H3C Data Center Solution

Size: px
Start display at page:

Download "H3C Data Center Solution"

Transcription

1 Data Center SOLUTION H3C Data Center Soltion Forward A data center (DC) refers to an integrated IT application environment formed throgh data centralization. It is a center that provides diversified IT applications and a center of data processing, transmission, and storage. A DC realizes the nified management of IT infrastrctre, services, and data, the nified deployment of secrity policies, and O&M management. DCs remain the focs of IT constrction by telecom operators and indstry cstomers. Operators, large-scale bsinesses, government agencies, and bsinesses in the fields of financial secrities, energy, electricity, transportation, edcation, manfactring, power grids, and e-commerce have already constrcted or are constrcting their DCs. Thanks to DCs, IT information systems are integrated and nified management is now available to raise internal operations and management efficiency and external service levels while redcing the TCO of IT constrction. H3C is dedicated to the research, development, prodction, and sales of IP technologies, prodcts, and services. Apart from the fll series of Ethernet switches and roters, H3C has gained a steady growth in secrity, IP storage, IP monitoring, voice videoconferencing, WVLAN, SOHO, and software management systems. At present, H3C ranks the first in China in the market share of prodcts, among the top three in the market share of secrity prodcts in China, and the first in the market share of IP storage prodcts in the Asian-Pacific region. H3C takes a lead in the world in the IP monitoring technology. From a eqipment spplier, H3C has established itself as an IToIP soltion provider with mltiple prodcts. H3C follows closely the development of the data center sector and sstains the inpt to the R&D of DC soltions. The H3C IToIP-based DC soltions that combine, secrity, IP storage, software management, and IP monitoring effectively address varios togh problems in the constrction of data centers and have been extensively applied to DCs of all sectors. Based on the long-standing R&D and technological accmlations in the data commnications field and the history of DCs, H3C divides the development of DCs into the following levels: Basic DC integration: In this stage, the primary focs of data center constrction is to integrate the existing heterogeneos service systems, resorces, and IT resorces based on service reqirements and open-standard IP protocols. A basic DC is divided into fnctional areas, follows layers, and featres hierarchical server access. Thanks to the high availability (HA) technologies and sond design, yo can ensre the reliable rnning of data centers and garantee service continity. Application intelligence data center: Based on the open TCP/IP architectre, application intelligence enables the seamless deployment and pgrade of varios new services and applications on the basic DC architectre. This satisfies the changing reqirements of sers and ensres the service sstainability and continity of a data center. The secrity, optimization, and integration of diversified applications can be seamlessly deployed over the data center. Data center virtalization: The traditional DC model with isolated application islands has poor scalability. The allocation of core resorces does not match the service application development, leading to neven resorce tilization and driving p operation costs. As a reslt, the existing investment cannot bring ot the optimal tilization; new services can hardly be deployed; the continity of existing services cannot be garanteed; the data center faces secrity threats. By bilding a shared resorce pool, virtalization manages, plans, and controls, processing, and storage resorces, simplifies management and maintenance, enhances the tilization rate of device resorces, optimizes the service procedres, and lowers maintenance costs. Data center resorce intelligence: With the intelligence management platform, yo can manage, allocate, and

2 H3C Data Center Soltion schedle resorces in an intelligent manner, and constrct a highly intelligent atomatic data center. I. Basic Network Integration 1. Network Design With the rapid development of services, the service applications and data of bsinesses inclding operators, firms, and indstrial sers are heading for integration from scattered deployment. The deployment model of IT facilities that carry services also experiences dramatic changes. The interconnection cannot satisfy the reqirement for sstained service development after the application integration. A is the only niversal entity that connects all DC IT components. Bilding solid infrastrctres garantees the continity, management, and O&M of data center services. User services are generally classified into several sbsystems that depend on each other in terms of data sharing, service access, data access control and isolation. Based on service relevance and related procedres, ser services shold be designed into different modles on the principle of low copling and high cohesion to ensre system and data secrity, reliability, flexible scalability, and easy management. The design of basic DC s shold follow the principle of different areas, layers, and hierarchies. Area division In area division, yo are reqired to divide ser services into mltiple service sbsystems based on the relevance and management of the entire IT system. Each sbsystem has independent core switches, servers, and secrity bondary devices. The sbsystems follow hierarchical access control policies. Rational logical area division and secrity area division are a prereqisite for a data center. Based on the characteristics of a company, the relevance of service systems, the access reqirements of data flows, and the secrity control reqirements, DC servers and service systems can be divided into the areas of intranet, extranet, and Internet. In each area, the service procedres can be frther classified. Intranet area An intranet area is generally an internal data center area that allows data access within a company. An intranet is not visible to external s. Extranet area An extranet area is a data center area that allows data access of partners. By constrcting VPNs, sers can access server farms and isolate different bsinesses. Internet area An Internet area, also known as the DMZ area, is a data center area provided by a company for the access of Internet sers. External sers can access the Internet area throgh a pblic. The Internet area is sally deployed on the server farm that accommodates the portal website of the company. Layered design It is based pon the principle of internal and external traffic flows. A DC is divided into three layers: core layer, aggregation layer, and access layer. The traffic between a server and a service system is mostly within a single fnctional area and does not need to enter the core layer. The traffic between layers, however, shold enter the core layer. In this manner, yo can easily configre access control policies on the aggregation switches in each area, lessen the traffic pressre on the core layer, minimize the scope of a falt, and rapidly rectify a falt. Core layer The core layer connects mltiple interconnected DC aggregation modles and connects the camps core area. The core layer is reqired to have powerfl switching capability and strong adaptability to brst traffic. A 2

3 H3C Data Center Soltion large-scale DC core layer shold be able to connect mltiple aggregation modles throgh extension. Small and medim-scale DCs can share the camps core area. Crrently, 10-Gbit/s interfaces are mostly in se. For to eight 10-Gbit/s interfaces shold be bndled to spport high performance applications. Aggregation layer The aggregation layer provides server farms with otbond interfaces of high bandwidth. High-density GE or 10GE interfaces are reqired to connect the access layer. The aggregation layer provides many slots for vale-added service modles. Access layer The access layer provides high density GE or 10GE access. The percentage of the overall access bandwidth and the pstream bandwidth has two modes: aggregation ratio and line rate. In terms of rack monting, the 1 RU is capable of flexible deployments. The access layer spports stacks and featres good scalability. It also spports dal pstream links in redndancy mode. The Web layer is responsible for providing application windows, accepting cstomer reqests, and retrning end reslts. It is the external interface of service systems and data. IIS and Apache servers work on the Web layer. Application layer The application layer is responsible for data processing and service procedre integration. The common middleware technologies sch as WebLogic and J2EE are implemented on the application layer. Database layer The database layer is responsible for storing data for the access and random debgging of service systems. MS SQL server, Oracle 9i, and IBM DB2 work on the database layer. The mainstream practices in the indstry show that diversified secrity and application optimization services are deployed on the aggregation layer. For example, integrate the firewall, load balancing, or application accelerator board fnctions on the switch. Internally interconnected throgh the switching, the three-tier server access model featres hierarchical secrity protection, distinct architectre, and convenient deployment. The three-tier interconnection has two models: horizontal and flat. The horizontal model has a distinct architectre and easy management whereas the flat model saves investment. Advantages of the H3C basic DC s Secrity The secrity relations in different areas can be easily identified. Yo can then enforce secrity policies in each area separately withot affecting other areas. Hierarchical strctre The application access model has already transformed to the browser/server (B/S) model from the traditional client/server (C/S) model. The B/S model reqires a three-tier server strctre that can be classified into the following layers: Web layer Scalability Bilt into different areas and levels as reqired, the H3C basic DC boasts flexible service deployments. Yo can easily add a new server farm area withot changing the original strctre. High availability Yo can easily isolate falty areas, simplify data paths, and 3

4 H3C Data Center Soltion accelerate the convergence time. Easy management The distinct strctre facilitates rotine O&M and falt location. 2. High Availability Soltion With the increasingly intensified market competition, cstomers depend more and more on information systems. The reqirements for information systems also grow higher and higher. To ensre a HA data center, providing the 7 x 24 services becomes the primary objective in constrction. It is also the tmost concern in DC constrction. Network failres that lead to navailable s are classified into the following types: Uncontrollable factors inclding natral disasters, wars, blackot, and hman sabotage By constrcting the "three centers at two locations" model that consists of a prodction center, a local backp center, and a remote disaster tolerance center, together with rational overall planning and design, yo can ensre the HA of a data center in the case of ncontrollable factors. Controllable factors inclding device failres, link failres, congestion, misoperations, and malicios attacks Several factors are considered by H3C in prodct designs and a fll series of soltions that cover the physical layer, link layer, IP layer, transport layer, and application layer are implemented to enhance availability in an all-rond manner. Hardware redndancy: dal main control boards, hot swappable boards, redndant power spply modles, and redndant fan modles In addition to HA prodcts, H3C also provide a complete HA data center soltion. The soltion incldes HA server access, HA from the access layer to the aggregation layer, and HA aggregation layer. HA server access It is also called the mlti-nic server access. To ensre the HA of service access, a server is generally connected to an pstream device throgh mltiple links. In this case, two or more NICs are in se. The driver program in the server bndles the two or mote NICs into a virtal NIC. If one NIC fails, the other NIC takes over the MAC address. The two NICs se the same IP address and are located in the same broadcast domain, that is, in the same sbnet. There are many methods to connect a server to an access switch. The availability of the preceding connections increases from left to right. The forth connection method is recommended. In this mode, a server is connected to two cabinet switches in falt tolerance mode. In addition, a VLAN trnk is configred on the switches to ensre highly reliable access of the server. HA from the access layer to the aggregation layer There are for methods to connect access devices to the aggregation layer: inverted U-shape, U-shape, triangle, and rectanglar. These connection methods are all based on Layer 2 links. Take the rectanglar connection as an example. The links between access devices, from access devices to aggregation devices, and between aggregation devices are all Layer 2 links. This forms rectanglar Layer 2 links. Redndant physical links sch as Ethernet link aggregation Ring technologies sch as RPR and RRPP Redndant Layer 2 paths sch as MSTP and SmartLink Redndant Layer 3 paths sch as VRRP, ECMP, and fast convergence of dynamic rotes Fast falt detection technologies sch as BFD Non-blocking forwarding technologies sch as GR 4

5 H3C Data Center Soltion H3C recommends the triangle connection: It spports redndant links and paths and has the smallest convergence time in case of failres. The VLAN can extend to different switches on the aggregation layer and the servers boast flexible deployments. In practice, yo can choose one of the following schemes as reqired: H3C Intelligent Resilient Framework (IRF): The H3C IRF manages distribted devices, distribted rotes, and aggregates links connecting different devices. In addition to improved availability and redced impact of single point failress, the H3C IRF also has the following featres: - Largely enhances the performance by the distribted processing of Layer 2 and Layer 3 protocols. - Ensres effective configration management by considering each grop of devices as a logical fabric. - Facilitates easy pgrade by allowing the simltaneos software pgrade of all devices in a stack grop. - Allows flexible management by spporting hot swapping of devices in all stack grops. Adopt MSTP+VRRP to connect access devices to aggregation devices. This improves availability and also shares the traffic load among links. HA aggregation layer Configre VRRP between aggregation switches. VRRP configred between secrity and application optimization devices can be bilt in or attached to aggregation switches. The attachment method is recommended. In this case, the devices are not connected to the in tandem, eliminating performance bottleneck. With the HRP protocol, yo can back p the key configration commands and session stats between the master and the backp firewall devices. The HRP protocol is carried over VGMP packets. Throgh the specified load balancing algorithm, the packets to a server farm are balanced among the member servers. This maximizes the external service provision capability of the server farm, improves the availability of servers, and enhances the processing performance of the server farm. II. Application Intelligence 1. Model Today, with the emerging of Web 2.0 applications sch as Flickr, YoTbe, Blog, WIKI, and Podcast, the Internet thrives again after the first bbble collapses. The nderlying hero of these new applications is the Web technology. Web 1.0 addresses the sbject of standardizing hman-machine interactive interfaces, and Web 2.0 frther standardizes the application data interaction. Web 2.0 is developed on the basis of XML protocols and a series of Web technologies. The most striking characteristic of the Web 2.0 era is that every one can become a data provider. In the coming few years, the poplarity of Web applications is bond to lead to the emerge of a new standard, that is, standard Web-based applications. In the OSI model, it is the standard session and presentation layers. Once standardization is complete, application is available. This means that the standardized application fnctions are integrated to devices. New services are pressing for new application intelligence s. Corporate services and data head for high centralization from scattered deployment. The nmber of data centers soars and the attention paid to the significance of data centers is nparalleled. Application optimization, secrity, and application secrity devices are deployed in a large scale. Application intelligence data centers that combine application secrity and optimization capabilities are becoming increasingly poplar. In this context, mlti-service aggregation switches become an indispensable component in data center constrction. Application secrity incldes: 5

6 H3C Data Center Soltion Athentication, athorization, and acconting at the application layer Encryption (SSL) and integrated PKI deployment at the application layer Firewall (HTTP/XML firewall, Secrity Assertion Markp Langage (SAML)) at the application layer Protecting application contents against virses and intrsion Application optimization incldes: Application load balancing Hardware-based application bffer, compression, and switching Application protocol optimization (HTTP/TCP) The following figre shows the model of an application intelligence DC that combines application secrity and optimization. inherent secrity reqirements of a data center. Based on an in-depth analysis of IT secrity, H3C pts forward the stats-based evolving secrity model that classifies the IT secrity into the following: Device secrity: indicates rights management, virs protection, and data backp. Regional secrity: indicates remote access, intrsion inspection, secrity convergence, and secrity cooperation. Deep secrity: indicates disaster tolerance backp, deep defense, secrity aditing, and traffic analysis. Unified secrity: indicates risk management, corporate internal control, nified planning, and nified management. With the evoltion of the stats, secrity takes a trend of application intelligence secrity. In whatever sitation, information is in only one of the following processes: Processing: indicates the process that information is created, modified, deleted, searched, or processed in-depth. Commnications: indicates the process of transmitting information between different settings or within one setting. Storage: indicates the process of saving information temporarily or permanently. Secrity application aims to protect the data in the three statses. The secrity stats of information determines its secrity policy. With regard to a data center, the secrity policies cover access control, patch management, attack defense, filtration defense, virs control, traffic control, and risk control. Secrity areas 2. Secrity Apart from carrying core services and confidential data of sers, data centers also provide service interactions and data exchanges between internal and external cstomers, and partners. In this case, the secrity of data centers mst be integrated with service systems and secrity policies shold be easily deployed on s. One of the major concepts in the secrity constrction of data centers is layered hierarchical secrity. The secrity of an IT system contains several levels and is divided into different secrity areas, spplementing to the The basis of secrity policies lies in the logical division of services and of secrity areas. The advantages of secrity area division in data center services are as follows: Easy deployment of new fnctional areas Different secrity policies for different areas Independent expansion of each area if reqired Easy falt location and rapid recovery in case of failres In accordance with the division concept, a data center is divided into different logical areas based on the service types. Each area 6

7 H3C Data Center Soltion is deployed with its own secrity policy and trst model. The data center ths becomes a hierarchical secrity domain. In actal deployment, secrity policies are classified into: Bondary access control Deep intelligence defense Intelligent secrity management 1. Bondary access control Bondary control, the access control of sers to a data center, is the fndamental reqirement of the data center. With the evoltion of secrity stats, secrity takes a trend of application intelligence secrity. H3C SecBlade II 10GE firewalls, core and aggregation switches are all integrated with mltiple services and can exchange data directly throgh the backplane. The doble merits of high performance and reliability avoid the performance bottleneck and single point failres of switches dring in-service deployment. Compared with the attachment of a firewall to a data center, bondary control featres easy configration of policies, nchanged data forwarding paths, distinct traffic forwarding process, and easy deployment and maintenance. is necessary to collect and manage the secrity,, system, and application events, and convert and screen the raw data into effective information of intelligence secrity throgh intelligence analysis. The H3C SecCenter soltion manages the secrity and prodcts of p to 100 mainstream sppliers, generates reports atomatically or manally, monitors the traffic and attacks in real time, analyzes the relevance of mass events and threats, performs the secrity aditing, and keeps track of any falt origins. In all, the H3C commnications secrity goal is to provide service-oriented end-to-end secrity garantee to clients, s, DC servers, and storage systems. 2. Deep intelligence defense In the presence of endless intrsions of DDoS attacks, Trojan horses, and hackers to a data center, traditional IDS prodcts detect only some events and cannot realize real-time analysis and defense. The indstry leading H3C Intrsion Prevention System (IPS) is deployed on the key paths of a cstomer in online or bypass mode (so that the IPS can protect the against attacks or configre the Layer 2 retrn fnction). The IPS performs the Layers 2 throgh 7 deep analysis for data flows on the key paths, accrately identifies and blocks or restricts in real time the attacks by hackers, worms, virses, Trojan horses, DoS/DDoS, scanning, spyware, abnormal protocol, phishing, P2P, IM, and online games, or abses. In this manner, the H3C IPS protects the applications, infrastrctre, and performance of the cstomer's. The H3C IPS series prodcts also boast strong and practical bandwidth management and URL filtering fnctions, bringing cstomers high added vales. 3. Intelligent secrity management In addition to the operations of mass devices, service interactions between varios servers and operating systems abond in a data center. Immense alarming, monitoring, SNMP, and WMI messages are also transmitted over the DC. It 3. Optimization With the continos development of the Internet and ser services, Web applications already become the major data processing tasks of servers. HTTP is sed to transmit Web-based data between a server and a client. TCP is employed to provide garanteed connections and falt correction to HTTP. Althogh an ideal transmission mechanism, TCP also has limitations. When sed to transmit Web data, TCP consmes a large amont of resorces and reslts in the poor performance of servers. The performance bottleneck of data centers becomes increasingly severe. To address sch performance problems, traffic management prodcts sch as roters that can identify and manage deep inspection for the P2P traffic are introdced at the layer to handle application optimization problems in data transmission. These prodcts balance the traffic load and aim to overcome the bottleneck in server access. They cannot, however, solve the performance problems at the application layer of a data center. In this context, H3C application optimization devices are introdced. The H3C devices se advanced connection 7

8 H3C Data Center Soltion management technologies to nload TCP and optimize the end-to-end transmission at the transport layer, take into accont the concrrent processing of SSL, compression, and encryption, largely enhancing the performance of data access to data centers. When connected to clients, the ASE primarily handles and maintains all connections initiated by the clients. For a server, however, the ASE creates a few bt long-standing connections to the server and ses these connections to transmit new data continosly. GET A;GET B;GET C GET A;GET B;GET D GET C;GET D;GET E GET B;GET A;GET D GET C;GET D;GET E GET A;GET B;GET C GET E;GET B;GET C GET F;GET E;GET G GET F;GET A;GET C GET A;GET B;GET C GET C;GET D;GET E Server H3C SecPath ASE series are designed in hardware-based architectres (NP+FPGA) and spport TCP optimization, contents compression, load balancing, and SSL acceleration throgh different bilt-in hardware modles to achieve application acceleration. The H3C ASE relieves data centers from the existing nbearable heavy load and forms an integrated soltion with other prodcts to accommodate the reqirements of data centers. The following figre shows the application scenario of the H3C SecPath ASE. The ASE ses varios algorithms to determine when a new connection to the server shold be set p or when an existing connection shold be contined. The advantages of connection pooling broght by the ASE are as follows: 1) The ASE handles all connections from the clients and the server is not reqired to set p or release connections. 2) The server needs to process only a few TCP sessions after the connection pooling. 3) The ASE shields varios WAN accesses from clients and avoids the impact of server delay, clash, and packet loss on the clients. 4) The ASE sets p a few connections to the server and transmits a large volme of data, maximizing resorce tilization. In addition, the ASE is in the same LAN as the server, which is like relocating clients to the server LAN. This largely redces the delay from clients to the server. The ASE integrates Web acceleration, SSL nloading and acceleration, compression, TCP optimization, load balancing, and anti-ddos attack into a hardware platform, where each fnctional modle is rn by a special hardware chip. The hardware-based acceleration processing technologies are sed to help bsinesses enhance application performance and the performance of a Web server can be enhanced p to 10 times. In addition, the SecPath ASE provides high availability load balancing, rapid and sper intelligent Layers 4 throgh 7 switching, fine interaction control, and other featres to garantee the finest protection to DC s. In a client and server model, the ASE assmes dal roles. For the client, the ASE is a server and for the server, the ASE is a client. The connection and reqest processing mechanism and powerfl processing capability of the ASE enables the ASE to handle peak loads and protects the server against overloads so that the fll potential of the server can be pt into play. SecPath ASE single-arm deployment In the single-arm mode, yo can attach the ASE to a withot changing the original deployment. Users who access the Web server shold first be directed to the ASE and the ASE then sends service reqests to the daemon server. Diagram of the SecPath ASE single-arm deployment 8

9 H3C Data Center Soltion to clients in a rapid and steady manner. Withot load balancing configration at a data center, the servers have neven traffic loads. To handle new service reqests, some already heavily-loaded servers show degraded performance, have longer response time, and even go Down. Other servers may have light loads or remain idle for a long time. As a reslt, the overall performance of the data center is degraded; the resorce tilization is decreased; the overall investment is not garanteed. This deployment does not change the setting and greatly speeds p application operations while ensring application reliability. It also redces maintenance tasks and lowers rotine operation costs. SecPath ASE online deployment In this mode, the ASE is deployed in the front of the server farm to provide application acceleration and load balancing to sers and to enhance the performance of applications. Diagram of the SecPath ASE online deployment After load balancing is configred, the neven task schedling and nreasonable resorce tilization of servers are addressed, and the performance and the overall robstness of the service system improved. The ASE provides sers with an application acceleration path, terminates the connections from remote sers, and performs application acceleration and load balancing. In online deployment mode, the SecPath ASE transparently transmits non-http protocol packets to ensre the normal operation of other services on the servers. Meanwhile, the end sers who access the Web server first have to access the ASE. This protects the end servers from DDoS attacks becase the servers are not directly connected to the Web server. 4. Load Balancing As the heart of service s, data centers are confronted with nmeros challenges. Scalability, flexibility, high performance, reliability, and secrity are all imposed on data centers. It shold be particlarly noted that in the case of an abrpt increase in access reqests, servers are still reqired to transmit applications The SecBlade Load Balance (LB) service modle, a model of high-performance load balancing devices, perfectly combines application optimization with switching devices in an innovative manner. The model featres plg-and-play and strong scalability, redces management complexity, and lowers maintenance costs. By identifying and differentiating varios applications and monitoring the health and performance of servers and firewalls, the SecBlade LB ses the ato-adaptive intelligence algorithms to evenly distribte the application reqests to different devices. This greatly speeds p application access and provides bsinesses and operator s with a cost-effective load balancing soltions with high performance. 9

10 H3C Data Center Soltion Increased nmber of service systems: reqires more devices and servers. The rnning service systems change freqently and the shortage of resorces and devices becomes increasingly intensified. Mass devices and complex deployment: In the trend of high data centralization, the IT infrastrctre inside a DC eqipment room becomes hge. The nmber of devices to be added contines to increase and the deployment complexity grows. Contined rising investment: The scale of IT infrastrctre mltiplies and drives p the costs in the hardware, software, and hman resorces reqired in a data center. Two links or link aggregation grops, which are L3 and L2 links or link aggregation grops, exist between the LB and an aggregation switch. The server gateway is directed to the LB. For the traffic that shold be balanced, the aggregation layer specifies the next hop of the VSIP packets to the LB. The defalt rote of the LB leads to the aggregation switch. High O&M costs and energy consmption: The increased nmber of devices natrally leads to higher costs in energy consmption and O&M, which does not follow the trend of green data centers. Energy consmption already becomes a heavy economic brden in the O&M of a data center. To lower the TCO, data centers shold be integrated. This involves a series of togh problems. Secrity: Secrity shold be garanteed when mltiple services are integrated on the same set of devices. Rational resorce allocation: Different services have different reqirements on the DC resorces and rational resorce allocation mst be ensred for each service. Virtalization addresses these problems by creating one logical entity for mltiple physical entities or creating mltiple logical entities for one physical entity. An entity can be compting, storage,, or application resorces. The essence of viralization is isolation. The virtalization technology isolates different services and blocks their mtal access to ensre the secrity reqirements of services. Virtalization also isolates different service resorces to meet the reqirements of data center resorces by services. The H3C virtalization soltion consists of three parts: III. Virtalization Thanks to continos development of services, freqent pgrade of systems, increasing nmber of devices, and soaring energy consmption, data centers enconter a togh isse to match resorce allocations with service development. Network virtalization Compting virtalization Storage virtalization The combination of DC virtalization and camps virtalization links DC access with the athentication, 10

11 H3C Data Center Soltion secrity check, and dynamic athorization of end sers. This ensres the secrity of and flexible access to a data center. The core switch at the data center serves as the PE of the camps area VPN and the aggregation switch as the corresponding MCE. In this manner, the camps area virtalization is terminated at the data center. Configre VLANs on the access switch at the data center to logically isolate services. Each VLAN is recorded in the corresponding roting table of the MCE. In this manner, the data center virtalization is penetrated to the camps area virtalization throgh the access, aggregation, and core devices at the data center, forming an end-to-end virtalization. The firewall at the data center spports virtalization and can be integrated onto or attached to the aggregation switch to assist virtalization in the virtalization of data center resorces. The highlight of the H3C data center virtalization is the end-to-end virtalization of s, compting, and storage. IV. Storage DC virtalization, client virtalization (EAD), and camps virtalization form the end-to-end virtal access path of H3C s. H3C cooperates with VMWARE, the indstry leader, to realize the virtalization of compting resorces. The H3C adopts the IV5000 series that spport the dynamic expansion of physical disk spaces to implement storage virtalization. In this manner, existing devices can be incorporated in the advanced storage virtalization system. This garantees the existing investment of sers, lowers the TCO, implements the dynamic expansion of storage capacity, and raises the Retrn on Investment (ROI). IP standards have developed into information technology infrastrctre standards. Driven by this irresistible force, standardization, enhanced performance, compactness, and easy availability become the trend of IP storage. All transport technologies applied with IP technologies provide wide application prospects for IP storage. With the combination of the increasingly sophisticated 10GE storage technology and the 10GE transport technology, the IP -based storage technologies is predicted to dominate the integrated data center storage. The H3C fll series IP storage prodcts provide complete data center storage soltions. 1. Integrated Storage Soltion 11

12 H3C Data Center Soltion 10GE access to the servers GE access to the servers soltion allows not only the rapid recovery of historical data bt also avoids data loss or service interrption cased by the hardware failres of online storage devices. 3. Remote Data Backp and Recovery Storage system 10GE GE In this soltion, the 10GE Ethernet switches are bilt pon the IP storage area (SAN). The IP standard platform hosts a variety of servers with bilt-in Ethernet cards. These servers comply with nified standards and operate nder the same management platform. The 10GE prodcts prevails and IP SANs that adopt 10GE Ethernet technologies increase bandwidth and speed p service access. The shared storage of sever farms in particlar, has high reqirements on performance. Driven by these changes, 10GE storage is bond to become the choice in the integrated storage of ftre data center severs. 2. Continos Data Protection Soltion Remote data backp lays a fondation for data disaster recovery. In the remote data backp and recovery soltion, strategic incremental replication is performed to key service data over the IP between the prodction center and the backp center. In case of nexpected disasters in the prodction center, the data can be rapidly recovered from the remote backp center. In remote data replication, the block-based incremental backp technology replicates only the incremental data since the previos replication. The backp data is then compressed throgh the data compression technology before being transmitted. This effectively redces the occpation of WAN resorces. V. Disaster Tolerance In this soltion, the continos data protection (CDP) technology is adopted. Data are effectively protected in the case of any change. Mltiple data copies at different times are saved. The single data copy problem in the traditional one data mirroring or backp mode is ths eradicated. For bsinesses that have high reqirements on service continity, CDP redces the time reqired for data recovery and garantees continos service operations. The near-line CDP soltion allows a storage system to rapidly recover the sond stats of data at a certain point throgh the markp of time points in the system. The online CDP Along with hge benefits, high data centralization also brings in high risks. How to handle and dissolve risks broght by data centralization, how to garantee data secrity in case of disasters, how to ensre service continity, and how to maintain corporate reptation are all problems to be confronted with. The constrction of a disaster tolerance system becomes an rgent task with the increasingly high data centralization. Data center disaster tolerance means activities and procedres designed to recover the falty or collapsed stats of varios application systems in a data center to the normal operation stats. For that prpose, a disaster tolerance center shold be constrcted to replace the main data center for service processing in case of disasters. 12

13 H3C Data Center Soltion A typical disaster tolerance system consists of basic infrastrctre, data backp system, backp processing system, commnications system, and disaster recovery schemes. When designing a disaster tolerance system, yo need to se qalitative disaster recovery capability indexes to measre the goal and level of disaster tolerance. centers can be independently bilt, shared, or leased for the prpose of disaster tolerance. In terms of disaster tolerance, the three centers at two locations model represents the best practice to maximize data protection and service continity in the case of severe regional disasters. Prodction center Local data backp center Remote data backp center Storage system Disaster occrrence Operation recovery System interrption Ethernet switch Ethernet switch Ethernet switch Time Aggregation switch Aggregation switch Aggregation switch Core switch Core switch Core switch Recovery time Aggregation switch Aggregation switch Aggregation switch T1 T2 Core roter Core roter Core roter Remote data backp center Last point of effective data stats Data loss phase Disaster occrrence Time Branches Prodction center Local data backp center Recovery point T0 T1 Recovery Time Object (RTO) refers to the time reqired by an information system to recover the operational stats from a disaster. RTO is sed to evalate the service recovery capability of a disaster tolerance system. VI. Management A data center spports service and office IT services of a bsiness. The sond management of the data center, considered as the heart of the bsiness, is of great importance. Recovery Point Object (RPO) indicates the maximm amont of data lost in a disaster on a service system. RPO is sed to evalate the data redndancy backp capability of a disaster tolerance system. By referring to the traditional FCAPS management model that consists of falt, configration, accont/directory, performance, and secrity managements, H3C incorporates the server/ device management, data storage management, ser management, and log aditing into the data center management RPO and RTO form qalitative disaster recovery objectives that in trn lead to different levels of disaster recovery. The following scheme. The core of H3C data center schemes is the Intelligent Management Center (imc). table shows the relations of disaster recovery capabilities and RTOs/RPOs in a certain indstry. As an important component in the integrated IToIP soltion, imc follows the open service-oriented architectre (SOA) design concept, implements falt alarms, configration management, ser management, topology management, and behavior aditing, and addresses existing problems in secrity, optimization, and operations. Device management The constrction of a data backp center takes data disaster tolerance as the core and focses on service continity to ensre safe prodction and operations. The constrction of data backp centers has three models: local backp center, remote backp center, and the three centers at two locations model. Data backp Unified all-rond management that covers topology, performance, falt, and configration is reqired for -wide servers and devices. H3C imc platform implements converged management on 13

14 H3C Data Center Soltion resorces, sers, and services, provides basic management of resorces, topology, failres, performance, sers, and system secrity. Based on the B/S architectre, the platform can be integrated with other service modles to manage all H3C datacom prodcts and the datacom devices of mainstream vendors sch as Cisco and 3Com throgh MIBs. performance monitoring, and data backp adjstments. Terminal access and ser management Secrity is a top priority in a data center. With the development of technologies, new secrity threats constantly emerge. Virses and worms plage the s with severer effect over wider areas. This leads to collapsed systems and paralyzed s, reslting in hge loss of sers. The secrity stats (mainly the anti-virs capability, patch level, and system secrity settings) of any terminal has a direct impact on the secrity of the entire. Thanks to its dependence on the SOA, the imc jointly coordinates ser terminals and services to perform terminal secrity check, ser athentication/aaa, dynamic access athorization, and ser behavior aditing. Resorce intelligence The imc spports the atomatic discovery of topologies, the nified topology view of all devices on a, and the rapid navigation between views throgh the tree view navigation. The servers are managed throgh the KVM system. As a trend and one of the ltimate objectives in the constantly evolving data centers, intelligent resorce management aims to effectively capitalize pon valable data center resorces for dynamic allocation and maximm otpt. Resorce intelligence is a continosly self-improvement process. With the emergence of new services and applications, the data center architectre always needs to adapt to new reqirements. The data center constrction constantly improves and perfects itself. Smmary The featres of H3C data center soltions are: High secrity, reliability, performance, mlti-services, scalability, heterogeneos convergence, and intelligence management Remote IP sers are connected to the remote monitoring server throgh TCP/IP connections for clock-arond remote access. This enables administrators to rapidly and effectively modify and store services or data and trobleshoot failres on servers. Unified data manager (UDM) soltion In addition to device management, the imc also provides nified management on all H3C storage and prodcts, covering all management processes after the hardware is deployed on a shared data backp. The management extends to the complete processes of atomatic discovery of and storage devices, configration on storage devices, alarm management on the data backp, shared ser management, shared service procedre management, atomatic deployment of shared services, data backp monitoring, As a carrier of core services, a data center is a systematic engineering project. The life cycles of analysis, design, constrction, and O&M shold be defined based on reqirements analysis and service characteristics. In this manner, the data center constrction realizes the objective of optimizing and integrating service procedres, improving operation efficiency, and enhancing competitiveness. Appendix 1 H3C Data Center Prodcts H3C data center soltions consist of five components: 14

15 H3C Data Center Soltion F1.1 Basic platform: The H3C data center connects office sers, compting resorces, and storage resorces throgh GE or 10GE Ethernet links. The architectral reliability (separation of the service and management, modlar design), reliability ( elements, links, and topology redndancy design), and device reliability (carrier-class devices, dal main control boards, and redndancy design of key parts) all contribte to a highly reliable platform. In addition, the good scalability and modlar design of prodcts flly meet the scalability reqirements of the data center architectre. WAN optimization devices are deployed to expand the WAN capacity, redce the response time of applications and decrease protocol interactions. In addition, the priorities of applications are identified and the applications are controlled to ensre the minimm or maximm bandwidth for key applications and control or block non-key (roge) applications. Related prodcts: H3C S12500 roting switch, H3C S9500 roting switch, H3C S7500E/S7500 roting switch, H3C S5600 Ethernet switch, H3C S5500 Ethernet switch, and SECPATH ASE application optimization F1.2 Network secrity: Based on the internal BPDU gard, PVLAN, binding of the qintple information, 802.1X integrated secrity featres, the H3C switches protects Layer 2 data. The firewalls protects data at the layer whereas the Intrsion Prevention System (IPS) provides deep data secrity protection at the application layer. Based on the management platform of mlti-service secrity access, the Comprehensive Access Management Server (CAMS) and H3C switches, roters, and VPN gateways can be deployed in the same ing to manage, athenticate, athorize, and charge the broadband, VPN, wireless, and IP telephony access of sbscribers. The SecCenter A1000 intelligence secrity management center can atomatically collect and analyze the mass secrity events and logs on the entire and then perform high aggregation storage and assimilation to the collected data. The device is compatible with devices of several vendors over a heterogeneos and monitors the secrity stats of an entire in real time. Meanwhile, it can atomatically generate convincing secrity stats and policy compliance aditing reports based on different reqirements. Related prodcts: H3C SecBalde I/II, IPS, ACG series, H3C SecPath series firewalls or VPN prodcts, SecCenter, and H3C Endpoint Admission Defense (EAD) F1.3 Data storage: stores and back p centralized data. As a pioneer in the IP storage, H3C ses the all IP architectre to combine the storage with the front-end, bilding the homogeneos IT infrastrctre. This architectre featres flexibility, openness, sharing, high performance, and low cost. Related prodcts: H3C Neocean IV5000 series prodcts F1.4 Data management: implements the virtalization management, resorce debgging, and operation management of data. H3C data center soltion allows the harmonios existence of IP storage and FC storage prodcts of different vendors. This allocates resorces for nified sage and eradicates the heterogeneity problem. In addition, the H3C data center soltion has good scalability, redces maintenance complexity, and lowers costs. Related prodcts: H3C Neocean IV5100 virtalization data management prodct, H3C Neocean IV5200virtalization data management prodct, and H3C DM data management platform F1.5 Data backp and recovery: The objective of bilding a remote or local data backp center is to avoid the nrecoverable loss of original data de to small probability events sch as disasters. In this manner, important service data are protected in case of disasters and can be recovered within the set time to ensre service continity. <The rapid data recovery capability frther enhances the corporate reptation, boosts the confidence of cstomers and potential cstomers, and gains an edge over competitors. Related prodcts: H3C S9500 roting switch, H3C SR8800 service roter, H3C Neocean IX5000 IP SAN storage prodcts, H3C Neocean IX1000 IP SAN storage prodcts, H3C Neocean IV5100 virtal data management prodcts, H3C Neocean IV5200 virtal data management prodcts, and H3C SecPath series firewalls/vpn prodcts 15

16 H3C Data Center Soltion Appendix 2 List of Key Users Shanghai data center of the Agricltral Bank of China Shanghai disaster recovery center of the Bank of China Server farm data center at the China Constrction Bank headqarter Data center at Shandong Rral Credit Cooperatives Zibo Commercial Bank Local backp center at Hishang Bank Data center of Anbang Property & Casalty Insrance Company Ltd. Baid data center Soh data center NetEase data center IDC at Shanghai Zhangjiang High-Tech Park Development Co., Ltd. Sothern data center of the Chengd mnicipal government E-government data center of Nanshan District, Shenzhen Data center at Szho Branch of Haxia Bank Data center at the Ministry of Personnel of the PRC Information sharing system at the Ministry of Science and Technology of PRC The United front Work Department of CCCPC State Administration for Indstry & Commerce of the PRC 16

Chapter 1. LAN Design

Chapter 1. LAN Design Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani

More information

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

Pgrading To Windows XP 4.0 Domain Controllers and Services

Pgrading To Windows XP 4.0 Domain Controllers and Services C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Planning and Implementing An Optimized Private Cloud

Planning and Implementing An Optimized Private Cloud W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod

More information

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02 EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying

More information

The bintec HotSpot Solution. Convenient internet access anywhere

The bintec HotSpot Solution. Convenient internet access anywhere The bintec HotSpot Soltion Convenient internet access anywhere Convenient internet access for all kinds of spaces Today s internet sers are freqently on the go. They expect to have internet access on their

More information

Isilon OneFS. Version 7.1. Backup and recovery guide

Isilon OneFS. Version 7.1. Backup and recovery guide Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate

More information

f.airnet DECT over IP System

f.airnet DECT over IP System The modlar IP commnication system for voice and messaging with the greatest mobility: flexible, easy to maintain, expandable. Fnkwerk Secrity Commnications For s, efficient commnication is vital. New:

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

MVM-BVRM Video Recording Manager v2.22

MVM-BVRM Video Recording Manager v2.22 Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

VRM Video Recording Manager v3.0

VRM Video Recording Manager v3.0 Video VRM Video Recording Manager v3.0 VRM Video Recording Manager v3.0 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

VRM Video Recording Manager

VRM Video Recording Manager Video VRM Video Recording Manager VRM Video Recording Manager www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with all Bosch

More information

Member of the NKT Group. We connect renewable energy sources. Onshore, offshore and photovoltaic

Member of the NKT Group. We connect renewable energy sources. Onshore, offshore and photovoltaic Member of the NKT Grop We connect renewable energy sorces Onshore, offshore and photovoltaic Completing the pictre www.nktcables.com We connect renewable energy sorces These days, renewable and clean energies

More information

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished

More information

BIS - Overview and basic package V4.0

BIS - Overview and basic package V4.0 Engineered Soltions BIS - Overview and basic package V4.0 BIS - Overview and basic package V4.0 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information

BIS - Overview and basic package V2.5

BIS - Overview and basic package V2.5 Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information

Effective governance to support medical revalidation

Effective governance to support medical revalidation Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

EMC Storage Analytics

EMC Storage Analytics EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in

More information

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists. Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so

More information

The Intelligent Choice for Disability Income Protection

The Intelligent Choice for Disability Income Protection The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying

More information

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg

More information

EMC Data Domain Operating System

EMC Data Domain Operating System EMC Data Domain Operating System Version 5.4 Administration Gide 302-000-072 REV. 06 Copyright 2009-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes the

More information

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers Version 9.2.2 Spport Matrix 302-000-357 REV 02 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes

More information

Bosch Security Training Academy Training Course Catalogue 2015. uk.boschsecurity.com

Bosch Security Training Academy Training Course Catalogue 2015. uk.boschsecurity.com Bosch Secrity Training Academy Training Corse Cataloge 2015 k.boschsecrity.com 2 Bosch Secrity Training Academy Training Corses 2015 Bosch Secrity Training Academy Training Corses 2015 3 Contents Enqiries

More information

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01 EMC NetWorker Version 8.2 Performance Optimization Planning Gide 302-000-697 REV 01 Copyright 2000-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Janary, 2015 EMC believes the information

More information

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes 5 High-Impact Use Cases of Big Analytics for Optimizing Field Service Processes Improving Field Service Efficiency and Maximizing Eqipment Uptime with Big Analytics and Machine Learning Field Service Profitability

More information

EMC PowerPath Virtual Appliance

EMC PowerPath Virtual Appliance EMC PowerPath Virtal Appliance Version 1.2 Administration Gide P/N 302-000-475 REV 01 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished October, 2013 EMC believes the information

More information

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements... PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring

More information

Galvin s All Things Enterprise

Galvin s All Things Enterprise Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,

More information

Purposefully Engineered High-Performing Income Protection

Purposefully Engineered High-Performing Income Protection The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits

More information

Upgrading Windows 2000 Domains to Windows Server 2003 Domains

Upgrading Windows 2000 Domains to Windows Server 2003 Domains C H A P T E R 9 Upgrading Windows 2000 Domains to Windows Server 2003 Domains Upgrading yor network operating system from Microsoft Windows 2000 to Windows Server 2003 reqires minimal network configration

More information

Apache Hadoop. The Scalability Update. Source of Innovation

Apache Hadoop. The Scalability Update. Source of Innovation FILE SYSTEMS Apache Hadoop The Scalability Update KONSTANTIN V. SHVACHKO Konstantin V. Shvachko is a veteran Hadoop developer. He is a principal Hadoop architect at ebay. Konstantin specializes in efficient

More information

Kentucky Deferred Compensation (KDC) Program Summary

Kentucky Deferred Compensation (KDC) Program Summary Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth

More information

NAPA TRAINING PROGRAMS FOR:

NAPA TRAINING PROGRAMS FOR: NAPA TRAINING PROGRAMS FOR: Employees Otside Sales Store Managers Store Owners See NEW ecatalog Inside O V E R V I E W 2010_StoreTrainingBrochre_SinglePg.indd 1 5/25/10 12:39:32 PM Welcome 2010 Store Training

More information

DSA E-Series iscsi Disk Arrays

DSA E-Series iscsi Disk Arrays Video DSA E-Series Disk Arrays DSA E-Series Disk Arrays www.boschsecrity.com Scale-ot network storage soltion: controller nit with 12 internal HDDs with p to 96 HDDs via stateof-the-art SAS interface-connected

More information

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris.

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris. Motorola Reinvents its Spplier Negotiation Process Using Emptoris and Saves $600 Million An Emptoris Case Stdy Emptoris, Inc. www.emptoris.com VIII-03/3/05 Exective Smmary With the disastros telecommnication

More information

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7 Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices

More information

A guide to safety recalls in the used vehicle industry GUIDE

A guide to safety recalls in the used vehicle industry GUIDE A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.

More information

BankWorld POS. Today s solution for tomorrow s self-service bank. Your challenges have a BankWorld solution

BankWorld POS. Today s solution for tomorrow s self-service bank. Your challenges have a BankWorld solution BankWorld POS Today s soltion for tomorrow s self-service bank The adoption rate of POS terminals worldwide is on the rise as point-of-sale payments gain favor with today s cstomers who prefer to carry

More information

EMC PowerPath/VE Installation and Administration Guide

EMC PowerPath/VE Installation and Administration Guide EMC PowerPath/VE Installation and Administration Gide Version 5.9 and Minor Releases for VMware vsphere P/N 302-000-236 REV 03 Copyright 2009-2014. All rights reserved. Pblished in USA. EMC believes the

More information

The Intelligent Choice for Basic Disability Income Protection

The Intelligent Choice for Basic Disability Income Protection The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering

More information

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct

More information

B5512 Control Panel. Intrusion Alarm Systems B5512 Control Panel. www.boschsecurity.com

B5512 Control Panel. Intrusion Alarm Systems B5512 Control Panel. www.boschsecurity.com Intrsion Alarm Systems B5512 Control Panel B5512 Control Panel www.boschsecrity.com Spports p to 48 points sing a combination of hardwired or wireless points for installation flexibility and p to 4 areas

More information

STI Has All The Pieces Hardware Software Support

STI Has All The Pieces Hardware Software Support STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,

More information

7 Help Desk Tools. Key Findings. The Automated Help Desk

7 Help Desk Tools. Key Findings. The Automated Help Desk 7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part

More information

Accelerated Implementation Model

Accelerated Implementation Model ABOUT US SALES CLOUD SOLUTION CLIENT SUCCESS STORIES Accelerated Implementation Model Sales Clod implementation Fastest ROI - delivered in as few as 60-90 days Three implementation plan options Terillim

More information

Research on Staff Explicitation in Organizational Knowledge Management Based on Fuzzy Set Similarity to Ideal Solution

Research on Staff Explicitation in Organizational Knowledge Management Based on Fuzzy Set Similarity to Ideal Solution Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Jornal, 015, 9, 139-144 139 Open Access Research on Staff Explicitation in Organizational Knowledge Management Based

More information

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing

More information

DIVAR IP 7000 2U. Video DIVAR IP 7000 2U. www.boschsecurity.com

DIVAR IP 7000 2U. Video DIVAR IP 7000 2U. www.boschsecurity.com Video DIVAR IP 7000 2U DIVAR IP 7000 2U www.boschsecrity.com RAID-5 protected, all-in-one, flly featred video management soltion for p to 128 channels Ot-of-the-box IP video management soltion with p to

More information

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent

More information

GCC, Middle East, and Africa

GCC, Middle East, and Africa GCC, Middle East, and Africa Global Presence Serving the MEA region for 30 years Tangent are a firm of Specialist International Recriters. We concentrate on Exective, Mid Tier, and Technical recritment

More information

8 Service Level Agreements

8 Service Level Agreements 8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

Owning A business Step-By-Step Guide to Financial Success

Owning A business Step-By-Step Guide to Financial Success Owning A bsiness Step-By-Step Gide to Financial Sccess CONTACT US For more information abot any of the services in this brochre, call 1-888-845-1850, visit or website at bsiness.mac.com or stop by the

More information

BankWorld POS. Today s solution for tomorrow s self-service bank. Your challenges have a BankWorld solution

BankWorld POS. Today s solution for tomorrow s self-service bank. Your challenges have a BankWorld solution Today s soltion for tomorrow s self-service bank The adoption rate of POS terminals worldwide is on the rise as card payments gain favor over cash transactions. As the POS channel becomes more poplar,

More information

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012

More information

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview Faced with increasingly serious network threats and dramatically increased network traffic, carriers' backbone networks,

More information

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds VIRTUS HERZFELD FUND Herzfeld s Otlook: Seasonal Factors Provide Opportnities in Closed-End Fnds When it comes to investing in closed-end fnds, a comprehensive nderstanding of the inefficiencies of the

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

iet ITSM: Comprehensive Solution for Continual Service Improvement

iet ITSM: Comprehensive Solution for Continual Service Improvement D ATA S H E E T iet ITSM: I T I L V 3 I n n o v at i v e U s e o f B e s t P ra c t i c e s ITIL v3 is the crrent version of the IT Infrastrctre Library. The focs of ITIL v3 is on the alignment of IT Services

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

Isilon OneFS. Version 7.1. Web Administration Guide

Isilon OneFS. Version 7.1. Web Administration Guide Isilon OneFS Version 7.1 Web Administration Gide Copyright 2001-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate

More information

Facilities. Car Parking and Permit Allocation Policy

Facilities. Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application

More information

DSA E-Series 4TB. Video DSA E-Series 4TB. www.boschsecurity.com

DSA E-Series 4TB. Video DSA E-Series 4TB. www.boschsecurity.com Video DSA E-Series 4TB DSA E-Series 4TB www.boschsecrity.com Scale-ot network storage soltion: controller nit with 12 internal HDDs with p to 192 HDDs via state-of-the-art SAS interface-connected expansion

More information

Building Trust How Banks are Attracting and Retaining Business Clients With Institutional Money Fund Portals

Building Trust How Banks are Attracting and Retaining Business Clients With Institutional Money Fund Portals Bilding Trst How Banks are Attracting and Retaining Bsiness Clients With Instittional Money Fnd Portals By George Hagerman, Fonder and CEO, CacheMatrix Holdings, LLC C ompetitive pressres are driving innovation

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

EMC Storage Resource Management Suite

EMC Storage Resource Management Suite EMC Storage Resorce Management Site Version 3.0.2.0 Installation and Configration Gide PN 302-000-859 REV 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished April, 2014

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2

More information

Curriculum development

Curriculum development DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.

More information

CONTACT US. The Financial ABCs for Raising a Family

CONTACT US. The Financial ABCs for Raising a Family The Financial ABCs for Raising a Family CONTACT US For more information abot any of the in this brochre, call 1-800-748-4302, visit or at www.mac.com or stop by the branch nearest yo. Federally insred

More information

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader

More information

DSA E-Series 3TB. Video DSA E-Series 3TB. www.boschsecurity.com

DSA E-Series 3TB. Video DSA E-Series 3TB. www.boschsecurity.com Video DSA E-Series 3TB DSA E-Series 3TB www.boschsecrity.com Scale-ot network storage soltion: controller nit with 12 internal HDDs with p to 192 HDDs via state-of-the-art SAS interface-connected expansion

More information

SME Business. Solutions

SME Business. Solutions SME Bsiness Soltions For more information, please contact SME Banking: Bahrain World Trade Center, East Tower 15th Floor Tel: 17 13 3383 Fax: 17 13 1043 E-mail: sme@bmi.com.bh ABOUT BMI BANK We re a yong,

More information

Flexible, Low-overhead Event Logging to Support Resource Scheduling

Flexible, Low-overhead Event Logging to Support Resource Scheduling Flexible, Low-overhead Event Logging to Spport Resorce Schedling Jan Stoess University of Karlsrhe Germany stoess@ira.ka.de Volkmar Uhlig IBM T.J. Watson Research Center New York vhlig@s.ibm.com Abstract

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

Anatomy of SIP Attacks

Anatomy of SIP Attacks Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande

More information

Breakthrough Performance in Mobile Phone Testing Fast and Accurate Measurements Full Flexibility with Powerful Control

Breakthrough Performance in Mobile Phone Testing Fast and Accurate Measurements Full Flexibility with Powerful Control Breakthrogh Performance in Mobile Phone Testing Fast and Accrate Measrements Fll Flexibility with Powerfl Control The New Platform for Testing Digital Commnications Breakthroghs in speed of test: Transmitter

More information

www.macu.com LH-2011 Products for Life

www.macu.com LH-2011 Products for Life www.mac.com LH-2011 Prodcts for Life 2 6 8 10 12 13 prchase Qick 14 insrance There s nothing like the feeling of bying yor own home. Yo finally have yor own space, and yor money is going toward something

More information

A taxonomy of knowledge management software tools: origins and applications

A taxonomy of knowledge management software tools: origins and applications Evalation and Program Planning 25 2002) 183±190 www.elsevier.com/locate/evalprogplan A taxonomy of knowledge management software tools: origins and applications Peter Tyndale* Kingston University Bsiness

More information

Analog Telephones. User Guide. BusinessPhone Communication Platform

Analog Telephones. User Guide. BusinessPhone Communication Platform Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make

More information

Appraisal Firewall 1.0. Appraisal Revolution. powered by Appraisal Firewall DATA FACTS WHITE PAPER SERIES

Appraisal Firewall 1.0. Appraisal Revolution. powered by Appraisal Firewall DATA FACTS WHITE PAPER SERIES Appraisal Firewall 1.0 Appraisal Revoltion powered by Appraisal Firewall DATA FACTS WHITE PAPER SERIES The Technology Standard Appraisal Revoltion, powered by Appraisal Firewall technology maximizes yor

More information

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Volme: 3 Isse: 8 59-594 Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Dr. M. Naga Ratna Dept. of Compter Science JNTUH College of Engineering Email: mratnajnt@jnth.ac.in

More information

! Virtual Machine Monitors (VMMs) are everywhere. ! An old idea, actually: developed by IBM in 60s and 70s. ! Today. ! Resource utilization

! Virtual Machine Monitors (VMMs) are everywhere. ! An old idea, actually: developed by IBM in 60s and 70s. ! Today. ! Resource utilization Lectre 17: Virtal Machines HW 4 De NOW CSE 120: Principles of Operating Systems Alex C. Snoeren Virtal Machine Monitors! Virtal Machine Monitors (VMMs) are everywhere Indstry commitment» Software: VMware,

More information

Mutualcast: An Efficient Mechanism for One-To-Many Content Distribution ABSTRACT Categories and Subject Descriptors General Terms Keywords

Mutualcast: An Efficient Mechanism for One-To-Many Content Distribution ABSTRACT Categories and Subject Descriptors General Terms Keywords Mtalcast: An Efficient Mechanism for One-To-Many Content Distribtion Jin Li, Philip A. Cho and Cha Zhang, Microsoft Research, Commnication and Collaboration Systems Grop One Microsoft Way, Bld. 3, Redmond,

More information