Software-Defined Multi-Domain Performance Monitoring
|
|
|
- Patricia Fields
- 10 years ago
- Views:
Transcription
1 Software-Defined Multi-Domain Performance Monitoring Prasad Calyam, Ph.D. perfsonar OARnet January 2015
2 Topics of Discussion Today s Applications and Network Monitoring Needs from domain application users Needs for network operators Multi-domain Monitoring Challenges Solution: Science DMZ Use Cases PhysicalTherapy-as-a-Service SoyKB Conclusion 2
3 History H.323 Beacon, Internet2 End-to-End Performance Initiative, E2E pipes, End User / Network Administrator (at Los Angeles requests H.323 session statistics data from Chicago to Los Angeles in Web Format) Beacon Client Network Administrator located at Los Angeles wants to have video conference session with Network Administrator located at Chicago Beacon Client End User / Network Administrator (at Chicago requests H.323 session statistics data from Los Angeles to Chicago in Web Format) Beacon Server (at Sioux Falls POP) Beacon Server Beacon Server (at Los Angeles POP) Beacon Server (at Tampa POP) Beacon Server (at Chicago POP) (at Austin, Texas) H.323 Statistics includes Video Frame Rate, Round Trip Time, Throughput, Video Jitter, Audio Jitter and Packet Loss 3
4 History Number of deployments today are significant, and we need to celebrate! J January
5 Data-intensive Applications Today 5
6 Science DMZ New trend emerging across university campuses to deploy Science DMZs (demilitarized zones) Supports science drivers that involve for e.g., data-intensive applications needing access to remote instruments or public clouds Friction-free flow acceleration using gatekeeper proxy by passing the enterprise firewall Normal Application Campus Network Science Application Campus Access Network IP Network Gatekeeper Proxy Middleware Direct Connect Network Web Application Science Application Public Cloud Instrument Site on Campus Extended VLAN Overlay Software-Defined Network Campus Access Network Science Application Remote Collaborator 6
7 The Future looks more interesting 7
8 User Need for Network Monitoring ADTS Case Study Advanced Data Transfer Service (ADTS) FTP* for data movement in data-intensive applications Uses RoCE (RDMA over Converged Ethernet) protocol High speed application layer protocol that is highly sensitive to packet loss Does not use congestion-control schemes Ferrari car for broadband network roads Direct memory-to-memory transfer *P. Calyam, A. Berryman, E. Saule, H. Subramoni, P. Schopis, G. Springer, U. Catalyurek, D. K. Panda, Wide-area Overlay Networking to Manage Accelerated Science DMZ Flows, IEEE International Conf. on Computing, Networking and Communications (ICNC),
9 We rate-limit our networks inadvertently 10x times slower! Problem: Static Network Policy Management 9
10 Case of a Google Fiber Home in Kansas City 40 Mbps performance on a 1 Gbps access network connection!! Account # xxxxxxxxxxxxx, phone call with customer: 2:38 PM 1/8/2015: 91/92 (HP) 2:40 PM 1/8/2015: 87/91 (Asus) 2:42 PM 1/8/2015: 90/86 (HP) 2:44 PM 1/8/2015: 88/66 (Asus) Checked Speed & Duplex settings of HP device. Changed to Full 1 GBPS setting. 2:49 PM 1/8/2015: 91/92 MBPS (HP) Restarted HP b/c it appeared that Speed & Duplex settings didn't take effect. 2:54 PM 1/8/2015: 94/92 MBPS (HP). CX advised me that he has a 3rd party router installed in between the NB and his PC's. CX asked if this would cause issues. I educated CX that it would b/c some routers will limit speeds to 100 MBPS. I requested the CX bypass the 3rd party router and HW directly to the NB. Only the Asus device could be HW'd directly to the NB. The Asus device is not GIG capable, and would not provide best results. 10
11 Multi-domain Network Monitoring 11
12 Network Operator Need for Network Monitoring 12
13 What does the Red Mean? Need for performance Intelligence end-to-end visibility across multi-domain paths 13
14 Integrated Application and Network Monitoring Users and Network Operators together We use system and network measurements to infer application-level performance & We also use application performance independently to validate system and network performance Closely Integrated In Isolation Need for Programmability ability for flexible measurement scheduling (analogous to SDN) Need for Extensibility ability to add custom metrics of application/network 14
15 OnTimeDetect Tool Anomaly Detection with perfsonar framework Leveraging Uncorrelated (APD scheme) and Correlated Anomaly Detection (Topologyaware scheme) 15
16 OnTimeDetect Tools integration into DOE infrastructure ESnet perfsonar Nagios-plugin for network operations Nagios-plugin for RACF perfsonar Dashboards (e.g., for US Atlas) E-Center Anomaly Detection Service (ADS) for DOE lab sites monitoring Source Code: Nagios/perfSONAR_PS-Nagios/ 16
17 Integration in ESnet s perfsonar Nagios Plugins Usage: check_apd_throughput.pl -u --url <service-url> -s --source <source-addr> -d --destination <dest-addr> -b --bidirectional - r <number-seconds-in-past> -z -- sensitivity <Value> -W --swc <window-size> -w --elevation1 <elevation1-threshold> -c -- elevation2 <elevation2-threshold> -a --algorithm <algorithmselection> -o --output-file Sample Output:./check_apd_throughput.pl -u perfsonar_ps/services/psb -r w 0.2 -c 0.5 -s d PS_CHECK_THROUGHPUT CRITICAL - Metric is Throughput Source: Destination: {Critical{ : e +08Gbps};Warning{ : e+08Gbps};} TotalDatum(ForwardDirection)=200;; OK=178;; WARNING=1;; CRITICAL=1;; 17
18 Adaptive Plateau Detector (APD) APD detects uncorrelated anomalies in measurement data obtained through perfsonar MA web-services Performs better than using Static Plateau Detection (SPD) thresholds 18
19 Topology-Aware Correlated Anomaly Detection 19
20 Common Hop Analysis Common Hop Matrix (>65%) 20
21 Common Event Analysis Common Event Matrix (>70%) 21
22 Ranking critical anomaly events SPD (Static) 2 weeks APD (Adaptive) 3 Months Noisy grid due to SPD s high false alarms APD s accurate detection improves NTA-CAD grids usability 22
23 Data Sanity Checking and Certainty Analysis Importance of measurement tool calibration Low Certainty with Anomaly Event High Certainty without Anomaly Event Certainty verification in cases of presence/absence of anomaly events 23
24 OnTimeSecure: Resource Protection in perfsonar Need for Resource Protection Security prevent abuse of monitoring infrastructure 24
25 Case Study: Secured Middleground in a Multi-campus Testbed Importance of deciding your security and data/information sharing posture Measurement federation across campuses using Internet2 InCommon Risk assessment and threat modeling study using the NIST method Open-pS compared with RPS-pS (RBAC and ABAC) 25
26 Topics of Discussion Today s Applications and Network Monitoring Needs from domain application users Needs for network operators Multi-domain Monitoring Challenges Solution: Science DMZ Use Cases PhysicalTherapy-as-a-Service SoyKB Conclusion 26
27 Putting it all together Software-defined Measurement and Monitoring 5 principles of Intelligent Extensible Programmable Secure Social Easy to use! DOE STTR Phase I & II project in collaboration with Samraksh, Dublin OH 27
28 Sign-up for FREE Trial 28
29 Architecture Metrics Throughput Central Intelligence System Delay Jitter Push Service Measurement Orchestration Service Centralized Control Conflict-free Measurements Automated Discovery Control API Loss MOS Video Client Measurement Point Appliance 1 Test Using Selected Metric Collector API Archive API Measurement Analysis Service Anomaly Detection Comparison Measurement Presentation Service Dashboard Event Notifications Data Management Service Archive Results Filter Manager HTML5 Query API Command Line Tool Web Interface VDMS: Clients, Network Operators, Third-Party tools Measurement Point Appliance 2 Protected by the Resource Protection Service Policy Federated Policy Engine Templates IAM Archive Appliance 29
30 Interoperable with perfsonar Interoperable with perfsonar Can test to perfsonar measurement points from Narada Metrics MPA s and vice versa; query data into custom dashboard 30
31 Custom Dashboard Measurement Requests Measurement Point Appliance Setup policies for Measurement Data/Resource Sharing with other domains 31
32 Automated MPA MPA Discovery Discovery and in Management CIS Custom Metric Integration Measurement Federation Portal Programmable Interface 32
33 Topics of Discussion Today s Applications and Network Monitoring Needs from domain application users Needs for network operators Multi-domain Monitoring Challenges Solution: Science DMZ Use Cases PhysicalTherapy-as-a-Service SoyKB Conclusion 33
34 MU Science DMZ! 34
35 MU OSU Dual-ended Science DMZs Performance Engineer Gatekeeper Proxy Middleware Service Engine Routing Engine Measurement Engine 1. Define application end-points and monitoring objectives Authenticated Researcher 2. Provision policy-directed flow rules OpenFlow Controller Legend: Data Flow Control Flow 3. Install HTC flow 3. Install HTC flow 3. Install measurement flow 4. Authorized HTC flow Campus-A Edge Non-IP Network Campus-B Edge 4. Authorized measurement flow Imaging Microscope Extended VLAN Overlay 4. Non-Science DMZ flow Image Processing Cluster Campus-A Firewall IP Network Campus-B Firewall 35
36 MU s PhysicalTherapy-as-a-Service 36
37 More than videoconferencing PT Home In-home patient view Home PT Clinic Physical therapist view 37
38 Synchronous Big Data Problem 38
39 Narada Metrics Integration with PTaaS 39
40 Troubleshooting Google Fiber! When everything works with static IP The 40 Mbps mystery!! 40
41 Importance of vantage points for perfsonar Fun of working with ISPs and Users together J MU<->KC = 12 Mbps MU<->OSU = 360 Mbps KC Home to = 50 Mbps MU to = 347 Mbps MU to = 350 Mbps OSU to = 840 Mbps 41
42 Route path from KC to MU 1 <1 ms <1 ms <1 ms networkbox.home [ ]? 2 1 ms 1 ms 2 ms ? 3 1 ms 1 ms 1 ms ae9.bng01.mci122.googlefiber.net [ ]? 4 1 ms 1 ms 1 ms ae1.pr01.mci103.googlefiber.net [ ] 1x10G 5 3 ms 2 ms 3 ms kc-core-01-tengige mo.more.net [ ] 1x10G 6 1 ms 2 ms 1 ms umicn-kc-tengige um.more.net [ ] 1x10G 7 6 ms 4 ms 4 ms umicn-cn-tengige um.more.net [ ] 1x10G 8 12 ms 6 ms 4 ms umc-nn-i2.bb.missouri.edu [ ] 2x10G 9 4 ms 4 ms 4 ms SOLO-xe bb.missouri.edu [ ] 2x10G 10 4 ms 10 ms 13 ms TEXUS3-SOLO-area0.bb.missouri.edu [ ] 2x10G 11 4 ms 4 ms 4 ms RSCT1-TEXUS3.bb.missouri.edu [ ] 2x10G 12 4 ms 4 ms 4 ms RSCN1-v300.bb.missouri.edu [ ] 1x10G 13 6 ms 4 ms 4 ms ecaas1.rnet.missouri.edu [ ] 1Gig host Bottleneck segment? 42
43 MU s SoyKB 43
44 Narada Metrics Integration with SoyKB 44
45 Expectation Management L3 performance L2 performance Setup patrol checks to verify expectations 45
46 Conclusion Sign-up for FREE trial of Software-defined monitoring for application users and network operators Welcome to contact me for more discussions! J [email protected] 46
47 Thank you for your attention! 47
Software-Defined Networking
Software-Defined Networking Prasad Calyam, Ph.D. Spring 2014 VIMAN Lab Cloud Computing Research http://people.cs.missouri.edu/~calyamp Cloud Resource Allocation Computer and network virtualization models,
UNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
GENI Laboratory Exercises for a Cloud Computing course
GENI Laboratory Exercises for a Cloud Computing course Prasad Calyam, Ph.D. Assistant Professor, Department of Computer Science GEC19, March 2014 Cloud Computing Challenges? Pricing/Billing Scalability
Cisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
MRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
MRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper
White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G
LHCONE Site Connections
LHCONE Site Connections Michael O Connor [email protected] ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes
ANI Network Testbed Update
ANI Network Testbed Update Brian Tierney, ESnet, Joint Techs, Columbus OH, July, 2010 ANI: Advanced Network Initiative Project Start Date: September, 2009 Funded by ARRA for 3 years Designed, built, and
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Blue Planet. Introduction. Blue Planet Components. Benefits
Blue Planet Introduction Cyan Blue Planet is the first Software- Defined Network (SDN) and Network Function Virtualization (NFV) platform purpose- built for service providers and the wide area network.
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
OnTimeDetect: Offline and Online Network Anomaly Notification Tool
OnTimeDetect: Offline and Online Network Anomaly Notification Tool Prasad Calyam, Ph.D. [email protected] Other Team Members: Jialu Pu, Weiping Mandrawa Network Tools Tutorial Session, Internet2 Spring Member
Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923)
Datasheet: Visual Performance Manager and TruView Advanced MPLS Package with VoIPIntegrity (SKU 01923) Key Features: The everything software bundle for application aware network monitoring for remote sites
Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013
Copyright 2013 Vivit Worldwide Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Brought to you by Vivit Cloud Builders Special Interest Group (SIG) Jim Murphy Cloud
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services
The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
IEEE Congestion Management Presentation for IEEE Congestion Management Study Group
IEEE Congestion Management Presentation for IEEE Congestion Management Study Group Contributors Jeff Lynch IBM Gopal Hegde -- Intel 2 Outline Problem Statement Types of Traffic & Typical Usage Models Traffic
Ten Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
Huawei esight Brief Product Brochure
Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Empirix OneSight for VoIP: Avaya Aura Communication Manager
Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start?
Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist Technology Services Mobility & Networking Forward-looking statements
Security threats and network. Software firewall. Hardware firewall. Firewalls
Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Any-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50
Question: 1 Which network security strategy element refers to the deployment of products that identify a potential intruder who makes several failed logon attempts? A. test the system B. secure the network
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Software Defined Networks Virtualized networks & SDN
Software Defined Networks Virtualized networks & SDN Tony Smith Solution Architect HPN 2 What is Software Defined Networking Switch/Router MANAGEMENTPLANE Responsible for managing the device (CLI) CONTROLPLANE
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing
When SDN meets Mobility
When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any
Business Cases for Brocade Software-Defined Networking Use Cases
Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Transformation of the enterprise WAN with dynamic-path networking
Transformation of the enterprise WAN with dynamic-path networking Greg Ferro November 24, 2014 This report is underwritten by Sonus Networks. TABLE OF CONTENTS Executive summary... 3 How dynamic-path networking
Cisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Enterprise Energy Management with JouleX and Cisco EnergyWise
Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy
Software Defined Networking for big-data science
Software Defined Networking for big-data science Architectural models from campus to the WAN Inder Monga, Eric Pouyoul, Chin Guok Energy Sciences Network Lawrence Berkeley Lab Berkeley, California {inder,
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
REMOTE MONITORING MATRIX
802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Extreme Networks: A SOLUTION WHITE PAPER
Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Simplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
VIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
Software-Defined Networks (SDN): Bridging the application-network divide
Software-Defined Networks (SDN): Bridging the application-network divide Inder Monga Chief Technologist and Area Lead, Engineering, Research and Software development CHEP 2013 Shared historical moment
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services
WHITE PAPER Infoblox IPAM Integration with Microsoft AD Sites and Local Services Infoblox IPAM Integration with Microsoft AD Sites and Local Services Today s enterprise infrastructure is dynamic, with
Network performance monitoring Insight into perfsonar
Network performance monitoring Insight into perfsonar Szymon Trocha, Poznań Supercomputing and Networking Center E-infrastructure Autumn Workshops, Chisinau, Moldova 9 September 2014 Agenda! Network performance
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Tier3 Network Issues. Richard Carlson May 19, 2009 [email protected]
Tier3 Network Issues Richard Carlson May 19, 2009 [email protected] Internet2 overview Member organization with a national backbone infrastructure Campus & Regional network members National and International
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES Brian Levy CTO SERVICE PROVIDER SECTOR EMEA JUNIPER NETWORKS CIO DILEMA IT viewed as cost center
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
New Virtual Application Networks Innovations Advance Software-defined Network Leadership
New Virtual Application Networks Innovations Advance Software-defined Network Leadership Simplifying, Scaling and Automating the Network Gartner Hype Cycle 10 Year Cycle 2008 2011 2012 2 Source: Gartner
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
Deploying distributed network monitoring mesh
Deploying distributed network monitoring mesh for LHC Tier-1 and Tier-2 sites Phil DeMar, Maxim Grigoriev Fermilab Joe Metzger, Brian Tierney ESnet Martin Swany University of Delaware Jeff Boote, Eric
