KAUST Repository. Cloud Computing in KAUST Library: Beyond Remote Hosting. Global Information and Management Symposium (GIAMS)

Size: px
Start display at page:

Download "KAUST Repository. Cloud Computing in KAUST Library: Beyond Remote Hosting. Global Information and Management Symposium (GIAMS)"

Transcription

1 KAUST Repository Cloud Computing in KAUST Library: Beyond Remote Hosting Item type Authors Journal Conference Paper Yu, Yi Global Information and Management Symposium (GIAMS) Downloaded 29-Aug :51:34 Item License Link to item

2 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 1 Cloud Computing in KAUST Library: Beyond Remote Hosting Yi Yu King Abdullah University of Science and Technology, Saudi Arabia Author Note Yi Yu, Library of King Abdullah University of Science and Technology, Saudi Arabia Yi Yu is a Systems Librarian of the library of King Abdullah University of Science and Technology in Thuwal, Saudi Arabia. This paper is presented for the international conference: Global Information and Management Symposium (GIAMS) on December 5-7th, 2013 in Taipei. Contact:

3 Cloud Computing in KAUST Library: Beyond Remote Hosting Abstract Enterprise computing is the key strategic approach for KAUST to build its modern IT landscape. In such a strategic direction and technical environment, the library tries to establish library technology by catching new trends which help to make the library more efficient and sufficient. This paper focuses on the cloud computing development in the KAUST library, by using real world scenarios and first-hand experiences to describe what cloud computing means for KASUT library. It addresses the difficulties that were met by the library during the implementation process, how cloud computing affects the functional performance and work procedure of the library, how it impacts the style and modal of the library s technical service and systems administration, how it changes the relationships and cooperation among the involved players (the library, campus IT and vendors), and what the benefits and disadvantages are. The story of cloud computing at KAUST will share the knowledge and lessons that the KAUST library learnt during its development, and will also point out the future direction of cloud computing at KAUST.

4 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 3 Introduction King Abdullah University of Science and Technology (KAUST) is a recent science university which officially opened in Saudi Arabia in September of Named after the nation s leader who had a vision for a new House of Wisdom that would become one of the world's great institutions of research, the KAUST university removed its scaffolding and cranes to reveal an ultra-modern campus on the shore of the Red Sea on the site of an ancient fishing village called Thuwal beside the thriving metropolitan city Jeddah. Just like its parent university, KAUST Library is a brand new library which was built from scratch. During 4 years of development, KAUST library successfully grew into a medium sized academic and research library which includes 25 staff members, over 10,000 print collections and about 50 subscriptions of electronic resources covering the major science databases and e-journals. Besides its presentation of a new generation library by its spacious and artistic modern architecture, the library is also equipped with the most advanced facilities and library systems. As enterprise computing is the key strategic approach for KAUST, it naturally becomes a direction towards which to build the KAUST library s modern IT landscape. In such a strategic and technical environment, KAUST library tries to establish library systems by utilizing new trends and maximizing the benefits of new technology. Going towards cloud computing is one of these efforts and achievements. What is cloud computing and why go to cloud? The term cloud computing is more like a metaphor instead of an accurate and literal definition. As the word cloud" conventionally refers to "the Internet", the phrase cloud computing presents "a type of Internet-based computing" where different services -- such as servers, storage and applications -- are delivered to an organization's computers and devices via the Internet. i One of the reason that cloud computing has become so popular can be attributed to its ability to supply host services, which refers to application services that run client server software from a remote location. ii The application of cloud computing at the KAUST library is focused on this

5 Cloud Computing in KAUST Library: Beyond Remote Hosting aspect. However, the experiences and lessons that we have achieved does not only apply to the topic of remote hosting service. From the very beginning, as one of the major server applications in the campus, KAUST library system was hosted locally in KAUST IT Data Center. When cloud computing became a new approach for campus IT infrastructure, we were thinking of the possibility and feasibility of using cloud computing for library systems. After discussions, we decided that since internet connections are no longer a barrier, there are many benefits for the library to apply cloud computing in our surroundings. First of all, by switching to remote servers hosted by our vendor, we are able to have more dedicated and professional technical support for the library. Secondly, full package services such as upgrading, database maintenance and backup will allow the library s technological staff to do other strategic activities rather than routine operational and maintenance tasks. The benefits also include reducing mistakes that arises from misunderstandings between venders and campus IT, increased speed and efficiency for troubleshooting and problem solving, among many other advantages. In addition, due to special security concerns in this unique university, putting all of the ILS application in the cloud will be beneficial for the security of the entire campus network. How to implement? The first step of implementation was the migration of all servers to the vendor hosted location. As there are many tasks to be done -- organizing the migration schedule, changing DNS entries, opening ports for the remote host, updating IP addresses for electronic resources etc. -- the process required the involvement and corporation of many units among the library as well as the campus IT and the host vendor. In order to have a successfully migration, many people from different departments needed to work together. Even though we employed extensive communication and coordination in preparation, as well as tried to predict any potential problems and to anticipate solutions, there were still unexpected issues and situations that occurred during the migration process. For example, the window of time for the server shutdown was selected based on the KAUST IT CIO s suggestion and was agreed to by the three major players involved in the process the vendor, the campus IT and the library. However, it incurred many complaints

6 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 5 from the KAUST reference department because they had scheduled a tour for new employees during this time, and had arranged for a demo of the library s online catalog during that day. Another unforeseen incident during the implementation process was the special security procedures employed by the KAUST campus network. Many ports in the KAUST campus network are closed unless there had been a request to open it through certain procedures, and this is a situation that the host vendor has never experienced before, which resulted in the library s online catalog to be unable to be accessed even though there were no connection problems between the server and the client applications. This caused a big panic in the library. Once we realized what the issue was, the system librarian coordinated between the KAUST IT and the host vendor to resolve this problem. Since updating IP addresses of electronic resources was not included in the migration to do list from the vendor, we did not anticipate informing the e- publishers to change the IP address accordingly. After the implementation, none of the e- resources could be accessed. The result was that the migration was a total failure, and we had to roll-back to the old server. When everything seemed to be proceeding well for the second attempt of server migration, we ran into a very strange situation with the self-check machines. Normally, we can update the new server IP in the self-check machine through the admin interface. However, the admin interface could not be displayed. After wrestling with this issue for a couple days, we found that the issue was caused by the installation of a new anti-virus software which blocked the display. This is a very unexpected and strange coincidence since we initially thought that it was due to the server migration that caused the issues with the self-check machine, but in the end realized that it is due to a completely unrelated situation. Even when all the connections in the public interface looked normal, there were still many emergent complaints pouring into the system librarian: many staff members of the library were not able to establish any client-server connections. In the end, we found out that this was actually caused by a space that was accidentally left in the new IP address when they were typing it into the configuration file. Such panic and chaos appeared one after another during the initial days after the implementation process. Failing miserably in a very easy task is not a cliché. In this situation, taking great care in the preparation, sincere corporation and coordination, and detailed communication are the key factors for making the implementation process smooth and easy. Certainly, having solid technical knowledge is also a great help in getting things done.

7 Cloud Computing in KAUST Library: Beyond Remote Hosting What are the problems in the cloud? After our integrated library systems was moved to the remote datacenter hosted by the system vendor, the library staff members found that their client application would automatically disconnect if it was left idling for even a few minutes. This disconnection issue had never occurred when the servers were hosted locally by the KAUST IT. The staff members routinely use many different modules of the application to perform tasks such as cataloging, circulation and acquisition, and this issue was very annoying for the staff since they would need to constantly restart the module even if it was only inactive for a couple of minutes. Figure 1 - disconnection message from client application of library system In order to debug this issue, the KAUST IT network team installed a network packet analyzer called Wireshark on several workstations. The analyzer was used to closely monitor and record the pattern of disconnections, to help us understand the transaction behavior, and also to capture

8 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 7 the packet data for identification of the cause on the packet and protocol level. After the issue was investigated based on the captured data, the inter-network situation seemed to become clearer: The disconnection occurs intermittently and in a random pattern; The Client-Server communication uses a keep-alive mechanism, on ports other than the ports used by the SCCP protocol; Protocol inspection for the SCCP protocol was required by the application vendor, but was turned off on the firewall by KAUST IT; Packet captures on both the server side (Internet) and the client side (Inside) had shown TCP RST received on both sides. This information acquired shows that a device in between is sending RST frames in both directions to terminate the session after a certain timeout period. IT Security increased the TCP session idle period to 8 hours (60 minutes is the default). However, the disconnection is happening frequently and the sessions would end well before 8 hours, so this cannot be the cause iii of the problem. How to resolve? In order to figure out which part of the chain is causing the disconnection, KAUST IT examined potential nodes by identifying internal and external traffic paths.

9 Cloud Computing in KAUST Library: Beyond Remote Hosting Figure 2 - traffic path, inside is marked green while outside is marked red. The nodes to be tested in the outside path are: International Gateway (IGW) KAUST MPLS Coreiv The nodes to be tested in the inside path are: Firewall Anagranv F5 Load Balancervi

10 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 9 An exclusive method was used to investigate this issue. The results showed that all the test machines placed right before IGW, the Virtual routing and forwarding (VRF) vii, and the firewall were not experiencing the disconnections, but the reference machine on the Data VLAN was experiencing it. Thus it was reasonable to conclude that the disconnection was being caused by the F5 load balancer. After adjusting the settings in F5, the disconnection problem has been resolved. Lessons and next step There are several points that are worth noting about our implementation of cloud computing. First, and the most crucial step, is to make a correct decision about whether or not to switch to cloud computing. As there are many debates about the pros and cons of cloud computing, it is necessary to investigate and analyze the whether there is a need in reality before making the decision. Considering that there are many units from different departments and organization who will be involved in the process, it is also extremely important to obtain full understanding and support from all related departments and personnel. During the process of implementation, each step and every detail should be considered thoroughly. Any neglect or carelessness can lead to big disasters just like what we experienced, resulting in a complete rollback to the old server. Some of the problems were not avoidable as it was a new experience for us and we could not anticipate all the potential issues. As everything is in the cloud now, network and security issues have become a prominent topic, as things may have become more complicated and invisible. This does not only bring new challenges to the KAUST IT, but also raised new questions to the server application -- such as how the system has adapted to the new network environment. For example, during the investigation period for the disconnection problem, the server/host vendor and KAUST IT engaged in long arguments about who should take responsibility for the disconnection. Neither party thought that the problem should be their responsibility. Even though the final result indicated that the problem was caused by the configuration of F5 Load Balancer, the KAUST IT still believes that the issue lies within the applications for not being updated to adapt to a remote hosting environment, because this problem did not appear with other remotely hosted applications running on the same F5 configurations. The process of implementing cloud computing in the KAUST library has brought

11 Cloud Computing in KAUST Library: Beyond Remote Hosting many new challenges to be tackled because this is a new experience for everyone involved the KAUST IT, the system librarian, the application vendor and every component had to become adapted to the new network environment. As cloud computing is a new practice for the hosting/application vendor as well as the KAUST library, many things will have to change according to the new situation. There are still a lot of unclear issues and gray areas. We need to review all of the documents and protocols including contracts, agreements, emergency procedures, etc. We will need to discuss with the suppliers, vendors and KAUST IT regarding how to revise and complete the documents based on the new technical environment. For the systems librarian, cloud computing brings with it a new and unique set of tasks and responsibilities. Instead of only focusing on the functionalities and performance of the library system, the systems librarian will also need to take care of the whole chain of the system which spans across the border of both the internal and external networks. Thus, the systems librarian needs to have a broader vision regarding the organization and the technology, a better understand about the breadth of different technologies and platforms, to have the capability to think outside the box, and to also learn the language of business. Knowledge about networks and network security is also an important and prominent area for the system librarian in the cloud computing era. Conclusion The KAUST Library decided to move its integrated library systems to a remote host in following with the cloud computing approach adopted by KAUST IT. The process of server migration to the remote host was a major undertaking. Careful preparation, full cooperation, and smooth communication are key attributes for the success of migration. During the initial stages of working with cloud computing after server migration, we encountered various difficulties and problems including client-server disconnections. We used the exclusive method to investigate session disconnection issues and found that the setting of the F5 Load Balancer was the cause. We will continue to work with KAUST IT and the application vendor and the host supplier to improve the service and management of the KAUST library systems. The library technical staff will continue to acquire new knowledge both in technology and business in order to catch new trends of computing service and to continuously improve the library.

12 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 1 1 Reference i Webopedia. N.p., n.d. Web. 13 Nov <http://www.webopedia.com/term/c/cloud_computing.html>. ii "Cloud computing." Wikipedia. Wikimedia Foundation, 18 Nov Web. 18 Nov <http://en.wikipedia.org/wiki/cloud_computing>. iii Report of Millennium Problem, KAUST IT, Aug iv "Multiprotocol Label Switching." Wikipedia. Wikimedia Foundation, 18 Nov Web. 19 Nov <http://en.wikipedia.org/wiki/ Multiprotocol_Label_Switching v "Anagran." World's Largest Professional Network. N.p., n.d. Web. 19 Nov <http://www.linkedin.com/company/anagran>. vi "Load Balancer." Home. N.p., n.d. Web. 19 Nov <http://www.f5.com/glossary/load-balancer/>. vii "Virtual Routing and Forwarding." Wikipedia. Wikimedia Foundation, 17 Nov Web. 19 Nov <

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

How to Configure an Initial Installation of the VMware ESXi Hypervisor

How to Configure an Initial Installation of the VMware ESXi Hypervisor How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.

APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151. APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE TITLE O*NET-SOC CODE RAPIDS CODE Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.00 111HY Network and Computer

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

ON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed:

ON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed: ON HOLD ANNOUNCER The is a high quality digital on-hold announcer. It is designed to be attached to a 100BASE-T Ethernet network to receive audio production updates via the Internet. These instructions

More information

WAN Migration Techniques

WAN Migration Techniques Jan 2014, HAPPIEST MINDS TECHNOLOGIES WAN Migration Techniques Lalit Kumar SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. 2 Copyright Information This document is exclusive property

More information

"Charting the Course to Your Success!" Citrix NetScaler 11 Essentials and Networking CNS 205 Course Summary

Charting the Course to Your Success! Citrix NetScaler 11 Essentials and Networking CNS 205 Course Summary Course Summary Description The objective of the Citrix NetScaler 11 Essentials and Networking course is to provide the foundational concepts and skills necessary to implement, configure, secure, monitor,

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Virtual Private Cloud-as-a-Service: Extend Enterprise Security Policies to Public Clouds

Virtual Private Cloud-as-a-Service: Extend Enterprise Security Policies to Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information

How to Guide: StorageCraft Cloud Services VPN

How to Guide: StorageCraft Cloud Services VPN How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Citrix NetScaler 10 Essentials and Networking

Citrix NetScaler 10 Essentials and Networking Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced

More information

State Government Improves Delivery of Services to Agencies

State Government Improves Delivery of Services to Agencies Customer Case Study State Government Improves Delivery of Services to Agencies The State of Oregon has undertaken a major consolidation of its information infrastructure using Cisco Integrated Services

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions

CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,

More information

Enhanced Enterprise SIP Communication Solutions

Enhanced Enterprise SIP Communication Solutions Enhanced Enterprise SIP Communication Solutions with Avaya Aura and Allstream SIP Trunking An Allstream White Paper 1 Table Of Contents Beyond VoIP 1 SIP Trunking delivers even more benefits 1 Choosing

More information

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

A system is a set of integrated components interacting with each other to serve a common purpose.

A system is a set of integrated components interacting with each other to serve a common purpose. SYSTEM DEVELOPMENT AND THE WATERFALL MODEL What is a System? (Ch. 18) A system is a set of integrated components interacting with each other to serve a common purpose. A computer-based system is a system

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud

Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud Olga Aparicio & Mun-Wai Hon Ground Systems Architecture Workshop

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

Print Audit Facilities Manager Technical Overview

Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly. This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.

Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation. Installing and Configuring Windows Server 2008 Tom Brett Module Overview Planning Windows Server 2008 Installations Performing a Windows Server 2008 Installation Configuring Windows Server 2008 Following

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

SSL VPN A look at UCD through the tunnel

SSL VPN A look at UCD through the tunnel SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CNS-205 Citrix NetScaler 10.5 Essentials and Networking CNS-205 Citrix NetScaler 10.5 Essentials and Networking The objective of the Citrix NetScaler 10.5 Essentials and Networking course is to provide the foundational concepts and advanced skills necessary

More information

Support Services Department

Support Services Department Support Services Department SUBJECT: Consideration of a Resolution and a recommendation authorizing execution of a contract amendment with Prescient Solutions, of Schaumburg, IL for staffing in the total

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Invest in your business with Ubuntu Advantage.

Invest in your business with Ubuntu Advantage. Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape

More information

Multi-protocol Label Switching

Multi-protocol Label Switching An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is

More information

MULTIPOINT VIDEO CALLING

MULTIPOINT VIDEO CALLING 1 A Publication of 2 VIDEO CONFERENCING MADE SIMPLE. TELEMERGE S ALL-IN-ONE VIDEO COLLABORATION Everything you need to enable adoption, right here. Request A Demo Learn More THE FOUR PILLARS Telemerge

More information

WHITE PAPER. A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels. www.earthlink.com

WHITE PAPER. A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels. www.earthlink.com WHITE PAPER A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels www.earthlink.com 1 Our job in IT is to provide technology frameworks and an operating model to facilitate but

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF

More information

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives: Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE

PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE RELEASE 7 VOICENT AGENTDIALER TM TABLE OF CONTENT I. Overview II. Install and Setup Server III. Test AgentDialer on the Server IV. Use a better headset V.

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Poster Companion Reference: Hyper-V Networking

Poster Companion Reference: Hyper-V Networking Poster Companion Reference: Hyper-V Networking Load Balancing and Failover Single Root I/O Virtualization Hyper-V Virtual Switch Quality of Service Bandwidth Management Copyright information This document

More information

Benefits of virtualizing your network

Benefits of virtualizing your network While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Aqua Connect Load Balancer User Manual (Mac)

Aqua Connect Load Balancer User Manual (Mac) Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...

More information

Everything You Need To Know About Cloud Computing

Everything You Need To Know About Cloud Computing Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information

More information

IPv6 Preparation and Deployment in Datacenter Infrastructure A Practical Approach

IPv6 Preparation and Deployment in Datacenter Infrastructure A Practical Approach Paper IPv6 Preparation and Deployment in Datacenter Infrastructure A Practical Approach Marco van der Pal Generic Services Network Infrastructure Services, Capgemini Netherlands B.V., Utrecht, The Netherlands

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco Nexus 1000V Switch for Microsoft Hyper-V Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.

More information

RemoteApp Publishing on AWS

RemoteApp Publishing on AWS RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...

More information

Microsoft Office Communications Server 2007 R2

Microsoft Office Communications Server 2007 R2 Microsoft Office Communications Server 2007 R2 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: Sept. 2009 For the most up-to-date version of the Scale to a Load Balanced

More information

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam 1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives

More information

CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration

CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and advanced skills necessary

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

LifeCyclePlus Version 1

LifeCyclePlus Version 1 LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.

More information

White Paper ClearSCADA Architecture

White Paper ClearSCADA Architecture White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

ICTTEN8194A Investigate the application of cloud networks in telecommunications switching

ICTTEN8194A Investigate the application of cloud networks in telecommunications switching ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Release: 1 ICTTEN8194A Investigate the application of cloud networks in telecommunications switching Modification

More information

the limits of your infrastructure. How to get the most out of virtualization

the limits of your infrastructure. How to get the most out of virtualization the limits of your infrastructure. How to get the most out of virtualization Business white paper Table of contents Executive summary...4 The benefits of virtualization?...4 How people and processes add

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

How To Configure Virtual Host with Load Balancing and Health Checking

How To Configure Virtual Host with Load Balancing and Health Checking How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Microsoft Labs Online

Microsoft Labs Online Microsoft Labs Online Self-Service Student Guide Welcome to Microsoft Labs Online powered by Xtreme Velocity. This document provides stepby-step instructions on how to: Create an account. Use your virtual

More information

Configuring Failover

Configuring Failover Configuring Failover 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

What communication protocols are used to discover Tesira servers on a network?

What communication protocols are used to discover Tesira servers on a network? Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Course VM-03 5 Days Instructor-led, Hands-on Course Description This is a 5-day intense introduction to virtualization using VMware s

More information

Managing Virtual Servers

Managing Virtual Servers CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

System Administration Training

System Administration Training Table of Contents 1 Components: Web Server Components: SQL Server 3 Components: File System 4 Components: Other Components 5 Server Configuration: Pre-Requisites 6 Server Configuration: Running the Installer

More information

Linking 2 Sites Together Using VPN How To

Linking 2 Sites Together Using VPN How To ewon Application User Guide AUG 015 / Rev 1.0 You Select, We Connect Linking 2 Sites Together Using VPN How To Content The purpose of this document is to explain you how to connect 2 remote equipments

More information

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

CNS-208 CITRIX NETSCALER 10.5 ESSENTIALS FOR ACE MIGRATION

CNS-208 CITRIX NETSCALER 10.5 ESSENTIALS FOR ACE MIGRATION ONE STEP AHEAD. CNS-208 CITRIX NETSCALER 10.5 ESSENTIALS FOR ACE MIGRATION The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and advanced

More information

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Course 20465C: Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements

More information

Citrix NetScaler Traffic Management CNS-220; 5 Days; Instructor-led

Citrix NetScaler Traffic Management CNS-220; 5 Days; Instructor-led Citrix NetScaler Traffic Management CNS-220; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler experience, this course is best suited for individuals

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.

More information