How Kontiki Takes Live Video Broadcasting to the Next Level

Size: px
Start display at page:

Download "How Kontiki Takes Live Video Broadcasting to the Next Level"

Transcription

1 How Kontiki Takes Live Video Broadcasting to the Next Level Executive Summary Today, there is a huge pent up demand for live video in the enterprise for everything from executive & CEO updates to marketing communications to training. Live video distribution remains a challenge primarily due to the constraints of the corporate networks. Many companies deploy more networking hardware, like caching and video streaming servers, in an attempt to handle the load on their global network, but this can be costly and take months or years to implement, and ultimately may not provide for ubiquitous video for all employes. Hardware-based infrastructure investments are typically skewed towards larger corporate offices, leaving smaller remote offices and home-based workers even more disconnected than usual from these exciting live events. The foundation of Kontiki s Enterprise Video Platform is our Delivery Management System (DMS). The DMS overcomes the major challenges of streaming live video to large numbers of users regardless of their location or how well connected they are. The solution requires no infrastructure hardware investment and utilizes your existing network infrastructure no caching appliances to deploy and manage and no streaming servers to distribute geographically. Simply deploy a small client application on each end user s PC and you re ready to go. The Kontiki system uses a centrally managed peer-assisted delivery model. The central management service maintains a virtual network map of all the available client peers that are streaming the live event and arranges communications between peers that are topologically close to each other. This overcomes many of the problems associated with traditional live streaming methods by moving the load from the Wide Area Network (WAN) to the Local Area Network (LAN). The results show a significant improvement over the traditional hardware solution, often resulting in only one copy of the stream going into each office location regardless of the numbers of users in that office that are requesting that stream. There are three important elements to the breakthrough technology that enables Kontiki to stream high-quality live video to large audiences through your existing network infrastructure: Topology awareness Vast majority of the traffic travels over the LAN vs. the WAN Peer-Assisted Delivery Every computer with a Kontiki software client is a potential server Automatic stream selection Each user automatically receives a bit rate that is commencement with their available bandwidth

2 In addition to being the most efficient method of streaming live video across the modern enterprise network, other benefits of the Kontiki solution include: Dramatic reduction in both upfront and ongoing maintenance costs A deployment time that is measured in weeks vs. months or years Unmatched end to end security of the live stream Great end user video streaming experience Leverages your existing network infrastructure To summarize, Kontiki delivers high-quality, secure corporate video live, on-demand, download, and push without the need for additional costly network hardware, data connections or IT staffing. Kontiki s end-to-end video delivery solution has all of the robust functionality you need multiple delivery options, integration, portal search and discover, security and analytics all in a single complete suite available as Managed Service or licensed software. With over 650,000 corporate computers enabled worldwide, Kontiki has been used to securely publish, protect, deliver, and track digital media content to employees of mid-size companies and large enterprises since High Performance Content Delivery Technology Kontiki s goal is to deliver high quality live video to every desktop, regardless of network topology and conditions. The Kontiki Delivery Protocol () is designed to make highly efficient usage of distributed corporate networks. Traditional distribution solutions attempt to solve the problem by deploying large numbers of servers. But it becomes cost-prohibitive for large companies to put a server in every location. Typically they can only get as close to the requesting computer as the nearest data centre. In contrast, the Kontiki DMS automatically enables clients to rapidly find peers available to serve the desired stream that are as topologically close to the requesting client as possible. Live video is served to the end user s desktop across short network chains from several peer servers simultaneously. A combination of server-side and client-side intelligence enables this simultaneous short chain peer serving. The results show a significant improvement on the traditional hardware solution, often resulting in one copy of the stream going into each office location regardless of the numbers of users in that office that are requesting that stream. 2

3 Traditional Distribution (more congested) Kontiki-powered Distribution (less congested) The Wide Area Network Problem Worldwide enterprise networks, while employing many different types of technologies such as MPLS VPN, are physically built on the hub and spoke model. In practice this means locations have excellent connectivity inside the LAN, typically 100Mbit/sec to 1Gbit/sec, but have low bandwidth external connections to each other and back to central data centers. While medium and large sized locations such as headquarter offices may have external connections running at Mb/sec or higher, the vast majority of small and mid-sized offices will have low speed and high latency connections such as ISDN lines at 128kb/sec and ADSL/SDSL at 2-4Mb/sec that is shared by dozens and sometimes hundreds of users. For network architects, the primary goal when implementing a large-scale video distribution system is that demand waves caused by large numbers of users attempting to view video simultaneously will not impact the performance of the global network as experienced by the employees. Typical Distributed Enterprise Network Small Offices Large Offices 1Mb DSL 768Kb DSL MPLS VPN 4x 1Gb 2x 1Gb 10Gb 10Gb 10Gb Ethernet 1Gb 1Gb 512Kb DSL Data Centre 3

4 Absorbing Demand Waves The power of the peer network is that it acts as a shock absorber for the network when many users want to watch a live or On-Demand video stream. For example, when one user in a remote office chooses to start watching a stream, Kontiki will source that stream over the WAN from a Kontiki central streaming server. But, regardless of how many other users in that office want to watch that same stream, Kontiki will source that stream from other Kontiki clients on the same LAN instead of going back over the WAN for each user. Distance Vector Optimization Kontiki does not supply a random list of clients scattered all over the network, as is often the case with consumer peer-to-peer file sharing systems. Requesting clients of a video stream are provided with a list of the nearest peers that are currently streaming the Live video. A centrally provisioned Directory Server that is configured for the network layout and conditions manages this activity. Distance Vector Optimization Illustration Kontiki Hosted Services Internet Low Priority Peers Medium Priority Peers High Priority Peers Requesting Client The Directory Server uses a set of heuristics to automatically provide lists of peers that are as close as possible to the requesting client. This decision is based on router graph proximity, External IP address matches, IP prefix matches, Autonomous System match, and Autonomous System path. Router graphs are built and maintained by the Directory Server as it receives key information including traceroutes, external and internal IP addresses, and other network information supplied by every online client. In addition to server side peer allocation and prioritization, the Kontiki client software will 4

5 discover nearby peers that can serve it the Live stream by subnet broadcast as well as Intra-LAN tests that measure line speed between a peer, response time of a peer, and the number or router hops a peer is away from it. The Kontiki client also monitors the response times and available bandwidth of each peer that is serving the stream, and adaptively requests more data from the computers that provide the best throughput. The clients in the grid will automatically optimize to focus on the computers that have the topologically closest and least-congested connections, naturally adapting in real time to avoid points of contention. Central Command and Control Kontiki enables our customer s Network Engineering group to control and override all the techniques the system uses for traffic routing via an easy to use central Network Manager console. Also, many other client side configuration options such as bandwidth utilization limits and CPU utilization thresholds can be modified via Kontiki s Network Manager console and those changes are automatically pushed out to all the Kontiki clients. End-to-End Security Since the Kontiki platform relies on clients to serve content to other clients, an end to end security framework must be in place to ensure only authorized users can request and receive content, that information cannot be sniffed while travelling over the wire, and that no malicious users or PCs with viruses can disrupt or alter the video content. Access control Kontiki enables the owner of the Live stream to protect the stream so only certain users can participate in the Live event. Kontiki has built in support for any LDAP compliant directory service as well as Active Directory. This allows content owners to pick and choose groups of people from the corporation s user directory that can access a particular stream. For protected content, before a client or a Grid Server will serve a video stream to a client, it must validate that the requesting client is authorized to receive that video stream. Kontiki uses a token mechanism for this authorization. When a Live Event is created in the Kontiki DMS, a unique token is generated for that particular stream. Then, anytime a clients wants to stream a Live event, that client must first contact a central Authorization Server. The Authorization Server will only give the client the token for the content requested if the client s credentials are verified and the authorization server verifies the end user is in the list of users that are allowed to view the video. When a client then goes to request the stream for either a Kontiki Central Server or another peer, the client will generate a one way hash of the token and send it to the client or server it is requesting the content from. The recipient of the hashed token will then generate a hash of the token it has and will only server content to the requesting client if the hashes are identical. This ensures only authorized client can stream the video even if their only sources of the stream are other clients. 5

6 Protocol Encryption Transfers within the Kontiki DMS (whether between server and client, or from client to client) are performed using either the Kontiki Delivery Protocol () or via SSL over. The is based on industry standards for signatures and encryption. Each message and response is formatted in XML and signed and encrypted using the following standards: Public/private key pairs are generated using RSA algorithms implemented by the OpenSSL library. We use a 1032-bit key pair. Encryption is performed using the Blowfish algorithm implemented by the OpenSSL library with a 128-bit symmetric key. (These keys are encrypted and transferred using the PKI key pair. These 128-bit keys are generated on the fly and only used temporarily during data transfers.) Signatures are based on the SHA-1 hash algorithm, implemented by the OpenSSL library. Signature generation on the Java Web Application servers is implemented in a standard Java Security Provider library. All server and client certificates used by Kontiki DMS are X.509 compliant. The Kontiki Certificate Authority signs one certificate for each DMS system. The system certificate is used to generate a server certificate for each server. If a customer wishes to generate its own server certificates, Kontiki will deliver the system certificate to the customer. The client automatically generates its own public/private key pair on first run, using the RSA algorithm. Clients maintain a trust relationship with the servers in the same way web browsers trust SSL-enabled websites. Every Kontiki client contains the public key of the Kontiki Certificate Authority and uses that to check the servers are using certificates signed by that CA at the top of the chain. After that has been checked the client encrypts every message with the server s public key and signs with its own private key. Content Integrity Clients do not trust each other. They exchange public keys so that they can encrypt the data flowing between them. Then, for every block of a content that a client receives, the client generates its own SHA-1 hash of that block then compares it against SHA-1 hash that is signed by a trusted central server. If any block fails a check, the client will not source anymore data from that peer and will delete the bad blocks. Through this method the system can guarantee a bit-perfect copy of every video stream received by the client machine. 6

7 The End User Experience The end user experience is of paramount importance when it comes to streaming Live video. Although the Kontiki client simply wraps the standard Window Media player for Live video playback, it extends the player s capability by ensuring the user views the appropriate bitrate stream based on the available WAN bandwidth at that user s location. This allows users to participate in a live event regardless of their WAN connectivity limitations. For example, a Live Event can be configured to make three different bitrates available 1Mbps, 450Kbps, and 250kbps. Users in well connected large offices may get the high end stream, while those in regional offices may get the 450Kbps stream, and while users in remote regions may get the 250kbps stream due to their very constrained network links. The Kontiki client will automatically make the correct choice without the user having to decide. In addition to ensure the optimal stream is presented to each location, the built-in client intelligence also monitors system performance in terms of CPU usage and automatically backs off its own activity and slows down its service to other clients to prevent any adverse impact to the local user s desktop experience. Scalability The Kontiki DMS is highly reliable and scales to a very large user base. Featuring a redundant, fault-tolerant architecture with multiple levels of failover and automatic retry of content delivery by clients whenever necessary. Kontiki is currently supporting implementations of over a million users in a single installation. Setting up a Live Event via Kontiki Once the Kontiki client is installed on the desktop of your end users, provisioning a live event via Kontiki can be done in a few simple steps. First, a Windows Media Encoder or a Window Media Streaming server that is the originating source of the Live stream must be made available and must be configured to allow the Kontiki central Grid Servers to pull the stream via. For redundancy, a standby Encoder or Streaming Server should be configured to serve the stream as well. If more than one bit rate of the stream is desired to suite various office bandwidth conditions (e.g. 250kbps, 500kbps, & 1000kbps streams), then these should be provisioned in the Encoder or Streaming Server. Second, a Live Event must be created via the Kontiki Network Publisher application. You ll need to provide name, description, start time, end time as well as the primary and secondary source URLs for each available bit rate. You can also protect the stream by restrict it to a set of groups of users that can view it. Kontiki Network Publisher will then return a special Kontiki URL (K-URL) which is a link to the newly created Live Event. Finally, you ll need to make the K-URL available to the invited users. The link can be sent via , sent in a calendar invite, or embedded as a link on the Corporate Intranet. 7

8 Mechanics of a Live Event Delivery via Kontiki When an end user clicks on K-URL, the Kontiki Client will decides the best bit rate to stream based on each end user s connectivity. Then the Kontiki Client will stream from LAN peers or Kontiki central servers (Grid Servers) if no nearby peers are already streaming it. Kontiki s Grid Server will initiate the stream from Windows Media Encoder or Window Media Streaming Server when first client requests the stream. The Grid Server will pull the stream from via. The Grid Server will automatically fall back to the standby Encoder or Stream Server if the primary source fails. Note, Kontiki can also be used to broadcast a Live Teleconferencing or Telepresence meeting to other viewers who are invited to view the meeting. Data flow for a Live Kontiki Event 1. Provision WM Encoder or WM Streaming server Optionally provision standby Encoder or Streaming Server for redundancy Optionally provision multiple bit rates of the stream to suite various office bandwidth conditions (e.g. 250kbps, 500kbps, & 1000kbps streams) 2. Create Live Event via Kontiki s Network Publisher Specify name, description, start time, end time Specify primary and secondary source URLs for each bit rate Kontiki generates K-URL 3. Send K-URL to end-users 4. User clicks on K-URL Client decides best bit rate to stream based in each user s connectivity Client streams from LAN sources or Central Servers Kontiki s Grid Server will initiate stream from Encoder or Streaming Server when first client requests stream Windows Media Encoder Kontiki Content Servers Windows Media Streaming Server Visit for more information. TEL FAX info@kontiki.com Conclusion Kontiki s Enterprise Video Platform has been used to deliver hundreds of millions of hours of video -- helping our customers reduce their video (and large file) WAN traffic by 90% or more, without deploying any hardware or upgrading their networks. With Kontiki s next-generation delivery solution, every employee can enjoy high-quality video wherever they are in your network (corporate offices, small to medium branch locations, home-based or traveling workers) Kontiki, Inc. All rights reserved WP010

Kontiki Enterprise Content Delivery Network

Kontiki Enterprise Content Delivery Network Kontiki Enterprise Content Delivery Network Best Delivery and Highest Quality Video for All Video is one of the most powerful forms of communication, and one that is increasingly used by leading global

More information

Kontiki Enterprise Video Platform

Kontiki Enterprise Video Platform Kontiki Enterprise Video Platform A Better Way Successful companies engage their organizations using communication that reaches every employee globally and inspires them to work toward a shared vision.

More information

Building Remote Access VPNs

Building Remote Access VPNs Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Technical Brief. VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect

Technical Brief. VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect Technical Brief VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect Copyright 2016 VBrick Systems, Inc. All rights reserved. VBrick Systems, Inc. 2121

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted

More information

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,

More information

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private

More information

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

Site2Site VPN Optimization Solutions

Site2Site VPN Optimization Solutions XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Kollective Technology Overview

Kollective Technology Overview Kollective Technology Overview HOW IT WORKS As enterprise networks have grown in size, complexity and importance, corporate IT often struggles to keep up with the pace of change. Traditional networks,

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

What s New in Interwise Connect V7

What s New in Interwise Connect V7 What s New in Interwise Connect V7 Interwise has been providing leading conferencing and collaboration solutions to enterprises worldwide for 10 years. In that time, a number of world-class, forward-thinking

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

AT&T Connect Video Conferencing Functional and Architectural Overview. v9.5 October 2012

AT&T Connect Video Conferencing Functional and Architectural Overview. v9.5 October 2012 AT&T Connect Video Conferencing Functional and Architectural Overview v9.5 October 2012 Video Conferencing Functional and Architectural Overview Published by: AT&T Intellectual Property Product: AT&T Connect

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Mesh VPN Link Sharing (MVLS) Solutions

Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

CTX OVERVIEW. Ucentrik CTX

CTX OVERVIEW. Ucentrik CTX CTX FACT SHEET CTX OVERVIEW CTX SDK API enables Independent Developers, VAR s & Systems Integrators and Enterprise Developer Teams to freely and openly integrate real-time audio, video and collaboration

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Cisco Digital Media System: Comprehensive. Scalable. Network-Centric.

Cisco Digital Media System: Comprehensive. Scalable. Network-Centric. Cisco Digital Media System: Comprehensive. Scalable. Network-Centric. Executive Summary The Cisco Digital Media System (DMS) is a comprehensive suite of digital signage, Enterprise TV, and desktop video

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Advanced Transportation Management Systems

Advanced Transportation Management Systems Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements

More information

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > White Paper Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > Table of Contents INTRODUCTION................................................... 2 SOLUTION ARCHITECTURE.........................................

More information

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998 Oracle Applications Release 10.7 NCA Network Performance for the Enterprise An Oracle White Paper January 1998 INTRODUCTION Oracle has quickly integrated web technologies into business applications, becoming

More information

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper Product version: 12.1.5 Documentation

More information

Optimizing Networks for NASPI

Optimizing Networks for NASPI Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks

More information

ADVANTAGES OF AV OVER IP. EMCORE Corporation

ADVANTAGES OF AV OVER IP. EMCORE Corporation ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise

More information

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

Silver Peak s Virtual Acceleration Open Architecture (VXOA) Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

Managing Mobile Devices Over Cellular Data Networks

Managing Mobile Devices Over Cellular Data Networks Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

WHITE PAPER. Five Key Factors for Success in Your Business Video Conferencing System. December, 2011. www.nefsis.com

WHITE PAPER. Five Key Factors for Success in Your Business Video Conferencing System. December, 2011. www.nefsis.com WHITE PAPER Five Key Factors for Success in Your Business Video Conferencing System December, 2011 www.nefsis.com 2011 Nefsis Corporation. All Rights Reserved. Nefsis is a registered trademark of Nefsis

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events.

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events. Deciding what event you want to stream live that s the easy part. Figuring out how to stream it? That s a different question, one with as many answers as there are options. Cameras? Encoders? Origin and

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

FortiBalancer: Global Server Load Balancing WHITE PAPER

FortiBalancer: Global Server Load Balancing WHITE PAPER FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

WAN Optimization for Microsoft SharePoint BPOS >

WAN Optimization for Microsoft SharePoint BPOS > White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Global Server Load Balancing APV Series Application Delivery Controllers May 2011 Global Server Load Balancing Access. Security. Delivery. Introduction Scalability, high availability and performance

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

OPTIMIZING THE NETWORK FOR APPLICATIONS

OPTIMIZING THE NETWORK FOR APPLICATIONS OPTIMIZING THE NETWORK FOR APPLICATIONS Intelligent WAN and network optimization technology allow organizations to more effectively use enterprise networks as demands on bandwidth grow. Enterprises use

More information

Get Control of Your Data Center. Application Delivery Controllers

Get Control of Your Data Center. Application Delivery Controllers White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

The Ultimate Guide to Gaining Control of the WAN

The Ultimate Guide to Gaining Control of the WAN LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers

More information

The Next Generation of Wide Area Networking

The Next Generation of Wide Area Networking The Next Generation of Wide Area Networking Introduction As pointed out in The 2014 State of the WAN Report 1, the vast majority of WAN traffic currently uses either the Internet or MPLS. Since the Internet

More information

MILLENNIALS HAVE GROWN up with the ability to produce and consume video

MILLENNIALS HAVE GROWN up with the ability to produce and consume video Preparing Your Enterprise Network for the YouTube Generation Millennials, Video, and CapEx MILLENNIALS HAVE GROWN up with the ability to produce and consume video anytime, anywhere. So as the workforce

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Mediasite for the enterprise. Technical planner: TP-05

Mediasite for the enterprise. Technical planner: TP-05 Mediasite for the enterprise Technical planner: TP-05 2011 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc.

More information

Virtual Private Networks Secured Connectivity for the Distributed Organization

Virtual Private Networks Secured Connectivity for the Distributed Organization Virtual Private Networks Secured Connectivity for the Distributed Organization FORTINET VIRTUAL PRIVATE NETWORKS PAGE 2 Introduction A Virtual Private Network (VPN) allows organizations to securely connect

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

IP Telephony: Reliability You Can Count On

IP Telephony: Reliability You Can Count On WHITE PAPER IP Telephony: Reliability You Can Count On Architecture Matters Table of Contents 1. IP Delivers a Foundation for Reliability...3 2. Compare Three Different Approaches to Delivering Five-Nines

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

The Application Front End Understanding Next-Generation Load Balancing Appliances

The Application Front End Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355 VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Dell Desktop Virtualization Solutions Simplified. All-in-one VDI appliance creates a new level of simplicity for desktop virtualization

Dell Desktop Virtualization Solutions Simplified. All-in-one VDI appliance creates a new level of simplicity for desktop virtualization Dell Desktop Virtualization Solutions Simplified All-in-one VDI appliance creates a new level of simplicity for desktop virtualization Executive summary Desktop virtualization is a proven method for delivering

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All

More information

Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006

Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006 Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006 NeoAccel, Inc. 2055 Gateway Place, Suite 240 San Jose, CA 95110 Tel: +1 (408) 274 8000 Fax: +1 (408) 274 8044 Web: www.neoaccel.com

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

VEMS Mystro Enterprise IP Video

VEMS Mystro Enterprise IP Video VEMS Mystro Enterprise IP Video VEMS Mystro is an extremely powerful and easy-to-use integrated IP video solution, said Russ Scaduto, Director of Education Technology, Milton S. Hershey Medical Center.

More information

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Optimal Network Connectivity Reliable Network Access Flexible Network Management Aggregating Links For Maximum Performance Optimal Network Connectivity Reliable Network Access Flexible Network Management Enterprises are increasingly relying on the internet for delivery of critical

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

Scopia Desktop Server

Scopia Desktop Server Scopia Desktop Server Installation Guide Version 8.2.1 For Solution 8.2 8.2.1 2000-2013 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected

More information

Integrated Application and Data Protection. NEC ExpressCluster White Paper

Integrated Application and Data Protection. NEC ExpressCluster White Paper Integrated Application and Data Protection NEC ExpressCluster White Paper Introduction Critical business processes and operations depend on real-time access to IT systems that consist of applications and

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

Intelligent, Functional and Effective Gateways for Small Business Applications

Intelligent, Functional and Effective Gateways for Small Business Applications Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Kaltura Extension for SharePoint User Manual. Version: Eagle

Kaltura Extension for SharePoint User Manual. Version: Eagle Kaltura Extension for SharePoint User Manual Version: Eagle Kaltura Business Headquarters 200 Park Avenue South, New York, NY. 10003, USA Tel.: +1 800 871 5224 Copyright 2012 Kaltura Inc. All Rights Reserved.

More information

Executive summary. Introduction Trade off between user experience and TCO payoff

Executive summary. Introduction Trade off between user experience and TCO payoff Virtual desktop White Paper How fast is my virtual desktop? Delivering a high definition desktop experience to branch office users with Citrix Branch Repeater DVI www.citrix.com Executive summary Emerging

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information