Best Practices of Cloud DCN Deployment
This chapter describes how best to deploy the cloud DCN solution based on Huawei’s extensive deployment experience. To begin, design partitions for the DCN and carefully plan the physical network, SDN controller, and cloud platform server for each partition. It is then possible to proceed with deployment, which will include basic network pre-configuration, controller installation, controller interconnection commissioning, and service provisioning.
DEPLOYMENT PLAN
Overall Plan
The deployment plan for the new cloud DCN differs from that of the legacy DCN in the following aspects:
The SDN controller deployment plan is required for cloud DCN deployment. As the SDN controller is essentially software running on the OS, it is necessary to plan server parameters and the working network plane of the OS and SDN controller. Different network planes require different network connections. For example, the southbound network plane of the controller must connect to network devices such as switches and firewalls, for which dedicated IP addresses and routes should be planned. The northbound network plane of the controller is used for administrator web logins and interconnection with systems such as the cloud platform and VMM, for which dedicated IP addresses and routes also need to be planned. Legacy DCNs involve neither the SDN controller, nor interconnection between the SDN controller and other systems.
• A large DC is usually divided into several zones, and a cloud DC may be deployed in one or more zones. In this scenario, interconnections must be planned between multiple cloud DCs, and between cloud DCs and legacy DCs, none of which are required in a legacy DC plan.
Common User Requirements
Understanding user requirements for DCNs is critical when deploying a cloud DC based on SDN. Table 9.1 lists the common user requirements for deploying an SDN DC.
Network Zone Design
A typical large-scale DCN can be partitioned into multiple zones, each with specified functions. Each zone can then be further designed as per their functions. The following is a typical partition example.
As shown in Figure 9.1, the DC is partitioned into three zones: resource zone (production and non-production intranet zones), non-resource zone (production and non-production Internet access zones, production and non-production extranet access zones, and other network access zones), and O&M management zone.
In the resource zone, the production intranet zone carries core enterprise services, which are the most critical enterprise assets. The nonproduction intranet zone carries common office systems, non-critical services, and temporary services.
In the non-resource zone, the production extranet access zone is the egress zone that connects to the remote subnets of an enterprise. Devices such as firewalls, IPS/IDP, and egress routers are usually deployed in this zone for remote networking and security control.
In the non-resource zone, the production Internet access zone is the egress zone that connects to the Internet. Similar to the production extranet access zone, devices such as firewalls, IPS/IDP, and egress routers are generally deployed in this zone for remote networking and security control.
TABLE 9.1 Common User Requirements for Functions
Requirement |
Description |
High volumes of service data traffic |
|
Network service deployment |
|
Basic network functions |
. EVPN-based VXLAN
|
Security |
|
(Continued)
TABLE 9.1 (Continued) Common User Requirements for Functions
Requirement |
Description |
High availability (HA) |
|
High scalability |
|
Maintainability |
|
In the O&M management zone, a dedicated O&M management system is deployed to manage and monitor the entire DCN and IT applications. The network management platform, SDN controller, cloud platform controller node, and VMM monitoring node are typically deployed in this zone.