Network Throughput in a Virtual Infrastructure

Network Throughput in a Virtual Infrastructure

����������� ������������������������ ���������������������� VMWARE WHITE PAPER 1 VMWARE WHITE PAPER The virtualization layer provides an idealized platform that is Introduction isolated from other virtual machines on the system. It provides This paper outlines the considerations that affect network the virtual devices that map to shares of specific physical throughput. The paper examines the applications deployed devices; these devices include virtualized CPU, memory, I/O on top of a virtual infrastructure and discusses the factors buses, network interfaces, storage adapters and devices, mouse that affect the network throughput of virtualized applications. and keyboard and others. Illustrating key points with results obtained with netperf, the paper describes the benchmark settings so that the reader can Each virtual machine runs its own operating system and appli- reproduce the experiments. cations. The virtual machines are isolated from each other; they cannot communicate with each other or leak data, other than VMware virtual infrastructure has many network configuration via networking mechanisms used to connect separate physical options and allows you to implement a wide variety of network machines. This isolation leads many users of VMware software to architectures. This paper will not discuss different network build internal firewalls or other network isolation environments, configurations. See the ESX Server™ Administration Guide for allowing some virtual machines to connect to the outside while information on network configuration options. Instead, it will others are connected only via virtual networks through other focus on network throughput. The discussion should help virtual machines. you to plan for adequate network performance in your virtual infrastructure. Network Virtualization Networking in VMware You may define up to four virtual network cards within each virtual machine. Each virtual network card has its own MAC ESX Server Architecture address and may have its own IP address (or multiple addresses) VMware ESX Server is a data center-class virtualization platform. and connects to a virtual network switch. The network switch ESX Server runs directly on the system hardware and provides may be mapped to one or more network interfaces on the fine-grained hardware resource control physical server. ESX Server manages both the allocation of ESX Server virtualizes CPU, memory, storage, networking and resources and the secure isolation of traffic meant for differ- other resources. Operating systems running inside virtual ent virtual machines—even when they are connected to the machines use virtualized resources, although from the operat- same physical network card. Another choice involves binding a ing system standpoint the resources appear as physical, dedi- virtual network interface to a VMnet, a private network segment cated hardware. implemented in memory within the ESX Server system but not The key elements of the ESX Server system are: bound to an external network. • The VMware virtualization layer, which provides a standard Private Virtual Ethernet Networks (VMnets) hardware environment and virtualization of underlying physical resources VMnet connections may be used for high-speed networking between virtual machines, allowing private, cost-effective • The resource manager, which enables the partitioning and connections between virtual machines. The isolation inherent guaranteed share of CPU, memory, network bandwidth and in their design makes them especially useful for supporting disk bandwidth to each virtual machine network topologies that normally depend on the use of addi- • The hardware interface components, including device drivers, tional hardware to provide security and isolation. which enable hardware-specific service delivery while hiding hardware differences from other parts of the system ������������ ������ Virtualization ������� ��������� �������� The VMware virtualization layer brings hardware virtualization to ������� ���������� the standard Intel server platform. �������� ���������� ������� As with mainframe virtualization, the VMware virtual machine offers complete hardware virtualization; the guest operat- ������� ing system and applications (those operating inside a virtual ������� ���������� ��������� ������� ����������� ������� machine) are not exposed directly to specific underlying �������� physical resources they are accessing, such as which CPU they Figure 1 are running on in a multiprocessor system or which physical memory is mapped to their pages. 2 VMWARE WHITE PAPER For example, an effective firewall can be constructed by con- when the area managers generate activity reports. A few issues figuring one virtual machine on an ESX Server system with to be aware of when considering traffic patterns are: two virtual Ethernet adapters, one bound to a VMnic (giving it • Frequency of the transactions and whether packets come in a connection to a physical network) and the other bound to a bursts. VMnet. Other virtual machines would be connected only to the • Size of the data packets. VMnet. By running filtering software in the dual-homed virtual machine, a user can construct an effective firewall with high- • Sensitivity to data loss; for example, a multimedia streaming performance virtual networking between the virtual machines application using UDP may still present acceptable media without the need for additional hardware. quality to the user even when the data loss is as high as a few percent. General Considerations • Traffic directiveness - most of the time, network traffic is Affecting Network substantially asymmetric, with a lot more data transmitted downstream (from the server to the client) than upstream. Throughput Rated network throughput is almost always higher than the Network Stack Implementation and actual network throughput. Configuration Even when all the physical elements of the network are rated Finally, the network protocol stack implementation in the at the same data throughput, this rate only represents the operating system and application performance in processing maximum theoretically possible throughput, rather than some- network transactions often impacts overall network perfor- thing that can be expected from a realistic architecture. mance. With new network cards and switches now reaching 10Gbps, the bottleneck in processing network traffic often lies Physical Aspects of a Network with available CPU cycles and system memory, whether it is for processing the transaction on the application level or for exe- Before undertaking any network optimization effort, the cuting the operating system’s TCP/IP stack. Another important physical aspects of the network need to be well understood. consideration is the size of the network buffer that defines how The following are just a few aspects of the physical layout that many packets can be queued for sending or receiving. merit close consideration: • Are both the client and the server members of a simple local Traffic Patterns' Effect on area network (LAN) where the systems are connected to the same switch? If not, how many network hops do the packets Throughput need to traverse between the two systems? Do the speed As described above, network throughput is highly dependent and duplex settings for all the switch and host interfaces on the network configuration and the specific application. This match each other? section illustrates with experimental data how traffic patterns • What are the types of network cards in interacting machines? affect throughput in a typical physical system. The examples Server-class NICs are often able to offer better performance. below look at peak network throughput that can be achieved with given equipment on three different workloads. A detailed • Are both the client and the server configured to use auto- study of how the physical aspects of the network affect perfor- negotiation to set speed and duplex settings? Are they con- mance is beyond the scope of this paper. figured for half-duplex or full-duplex mode? • In many cases, a production application such as a Web server • What size packets are transmitted through the network? Do does not need high throughput for successful operation. In the packets need to be fragmented or consolidated along the fact, most VMware customers configure multiple workloads transmission path? to share the same network adapter with satisfactory network performance. Traffic Patterns This paper uses a networking benchmark tool, netperf, to Yet another set of issues impacting networking throughput approximate three common traffic patterns in order to inves- and latency involve the use patterns of the network. Even traffic tigate and compare their associated throughput. Netperf is generated by the same application can be different depending designed around the basic client-server model. The tool consists on the groups that utilize the application and time of day. For of two executables—netperf, which represents a client process example, a CRM application may generate a steady stream of and netserver, which represents a server process. The options small packets when used by individual sales representatives, for traffic patterns are set on the system running netperf, while but the traffic may become bursty and consist of large packets the netserver is invoked on the server system. 3 VMWARE WHITE PAPER It should be noted that the netperf test tool generates and ������ ����������� transmits network packets. In this way, it is able to measure ���������������� ������

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us