-Service (MAAS), enabling users to automate the provisioning, configuration and deployment of bare metal compute resources in the data center. Canonical is packaging Chef 12 server in upcoming distributions of its Ubuntu open source operating system and will provide commercial support for Chef within its user base.
In 2015, 4.9 billion connected "things" will be in use. By 2020, Gartner forecasts this amount to be 25 billion, a 410 percent increase in just five years. How will businesses handle this rapid growth of data? Hadoop will continue to improve its technology to meet business demands, by enabling businesses to access/analyze data in real time, when and where they need it. Cloudera's Chief Technologist, Eli Collins, will discuss how Big Data is keeping up with today's data demands and how in t...
Choosing between BIG-IP and LineRate isn't as difficult as it seems.... Our recent announcement of the availability of LineRate Point raised the same question over and over: isn't this just a software-version of BIG-IP? How do I know when to choose LineRate Point instead of BIG-IP VE (Virtual Edition)? Aren't they the same?? No, no they aren't. LineRate Point (and really Line Rate Precision, too) is more akin to an app proxy while BIG-IP VE remains, of course, an ADC (Application Delivery ...
SYS-CON Media announced today that @ThingsExpo Blog launched with 7,788 original stories. @ThingsExpo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @ThingsExpo Blog can be bookmarked. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.
No, not the head-banging, gritty, heavy metal Metallica song (though that's certainly awesome too.. excuse me for a moment while I turn it up to 11) but the Puppet as in automation kind of master. The importance placed on APIs - which are key to automation - in our State of Application Delivery 2015 survey was high, with 40% of respondents saying it was important to them that their infrastructure be API-enabled. Automation using those APIs is generally being accomplished through a variety of m...
So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, ...
SYS-CON Events announced today that Vicom Computer Services, Inc., a provider of technology and service solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. They are located at booth #427. Vicom Computer Services, Inc. is a progressive leader in the technology industry for over 30 years. Headquartered in the NY Metropolitan area. Vicom provides products and services based on today’s requirements...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at 16th Cloud Expo, Haseeb Budhani, CEO and Co-founder of Soha, will share five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the frict...
Modern Systems announced completion of a successful project with its new Rapid Program Modernization (eavRPMa"c) software. The eavRPMa"c technology architecturally transforms legacy applications, enabling faster feature development and reducing time-to-market for critical software updates. Working with Modern Systems, the University of California at Santa Barbara (UCSB) leveraged eavRPMa"c to transform its Student Information System from Software AG's Natural syntax to a modern application lev...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
As we recently previewed (read more about our London PoP in Jesse's post), Blue Box is opening a new Data Center in London, but hadn't announced the provider. Today we're excited to partner with TelecityGroup, whom we've selected as our data center partner in London. We chose their Powergate location, which is one of the U.K.'s most advanced, flexible and energy efficient carrier-neutral data centres. Why does that matter to you? Well, when customers choose Blue Box, they're trusting us with ...

As a company making software for Continuous Delivery and Devops at scale, at XebiaLabs we’re pretty much always in discussions with users about the benefits and challenges of new development styles, application architectures, and runtime platforms. Unsurprisingly, many of these discussions right now focus on microservices on the application side and containers and related frameworks […]

The post Apr. 26, 2015 10:00 AM EDT  Reads: 1,134

Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
A few weeks ago, SmartBear hosted API Craft Boston with the folks from Akana, Ian Goldsmith and Laura Heritage, to talk about microservices. It was an extremely informative presentation of where microservices came from, what it solves, and considerations around how it might fit into an organizational API strategy. It’s one thing to read everyone else’s opinions on blogs, twitter, etc. It’s great to go to workshops and conferences, but this was so intelligently presented (and for a meetup too)...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? Join this panel of experts as they peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you’ll have no problem filling in your buzzword bingo cards.
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...