Availability For Network Function Virtualization. Alon Bernstein Distinguished Engineer Cisco Systems
|
|
- Lenard Golden
- 7 years ago
- Views:
Transcription
1 Availability For Network Function Virtualization Alon Bernstein Distinguished Engineer Cisco Systems
2 Availability Using Software In The Data Center Storage Compute Networking (NFV)
3 NFV Redundancy Requirements Minimal packet loss High bandwidth Stateful
4 Example : vcpe Redundancy
5 Example : vcpe Redundancy
6 Example : vcpe Data Path
7 ETSI-NFV
8 Conclusion NFV can support high availability Traditional as well as new Availability models are possible in the data center
9 Distributed Trace For Comcast Video May 2015
10 ARCHITECTURE SKETCH Comcast Confidential & Proprietary 2
11 GRAPH OF CALLS Comcast Confidential & Proprietary 3
12 GRAPH OF CALLS WITH ANNOTATIONS Comcast Confidential & Proprietary 4
13 SIMPLE CORE PROTOCOL Traces A trace encompasses all interactions, generally for some interesting user interaction. Here, it s going to encompass a video playback session. Spans A span is some small chunk of that, here, it will almost always be handling or making a service call. Traces and Spans both have IDs. Trace IDs in our scheme are GUIDs, Spans are pseudorandomly generated integers. Pass information around on X-MoneyTrace header. X-MoneyTrace:traceId=$TraceId;spanID=$SpanID;ParentID=$ParentID At each new span generation, generate a new Span ID, and move existing Span ID to the Parent Span. Every service call passes X-MoneyTrace, and every service responds with the same X-MoneyTrace when it responds to the call. Comcast Confidential & Proprietary 5
14 Virtual Business CPE Accelerating Quote to Cash and Enhancing Operational Flexibility Kevin Luehrs, Director, CableLabs
15 Cloud Technologies Transform the Landscape Cloud Computing to Software Defined Networks Dynamic demand for services in data centers drove evolution of Software Defined Networking (SDN) Separation of control from data Control functions centralized under a single software controller Software control of data paths, network functions and packet handling rules improve flexibility and enable greater automation.
16 Virtualization OS Hardware Virtualization Initiation of self-contained instances of an operating system and software applications on a hardware platform emulating an independent device. Virtual machines can be installed in a host and operate as separate devices even with different OS. OS OS Network Function Virtualization (NFV) Implementing network functions as software programs that can be run independently or as a group on industry standard servers. Route Load Balance DPI Functions can be moved out of purpose-built hardware into standard servers in the cloud. Switch Performance Management Tag
17 Cloud Technologies Transform the Landscape Hypothesis Cloud technologies that transformed data centers will similarly transform networks Opportunity The emergence of new access network technologies such as DOCSIS 3.1, EPON and EPoC and greater adoption of SDN provides opportunity for virtualization of networks and services.
18 Use Case: Virtual Business CPE Apply virtualization methods to delivery of business services SDN to configure endpoint devices and establish connections Software control facilitates automation NFV for flexibility in deploying services Business services providers run applications to provision and manage devices and connections. SDN & NFV can be used to accomplish this
19 Problem Statement No standard and open Application Programming Interfaces (APIs) are currently available to expose open source SDN controller features for Business Services applications. SDN controllers manage device configuration and connections based on inputs from network applications. Open source SDN controllers are supported by collaborative developer communities. Enable scale, rapid development, diversity of ideas
20 Proposed Solution Develop data models and standard open APIs enabling delivery of business services using open source virtualization techniques. Submit data models and APIs to open source project for evolution, adoption and use by NFV community. Develop a reference software platform integrating RESTful APIs, OpenDaylight and OVSDB/OVS
21 Virtual Business CPE Demo Platform Raspberry Pi
22 Thank You
23 A History of Abuse Lies, Damned Lies, and Cybersecurity Metrics
24 Past - The Abuse Department An Internet Service Provider s abuse department processes reports of Acceptable Use Policy (AUP) violations Reports enter the system via the ISP s abuse@ address. Reports range in seriousness from criminal activity down to people calling each other names
25 Annual Ticket Volume
26 Annual Ticket Volume by Type
27 Malware Ticket Volume
28 Present - The Customer Safety Department Since the early 2000 s, the number of customers intentionally launching attacks has dwindled to almost nothing compared with malware. Today s offenders are also victims, and we do our best to protect them
29 Spam Ticket Volume
30 From Abuse to Customer Safety
31 Future The Ecosystem Literally everyone on the internet has at least a detection capability Many also have a notification capability (e.g. banks, search engines, and social media) Some even have a remediation capability (e.g. Facebook s malware walled garden) It takes a village to raise a child, and it takes an internet to fight cybercrime.
32 RDK + CA/DRM: ENHANCING INTEROPERABILITY FOR ROBUST REVENUE SECURITY Petr Peterka Verimatrix
33 Agenda Benefits and Challenges of RDK RDK and Revenue Security Mitigating Threats to Revenue Security Power of Standardization Looking Forward
34 Benefits and Challenges of RDK Benefits: Common implementation vs. common specification Cost benefits Accelerated development Supports differentiation Challenges: Security threats Interoperability with CAS and DRM 4K UHD security requirements OSS license obligations require careful attention
35 RDK and Revenue Security CAS/DRM RDK interfaces: 1. Interaction with the content tuner/demultiplexer 2. Interaction with a hardware security (root of trust, descrambling, key ladders, etc.) 3. Interaction with the application layer 4. Access to IP stack 5. Forensic watermarking CAS should be isolated from the middleware and application functionality for robustness reasons Abstracting out main functions for interoperability reasons
36 Mitigating Threats Interaction between the application and the CA client: 1. Tuning/Navigation 2. Initialization/Provisioning 3. Authorization/Entitlements 4. On-screen Display
37 Power of Standardization Examples of relevant standards organizations: SCTE OMS: Hardware root of trust (K-LAD) DVB Simulcrypt and MPEG-DASH Common Encryption (CENC) GlobalPlatform: Trusted Execution Environment (TEE) OSS implementation is possible
38 Looking Forward RDK is stable but still need abstract CAS APIs and HW security abstraction Plus Downloadable Security extension pending FCC DSTAC outcome
39 Questions?
40 Introducing an Abstraction Layer to Control the User Experience, Apps and Integrate Content on All Screens By Albert Dahan Co-Founder and CTO, Metrological
41 Market Challenges Integrating live TV, OTT content, widgets, third party apps into a single user experience on all screens Retaining control of the user experience across a growing number of devices Native apps running on STB middleware clients require device-specific solutions for each STB, mobile and tablet device Managing multiple, separate backend management structures for each content source Growing development costs for maintaining multiple versions of each app for each device Mounting pressure to lower operational costs while meeting consumer demand for OTT/app content, live TV and VOD content increases the demands on STB CPU and memory
42 Native vs Abstraction Layer Approach Native Development Approach Resides on the device requiring a device-specific solution Dictates development of many different versions of each app for each device Based on closed, monolithic software solutions Requires MVPDs to upgrade to next-gen IP STBs with browsers Closed app development community Separates OTT, live TV and apps viewing Key functionality built into the app itself Abstraction Layer/Framework Uses browser as a generic integration point to run and control the user interface, apps and client services across connected devices A single version of each app runs on all devices Uses modular software components that connect new web-based and open source technologies Minimizes CPU and memory usage of the end device ; deployable on browserless legacy STBs Open app development community via SDKs Integrates OTT, app and live TV viewing experiences enables new functionality and interactivity Apps are isolated in their own sandbox, separating key functionality and using it as a shared resource
43 Abstract Layer/Framework Approach Separates MVPD backend, device middleware and operating system from the user interface, presentation and navigation layers on each device Operates independently from the device eliminating the need for device-specific approaches Merges all content onto one screen, enabling new contextual, mobile and social features Minimizes CPU and memory usage of the end device Deployable on legacy or browser-less STBs Uses small, modular software components that connect new web-based and open source technologies with existing legacy ecosystems Apps only need to be developed once to run on all devices and can be developed by anyone using an open Software Development Kit (SDK)
44 Evolution of TV App Platform Development Phase 1: Native apps on STB middleware Phase 2: Web-based apps Phase 3: Proprietary MVPD app environments Phase 4: HTML5-based abstraction layer *Need to develop app for each device *Requires browser optimization and lacks integration with middleware, backend *Each app must be developed for each MVPD *HTML5 standard still evolving
45 Thank you! Albert Dahan Co-Founder and CTO, Metrological
Towards Secure Multi-network Video Services. Steve Oetegenn, President
Towards Secure Multi-network Video Services Steve Oetegenn, President Contents Market Dynamics Multi-network Solutions Evolution of Security 2 Copyright 2015 Verimatrix, Inc. CONFIDENTIAL OTT Market Dynamics
More informationdemonstrations of service offerings and in public comments made during advisory committee meetings.
DSTAC SUMMARY REPORT FINAL: 8/28/2015 Introduction The STELA Reauthorization (STELAR) Act of 2014 directed the FCC Chairman to establish a working group of technical experts that represent the viewpoints
More informationSmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America
More informationARM s role in Open Source software
ARM s role in Open Source software The Network Infrastructure perspective Bob Monkman Enterprise Segment Marketing Manager September 2015 Open Source Software: definition Open source software is developed
More informationOUR STRATEGY FOR STB-LESS IPTV
OUR STRATEGY FOR STB-LESS IPTV Dr. Oliver Friedrich, IPTV Semi 2014, The Hague ONE YEAR LATER General platform strategy & new deployments inside Deutsche Telekom HTML5, De-coupling, Partnering, Standards
More informationMaking the Case for Open Source Controllers
White Paper Making the Case for Open Source Controllers Prepared by Roz Roseboro Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.brocade.com September 2014 Introduction Telcos face
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationVIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationSecuring end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
More informationIntroduction. Kari SYSTÄ. Laulasmaa 28.10.2013
Introduction Kari SYSTÄ Laulasmaa 28.10.2013 About me a short CV Various research and teaching roles at TUT PhD in Computer Science in 1995 Various research and management positions in Nokia Interactive
More informationThreat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform
Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform Sebastian Zabala Senior Systems Engineer 2013 Trustwave Holdings, Inc. 1 THREAT MANAGEMENT
More informationEvolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk
More informationAlcatel-Lucent Multiscreen Video Platform RELEASE 2.2
Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationSimplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
More informationProspects for Software Defined Networking & Network Function Virtualization in Media and Broadcast John Ellerton
Prospects for Software Defined Networking & Network Function Virtualization in Media and Broadcast John Ellerton Head of Media Futures, British Telecom john.ellerton@bt.com Agenda The Promise of SDN and
More information1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationPreparing your Business for Virtualization. Mirko Voltolini VP Network Technology mirko.voltolini@colt.net
Preparing your Business for Virtualization Mirko Voltolini VP Network Technology mirko.voltolini@colt.net SDN and NFV are transforming networks The virtualisation of IT has transformed the consumption
More informationStrategic Direction of Networking IPv6, SDN and NFV Where Do You Start?
Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist Technology Services Mobility & Networking Forward-looking statements
More information1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
More informationGroup-Based Policy for OpenStack
Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in
More informationEnhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components
More informationConference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
More informationSDN, NFV & Future Technologies. Chris Thompson Director of Product Management, Cloud Connectivity Solutions
SDN, NFV & Future Technologies Chris Thompson Director of Product Management, Cloud Connectivity Solutions Agenda SDN & NFV projections Terminology and protocols Overview of SDN, NFV and NV CPE Evolution
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSteelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
More informationRTC:engine. WebRTC SOLUTION SIPWISE AND DEUTSCHE TELEKOM / TLABS ANNOUNCE COOPERATION FOR THE
SIPWISE AND DEUTSCHE TELEKOM / TLABS ANNOUNCE COOPERATION FOR THE WebRTC SOLUTION RTC:engine Sipwise and Deutsche Telekom AG / Telekom Innovation Laboratories signed a cooperation agreement for joint development
More informationThe promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services
The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationWhat is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
More informationSimplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
More informationNetwork Virtualization Solutions
Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction
More informationIntroduction to Quality Assurance for Service Provider Network Functions Virtualization
Introduction to Quality Assurance for Service Provider Network Functions Virtualization Carsten Rossenhoevel, Managing Director European Advanced Networking Test Center 2015-09-08 Company Introduction
More informationContent Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20
Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 5G Content Protection and Security Topics 1. Is that a computer in your pocket? (or, are you just happy to see me? Mae West)
More informationIntel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS
Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Speaker: Catherine Spence, IT Principal Engineer, Cloud Computing Acknowledgements: Aaron Huber, Jon Price November 2014 Legal Notices
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationCisco Application-Centric Infrastructure (ACI) and Linux Containers
White Paper Cisco Application-Centric Infrastructure (ACI) and Linux Containers What You Will Learn Linux containers are quickly gaining traction as a new way of building, deploying, and managing applications
More informationFuture of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationIBM MobileFirst Launch David Lee Heyman
IBM MobileFirst Launch David Lee Heyman WW Mobile Business Agility Tiger Team IBM's Mobile Enterprise - A personal journey Watch now: http://youtu.be/0sealyljfag Announcing: IBM MobileFirst 5 2013 IBM
More informationCLOUD NETWORK DEFENSE
DATASHEET securing the cloud connected world CLOUD NETWORK DEFENSE POWERED BY WEDGEOS Overview - Cloud is the new Edge Mobility, cloud, consumerization of IT and Internet of things have completely redefined
More informationSecurity Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationTraffic Management Solutions for Social Innovation Business
Traffic Management Solutions for Social Innovation Business Hitachi Review Vol. 63 (2014), No. 1 51 Tatsuya Shimizu Yusuke Shomura, Dr. Eng. Hirofumi Masukawa Yukiko Takeda OVERVIEW: The spread of smartphones
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationNFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments
Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and
More informationLearn how Open Source Software is Redefining SDN!
Learn how Open Source Software is Redefining SDN! Open SDN Controller Team Vijay Arumugam Kannan, Product Manager Chris Metz, Distinguished Engineer 04/29/2015 Agenda Open Source and OpenDaylight? Cisco
More informationNFV: What Exactly Can Be Virtualized?
NFV: What Exactly Can Be Virtualized? Jim Hodges d Senior Analyst, Heavy Reading Agenda NFV Drivers ETSI NFV Use Cases Virtualization Criteria Applying the Criteria NFV Challenges Summary 2 NFV Adoption
More informationEmerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices
Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies
More informationJenkins World Tour 2015 Santa Clara, CA, September 2-3
1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service
More informationWhite Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
More informationCyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
More informationCheck Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
More informationExtending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationF5 BIG DDoS Umbrella. Configuration Guide
F5 BIG DDoS Umbrella Configuration Guide Jeff Stathatos September 2014 Table of Contents F5 BIG DDoS Umbrella... 1 Configuration Guide... 1 1. Introduction... 3 1.1. Purpose... 3 1.2. Limitations... 3
More informationRestorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
More informationSaisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim
Saisei FlowCommand The Saisei FlowCommand family of network performance enforcement (NPE) solutions offers a new paradigm for real-time user- and application-policy enforcement and visibility made possible
More informationQualifying SDN/OpenFlow Enabled Networks
Qualifying SDN/OpenFlow Enabled Networks Dean Lee Senior Director, Product Management Ixia Santa Clara, CA USA April-May 2014 1 Agenda SDN/NFV a new paradigm shift and challenges Benchmarking SDN enabled
More informationDelivering Pay TV Content throughout the Connected Home Amol Bhagwat
Delivering Pay TV Content throughout the Connected Home Amol Bhagwat Vice President & Vice-Chair, DLNA Board of Directors Principal Architect, Video Application Technologies, CableLabs DLNA VidiPath TM
More informationSDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationDo Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization
More informationVerizon Managed SD WAN with Cisco IWAN. October 28, 2015
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines
More informationOF 1.3 Testing and Challenges
OF 1.3 Testing and Challenges May 1 st, 2014 Ash Bhalgat (Senior Director, Products), Luxoft Santa Clara, CA USA April-May 2014 1 Agenda OpenFlow : What and Why? State of OpenFlow Conformance Challenges
More informationThe Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
More informationWhite Paper - Huawei Observation to NFV
White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major
More informationContent Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
More informationAdaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011
W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in
More informationEdge Virtualization and the MicroCloud. Benefits and Differences between Private and Public Clouds
WHITE PAPER Edge ization and the MicroCloud Benefits and Differences between Private and Public Clouds AUTHOR: JOEL FUTTERMAN IPHOTONIX COO & CTO www.iphotonix.com The benefits of public and private clouds
More informationAdobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
More informationNetwork Virtualization
. White Paper Network Services Virtualization What Is Network Virtualization? Business and IT leaders require a more responsive IT infrastructure that can help accelerate business initiatives and remove
More informationVMware ThinApp Application Virtualization Made Simple
VMware ThinApp Application Virtualization Made Simple Rob Groenhuis Senior Systems Engineer VMware Netherlands BV 2009 VMware Inc. All rights reserved Agenda VMware s Vision Why Application Virtualization?
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationSecuring the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
More informationSDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
More informationAn Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg
More informationActiveVideo CloudTV GuideCast: Delivering User Interfaces from the Cloud
ActiveVideo CloudTV GuideCast: Delivering User Interfaces from the Cloud With the rise of modern smartphones and tablets, consumers can search for, browse, and view video content through slick, web-based
More informationTOP TEN CONSIDERATIONS
White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology
More informationSoftware-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
More informationSDP Hackathon #4 Analysis & Report
SDP Hackathon #4 Analysis & Report High Availability Public Cloud Research March 28, 2016 Research Participants The Software-Defined Perimeter (SDP) Research Workgroup of the Cloud Security Alliance (CSA)
More informationSoftware Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
More informationBuilding the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
More informationCloud Computing Concept, Technology & Architecture
Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助 Contents Technology mechanisms foundational to cloud platforms are covered,
More informationFinding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network
LiveAction Application Note Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network September 2012 http://www.liveaction.com Table of Contents
More informationNetwork Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
More informationHOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationZentera Cloud Federation Network for Hybrid Computing
Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era
More informationSecurity 2012: A Handbook for Cyber Security
Security 2012: A Handbook for Cyber Security Amichai Shulman, CTO Robert Rachwald, Director of Security Strategy IMPERVA Session ID: SECT-204 Session Classification: General Interest Agenda Trend selection
More informationVideo Collaboration & Application Sharing Product Overview
. Video Collaboration & Application Sharing Product Overview Overview NPL s Collaborative Real-Time Information Sharing Platform (CRISP ) combines high quality video collaboration, remote application sharing
More informationDriving SDN Adoption in Service Provider Networks
WHITEPAPER Software Defined Networking (SDN) Driving SDN Adoption in Service Provider Networks This whitepaper provides an overview of key requirements and enablers for driving SDN adoption in Service
More informationLecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.
Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise
More information