KAUST Repository. Cloud Computing in KAUST Library: Beyond Remote Hosting. Global Information and Management Symposium (GIAMS)
|
|
- Stephanie Joanna Fisher
- 8 years ago
- Views:
Transcription
1 KAUST Repository Cloud Computing in KAUST Library: Beyond Remote Hosting Item type Authors Journal Conference Paper Yu, Yi Global Information and Management Symposium (GIAMS) Downloaded 29-Aug :51:34 Item License Link to item
2 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 1 Cloud Computing in KAUST Library: Beyond Remote Hosting Yi Yu King Abdullah University of Science and Technology, Saudi Arabia Author Note Yi Yu, Library of King Abdullah University of Science and Technology, Saudi Arabia Yi Yu is a Systems Librarian of the library of King Abdullah University of Science and Technology in Thuwal, Saudi Arabia. This paper is presented for the international conference: Global Information and Management Symposium (GIAMS) on December 5-7th, 2013 in Taipei. Contact: yi.yu@kaust.edu.sa
3 Cloud Computing in KAUST Library: Beyond Remote Hosting Abstract Enterprise computing is the key strategic approach for KAUST to build its modern IT landscape. In such a strategic direction and technical environment, the library tries to establish library technology by catching new trends which help to make the library more efficient and sufficient. This paper focuses on the cloud computing development in the KAUST library, by using real world scenarios and first-hand experiences to describe what cloud computing means for KASUT library. It addresses the difficulties that were met by the library during the implementation process, how cloud computing affects the functional performance and work procedure of the library, how it impacts the style and modal of the library s technical service and systems administration, how it changes the relationships and cooperation among the involved players (the library, campus IT and vendors), and what the benefits and disadvantages are. The story of cloud computing at KAUST will share the knowledge and lessons that the KAUST library learnt during its development, and will also point out the future direction of cloud computing at KAUST.
4 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 3 Introduction King Abdullah University of Science and Technology (KAUST) is a recent science university which officially opened in Saudi Arabia in September of Named after the nation s leader who had a vision for a new House of Wisdom that would become one of the world's great institutions of research, the KAUST university removed its scaffolding and cranes to reveal an ultra-modern campus on the shore of the Red Sea on the site of an ancient fishing village called Thuwal beside the thriving metropolitan city Jeddah. Just like its parent university, KAUST Library is a brand new library which was built from scratch. During 4 years of development, KAUST library successfully grew into a medium sized academic and research library which includes 25 staff members, over 10,000 print collections and about 50 subscriptions of electronic resources covering the major science databases and e-journals. Besides its presentation of a new generation library by its spacious and artistic modern architecture, the library is also equipped with the most advanced facilities and library systems. As enterprise computing is the key strategic approach for KAUST, it naturally becomes a direction towards which to build the KAUST library s modern IT landscape. In such a strategic and technical environment, KAUST library tries to establish library systems by utilizing new trends and maximizing the benefits of new technology. Going towards cloud computing is one of these efforts and achievements. What is cloud computing and why go to cloud? The term cloud computing is more like a metaphor instead of an accurate and literal definition. As the word cloud" conventionally refers to "the Internet", the phrase cloud computing presents "a type of Internet-based computing" where different services -- such as servers, storage and applications -- are delivered to an organization's computers and devices via the Internet. i One of the reason that cloud computing has become so popular can be attributed to its ability to supply host services, which refers to application services that run client server software from a remote location. ii The application of cloud computing at the KAUST library is focused on this
5 Cloud Computing in KAUST Library: Beyond Remote Hosting aspect. However, the experiences and lessons that we have achieved does not only apply to the topic of remote hosting service. From the very beginning, as one of the major server applications in the campus, KAUST library system was hosted locally in KAUST IT Data Center. When cloud computing became a new approach for campus IT infrastructure, we were thinking of the possibility and feasibility of using cloud computing for library systems. After discussions, we decided that since internet connections are no longer a barrier, there are many benefits for the library to apply cloud computing in our surroundings. First of all, by switching to remote servers hosted by our vendor, we are able to have more dedicated and professional technical support for the library. Secondly, full package services such as upgrading, database maintenance and backup will allow the library s technological staff to do other strategic activities rather than routine operational and maintenance tasks. The benefits also include reducing mistakes that arises from misunderstandings between venders and campus IT, increased speed and efficiency for troubleshooting and problem solving, among many other advantages. In addition, due to special security concerns in this unique university, putting all of the ILS application in the cloud will be beneficial for the security of the entire campus network. How to implement? The first step of implementation was the migration of all servers to the vendor hosted location. As there are many tasks to be done -- organizing the migration schedule, changing DNS entries, opening ports for the remote host, updating IP addresses for electronic resources etc. -- the process required the involvement and corporation of many units among the library as well as the campus IT and the host vendor. In order to have a successfully migration, many people from different departments needed to work together. Even though we employed extensive communication and coordination in preparation, as well as tried to predict any potential problems and to anticipate solutions, there were still unexpected issues and situations that occurred during the migration process. For example, the window of time for the server shutdown was selected based on the KAUST IT CIO s suggestion and was agreed to by the three major players involved in the process the vendor, the campus IT and the library. However, it incurred many complaints
6 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 5 from the KAUST reference department because they had scheduled a tour for new employees during this time, and had arranged for a demo of the library s online catalog during that day. Another unforeseen incident during the implementation process was the special security procedures employed by the KAUST campus network. Many ports in the KAUST campus network are closed unless there had been a request to open it through certain procedures, and this is a situation that the host vendor has never experienced before, which resulted in the library s online catalog to be unable to be accessed even though there were no connection problems between the server and the client applications. This caused a big panic in the library. Once we realized what the issue was, the system librarian coordinated between the KAUST IT and the host vendor to resolve this problem. Since updating IP addresses of electronic resources was not included in the migration to do list from the vendor, we did not anticipate informing the e- publishers to change the IP address accordingly. After the implementation, none of the e- resources could be accessed. The result was that the migration was a total failure, and we had to roll-back to the old server. When everything seemed to be proceeding well for the second attempt of server migration, we ran into a very strange situation with the self-check machines. Normally, we can update the new server IP in the self-check machine through the admin interface. However, the admin interface could not be displayed. After wrestling with this issue for a couple days, we found that the issue was caused by the installation of a new anti-virus software which blocked the display. This is a very unexpected and strange coincidence since we initially thought that it was due to the server migration that caused the issues with the self-check machine, but in the end realized that it is due to a completely unrelated situation. Even when all the connections in the public interface looked normal, there were still many emergent complaints pouring into the system librarian: many staff members of the library were not able to establish any client-server connections. In the end, we found out that this was actually caused by a space that was accidentally left in the new IP address when they were typing it into the configuration file. Such panic and chaos appeared one after another during the initial days after the implementation process. Failing miserably in a very easy task is not a cliché. In this situation, taking great care in the preparation, sincere corporation and coordination, and detailed communication are the key factors for making the implementation process smooth and easy. Certainly, having solid technical knowledge is also a great help in getting things done.
7 Cloud Computing in KAUST Library: Beyond Remote Hosting What are the problems in the cloud? After our integrated library systems was moved to the remote datacenter hosted by the system vendor, the library staff members found that their client application would automatically disconnect if it was left idling for even a few minutes. This disconnection issue had never occurred when the servers were hosted locally by the KAUST IT. The staff members routinely use many different modules of the application to perform tasks such as cataloging, circulation and acquisition, and this issue was very annoying for the staff since they would need to constantly restart the module even if it was only inactive for a couple of minutes. Figure 1 - disconnection message from client application of library system In order to debug this issue, the KAUST IT network team installed a network packet analyzer called Wireshark on several workstations. The analyzer was used to closely monitor and record the pattern of disconnections, to help us understand the transaction behavior, and also to capture
8 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 7 the packet data for identification of the cause on the packet and protocol level. After the issue was investigated based on the captured data, the inter-network situation seemed to become clearer: The disconnection occurs intermittently and in a random pattern; The Client-Server communication uses a keep-alive mechanism, on ports other than the ports used by the SCCP protocol; Protocol inspection for the SCCP protocol was required by the application vendor, but was turned off on the firewall by KAUST IT; Packet captures on both the server side (Internet) and the client side (Inside) had shown TCP RST received on both sides. This information acquired shows that a device in between is sending RST frames in both directions to terminate the session after a certain timeout period. IT Security increased the TCP session idle period to 8 hours (60 minutes is the default). However, the disconnection is happening frequently and the sessions would end well before 8 hours, so this cannot be the cause iii of the problem. How to resolve? In order to figure out which part of the chain is causing the disconnection, KAUST IT examined potential nodes by identifying internal and external traffic paths.
9 Cloud Computing in KAUST Library: Beyond Remote Hosting Figure 2 - traffic path, inside is marked green while outside is marked red. The nodes to be tested in the outside path are: International Gateway (IGW) KAUST MPLS Coreiv The nodes to be tested in the inside path are: Firewall Anagranv F5 Load Balancervi
10 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 9 An exclusive method was used to investigate this issue. The results showed that all the test machines placed right before IGW, the Virtual routing and forwarding (VRF) vii, and the firewall were not experiencing the disconnections, but the reference machine on the Data VLAN was experiencing it. Thus it was reasonable to conclude that the disconnection was being caused by the F5 load balancer. After adjusting the settings in F5, the disconnection problem has been resolved. Lessons and next step There are several points that are worth noting about our implementation of cloud computing. First, and the most crucial step, is to make a correct decision about whether or not to switch to cloud computing. As there are many debates about the pros and cons of cloud computing, it is necessary to investigate and analyze the whether there is a need in reality before making the decision. Considering that there are many units from different departments and organization who will be involved in the process, it is also extremely important to obtain full understanding and support from all related departments and personnel. During the process of implementation, each step and every detail should be considered thoroughly. Any neglect or carelessness can lead to big disasters just like what we experienced, resulting in a complete rollback to the old server. Some of the problems were not avoidable as it was a new experience for us and we could not anticipate all the potential issues. As everything is in the cloud now, network and security issues have become a prominent topic, as things may have become more complicated and invisible. This does not only bring new challenges to the KAUST IT, but also raised new questions to the server application -- such as how the system has adapted to the new network environment. For example, during the investigation period for the disconnection problem, the server/host vendor and KAUST IT engaged in long arguments about who should take responsibility for the disconnection. Neither party thought that the problem should be their responsibility. Even though the final result indicated that the problem was caused by the configuration of F5 Load Balancer, the KAUST IT still believes that the issue lies within the applications for not being updated to adapt to a remote hosting environment, because this problem did not appear with other remotely hosted applications running on the same F5 configurations. The process of implementing cloud computing in the KAUST library has brought
11 Cloud Computing in KAUST Library: Beyond Remote Hosting many new challenges to be tackled because this is a new experience for everyone involved the KAUST IT, the system librarian, the application vendor and every component had to become adapted to the new network environment. As cloud computing is a new practice for the hosting/application vendor as well as the KAUST library, many things will have to change according to the new situation. There are still a lot of unclear issues and gray areas. We need to review all of the documents and protocols including contracts, agreements, emergency procedures, etc. We will need to discuss with the suppliers, vendors and KAUST IT regarding how to revise and complete the documents based on the new technical environment. For the systems librarian, cloud computing brings with it a new and unique set of tasks and responsibilities. Instead of only focusing on the functionalities and performance of the library system, the systems librarian will also need to take care of the whole chain of the system which spans across the border of both the internal and external networks. Thus, the systems librarian needs to have a broader vision regarding the organization and the technology, a better understand about the breadth of different technologies and platforms, to have the capability to think outside the box, and to also learn the language of business. Knowledge about networks and network security is also an important and prominent area for the system librarian in the cloud computing era. Conclusion The KAUST Library decided to move its integrated library systems to a remote host in following with the cloud computing approach adopted by KAUST IT. The process of server migration to the remote host was a major undertaking. Careful preparation, full cooperation, and smooth communication are key attributes for the success of migration. During the initial stages of working with cloud computing after server migration, we encountered various difficulties and problems including client-server disconnections. We used the exclusive method to investigate session disconnection issues and found that the setting of the F5 Load Balancer was the cause. We will continue to work with KAUST IT and the application vendor and the host supplier to improve the service and management of the KAUST library systems. The library technical staff will continue to acquire new knowledge both in technology and business in order to catch new trends of computing service and to continuously improve the library.
12 [Cloud Computing in KAUST Library: Beyond Remote Hosting] 1 1 Reference i Webopedia. N.p., n.d. Web. 13 Nov < ii "Cloud computing." Wikipedia. Wikimedia Foundation, 18 Nov Web. 18 Nov < iii Report of Millennium Problem, KAUST IT, Aug iv "Multiprotocol Label Switching." Wikipedia. Wikimedia Foundation, 18 Nov Web. 19 Nov < Multiprotocol_Label_Switching v "Anagran." World's Largest Professional Network. N.p., n.d. Web. 19 Nov < vi "Load Balancer." Home. N.p., n.d. Web. 19 Nov < vii "Virtual Routing and Forwarding." Wikipedia. Wikimedia Foundation, 17 Nov Web. 19 Nov <
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationHow to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
More informationWORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours
WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours
More informationON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed:
ON HOLD ANNOUNCER The is a high quality digital on-hold announcer. It is designed to be attached to a 100BASE-T Ethernet network to receive audio production updates via the Internet. These instructions
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationWAN Migration Techniques
Jan 2014, HAPPIEST MINDS TECHNOLOGIES WAN Migration Techniques Lalit Kumar SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. 2 Copyright Information This document is exclusive property
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationaxsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
More informationAPPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.
APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE TITLE O*NET-SOC CODE RAPIDS CODE Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.00 111HY Network and Computer
More informationSupport Services Department
Support Services Department SUBJECT: Consideration of a Resolution and a recommendation authorizing execution of a contract amendment with Prescient Solutions, of Schaumburg, IL for staffing in the total
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
More informationConfiguring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
More informationState Government Improves Delivery of Services to Agencies
Customer Case Study State Government Improves Delivery of Services to Agencies The State of Oregon has undertaken a major consolidation of its information infrastructure using Cisco Integrated Services
More informationMulti-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
More informationHow To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
More informationMULTIPOINT VIDEO CALLING
1 A Publication of 2 VIDEO CONFERENCING MADE SIMPLE. TELEMERGE S ALL-IN-ONE VIDEO COLLABORATION Everything you need to enable adoption, right here. Request A Demo Learn More THE FOUR PILLARS Telemerge
More informationHow to Guide: StorageCraft Cloud Services VPN
How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12
More informationIntroduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationDNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.
This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube
More informationConfiguring Failover
Configuring Failover 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationPrint Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
More informationPREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE
PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE RELEASE 7 VOICENT AGENTDIALER TM TABLE OF CONTENT I. Overview II. Install and Setup Server III. Test AgentDialer on the Server IV. Use a better headset V.
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationEnhanced Enterprise SIP Communication Solutions
Enhanced Enterprise SIP Communication Solutions with Avaya Aura and Allstream SIP Trunking An Allstream White Paper 1 Table Of Contents Beyond VoIP 1 SIP Trunking delivers even more benefits 1 Choosing
More informationWHITE PAPER. A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels. www.earthlink.com
WHITE PAPER A Practical Guide to Choosing the Right Clouds Option and Storage Service Levels www.earthlink.com 1 Our job in IT is to provide technology frameworks and an operating model to facilitate but
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationXerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
More information"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
More informationWebsense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationIPv6 Preparation and Deployment in Datacenter Infrastructure A Practical Approach
Paper IPv6 Preparation and Deployment in Datacenter Infrastructure A Practical Approach Marco van der Pal Generic Services Network Infrastructure Services, Capgemini Netherlands B.V., Utrecht, The Netherlands
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationBenefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
More informationCitrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
More informationShort Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud
Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud Olga Aparicio & Mun-Wai Hon Ground Systems Architecture Workshop
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationDesktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
More informationActive Directory Infrastructure Design Document
Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document
More informationHow To Manage A Netscaler On A Pc Or Mac Or Mac With A Net Scaler On An Ipad Or Ipad With A Goslade On A Ggoslode On A Laptop Or Ipa On A Network With
CNS-205 Citrix NetScaler 10.5 Essentials and Networking The objective of the Citrix NetScaler 10.5 Essentials and Networking course is to provide the foundational concepts and advanced skills necessary
More informationMicrosoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
More informationWhite Paper. McAfee Multi-Link. Always-on connectivity with significant savings
McAfee Multi-Link Always-on connectivity with significant savings Table of Contents Executive Summary...3 How McAfee Multi-Link Works...4 Outbound traffic...4 Load balancing...4 Standby links for high
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationUnderstand Troubleshooting Methodology
Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service
More informationAccelerate Private Clouds with an Optimized Network
Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization
More informationThis chapter covers four comprehensive scenarios that draw on several design topics covered in this book:
This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: Scenario One: Pearland Hospital Scenario Two: Big Oil and Gas Scenario Three: Beauty Things Store
More informationLinking 2 Sites Together Using VPN How To
ewon Application User Guide AUG 015 / Rev 1.0 You Select, We Connect Linking 2 Sites Together Using VPN How To Content The purpose of this document is to explain you how to connect 2 remote equipments
More informationHow To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
More informationNetwork Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
More informationAqua Connect Load Balancer User Manual (Mac)
Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationSecuring the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
More informationInstallation Troubleshooting Guide
Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching
More informationXPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationManaging Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationH0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration
H0/H2/H4 -ECOM100 DHCP & HTML 6 H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML 6-2 H0/H2/H4 -ECOM100 DHCP DHCP Issues The H0/H2/H4--ECOM100 is configured at the factory
More informationMulti-Link - Firewall Always-on connectivity with significant savings
White Paper Multi-Link - Firewall Always-on connectivity with significant savings multilink.internetworking.ch able of Contents Executive Summary How Multi-Link - Firewalls works Outbound traffic Load
More informationSecurity Considerations in IP Telephony Network Configuration
Security Considerations in IP Telephony Network Configuration Abstract This Technical Report deals with fundamental security settings in networks to provide secure VoIP services. Example configurations
More informationRapid Assessment Key v2 Technical Overview
Rapid Assessment Key v2 Technical Overview Overview The Rapid Assessment Key v2 is an extremely easy to use USB device that quickly collects data on networked imaging devices. The key allows office equipment
More informationPlesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
More information2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot)
Dual WAN Configuration 1.0 Login First login to Management UI, (192.168.1.1) default router IP You will be requiring entering the user name and password, which are both admin by default. Select System
More informationEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
More informationMULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
More informationHow To Configure Apple ipad for Cyberoam L2TP
How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationHow To Configure Virtual Host with Load Balancing and Health Checking
How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article
More informationMultifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationMulti-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
More informationN-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
More informationExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
More informationEnabling Remote Management of SQL Server Integration Services
Enabling Remote Management of SQL Server Integration Services Michael@SchmittDotNet.com www.schmittdotnet.com Version 1.0 10/14/2010 Copyright and Disclaimers This guide is for informational purposes only.
More informationCNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,
More informationA system is a set of integrated components interacting with each other to serve a common purpose.
SYSTEM DEVELOPMENT AND THE WATERFALL MODEL What is a System? (Ch. 18) A system is a set of integrated components interacting with each other to serve a common purpose. A computer-based system is a system
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationManaged Appliance Installation Guide
Managed Appliance Installation Guide Introduction The CrashPlan PROe managed appliance is a fully managed system that requires minimal user maintenance. This guide is intended to assist you in installing,
More informationConfiguration Guide. SafeNet Authentication Service. Remote Logging Agent
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationWireshark vs. The Cloud :
Wireshark vs. The Cloud : Capturing packets in virtual environments Jasper Bongertz Airbus Defence and Space CyberSecurity @packetjay Topics General virtualization basics Virtual Switches (vswitch/dvswitch)
More informationIBM Tivoli Network Manager 3.8
IBM Tivoli Network Manager 3.8 Configuring initial discovery 2010 IBM Corporation Welcome to this module for IBM Tivoli Network Manager 3.8 Configuring initial discovery. configuring_discovery.ppt Page
More informationTECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
More informationFirewall Port Handling in TENA Applications
Firewall Port Handling in TENA Applications The purpose of this report is to describe the manner in which TENA applications handle communications using TCP. This report will also present some insight for
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationMicrosoft Office Communications Server 2007 R2
Microsoft Office Communications Server 2007 R2 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: Sept. 2009 For the most up-to-date version of the Scale to a Load Balanced
More informationDescription: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
More informationIntraVUE Diagnostics. Device Failure
IntraVUE provides a method to record and capture the issues that occur in the Ethernet networks being used for automation applications. Automation networks are susceptible to subtle disturbances due to
More informationCNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration
CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and advanced skills necessary
More informationTroubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.
Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation. Please consult this document before contacting atech Telecoms
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationDissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
More information