An Architecture for Concurrent Future Networks
|
|
|
- Evangeline Adams
- 10 years ago
- Views:
Transcription
1 An Architecture for Concurrent Future Networks Future Internet 2008 Karlsruhe, Lars Völker, Denis Martin, Ibtissam El Khayat, Christoph Werle, Martina Zitterbart (Universität Karlsruhe (TH) / Ericsson GmbH) Motivation 4WARD-Project: Let 1000 networks bloom Network Virtualization Vast amount of (virtual) networks User might have multiple Networks side-by-side How can we do this? How can we run multiple networks? What must a node look like? How do we connect an application to the correct network? What about Security, QoS, and Mobility? Rapid creation of such networks? 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 2
2 Definitions Just to make life easier for us Network Architecture A common understanding within a network. Usually involves common protocols as well as naming and addressing. Network Architect Designer of networks and/or network architectures. 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 3 Structure of this talk Motivation Definitions Node Architecture at a glance Important Concepts of the Node Architecture Node Architecture put together Rapid creation with the Design Process Conclusion and Outlook 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 4
3 Node Architecture at a glance Simplified version App App App as Protocol Container Selection Architecture-specific Multiplexer Network Access Virtual or physical Networks Network Access Manager NA Multiplexer Network Access Manager NA NA Node Management Network Accesses (physical or virtual) 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 5 The A container for Future Internet protocols ( Protocol Stack) Is usually based on one Network Architecture Fits usually just one Network Architecture NAI has to be compatible to Network Architecture AI Control Data NAI Application Interface (AI) Tuning Interface (TI) Data Control Network Access Interface (NAI) depends on Net. Architecture Could be build many different ways: Writing Code, Code Generation, 3rd party, Composition, AI Interop connects multiple Network Architectures Data NAI Control Data NAI Control 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 6
4 Application Interface Moving forward from the Socket API Today s interfaces to the applications (e.g. Socket API) have drawbacks Peer is described by address and not by name Usually simple name resolution rule (e.g. IPv6 first, IPv4 second) With 1000 networks, choice of the network important! Applications might have requirements on communication! Please protect this connection Needed changes: Move name resolver from application to system Allow application to influence choice of network with requirements 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 7 Network Access Interface Transparently support Network Virtualization With 1000 networks, many of them will be virtual networks! That means: Virtual Networks won t be special Possibly the common case The Network Access Interface Hides the differences of physical and virtual networks Supports the description of the underlying network e.g., latency, energy consumption, cost Triggers of network events So the selection of s could also be based on the network properties 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 8
5 Automatic Selection Choosing the best With 1000 networks the user cannot just manually choose the network! Idea: Let application, user, and administrator describe requirements/goals Description of underlying network Estimate the s behavior Rank the s based on this This is based on Multi Attribute Utility Theory (MAUT) and [1] [1] Lars Völker, Christoph Werle, Martina Zitterbart, Decision Process for Automated Selection of Security Protocols, 33nd IEEE Conference on Local Computer Networks (LCN 2008), IEEE, p , Montreal, QB, Canada, Oct /11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 9 Criteria To determine what s best we need to describe s! We looked at several criteria, here some examples Criteria Security QoS Energy Consump. Effective Bit Strength Protocol Properties Latency Latency Jitter Throughput Overhead 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 10
6 Calculating total value How to aggregate the criteria to overall utility: 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 11 Value Functions Function to translate the individual criteria s values to a (generic) utility This function has to fit to the criterion Each criterion could have a specific value function It should be adaptable A possible Value Function for Latency 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 12
7 Strength of Security!? Determine Effective Bit Strength (EBS) of involved cryptographic primitives: Authentication, Key Exchange, Encryption, Message Authentication Aggregate those EBS values using the Min-Function EBS Utility Value Value is not linear for most users 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 13 Influencing the Decision Process Value functions Can be replaced and/or adjusted Weights Put criteria into proportion Requirements Describe which values are ok for criterion Works also for qualitative criteria 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 14
8 Design Time (Offline) Run Time Node Architecture Application AR AR UP Application requirements User policies for network selection Selection Name & Addr Mapper Decision Engine UP Creator Tuning / Optimization Agent Opt Cache Management Multiplexer Repository NA Manager Logical View of Node NA NA NA Network Accesses 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 15 Design Process Accelerating the Creation of s Iterative process aiding the future network architect to design new networks The network architect will start with his own requirements and will refine them during the process He will derive a Blue Print for the network architecture s components and functionalities With this Blue Print Components of the network architecture can be implemented (if not using standard components already existing on the market) Network topologies can be designed by network administrators 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 16
9 Requirements (Meta) Modeling Network Architect Building blocks, Components, Architecture patterns Design Design Process (including iterations) Guidelines, building blocks Composition of functionality Interoperability 4WARD Architecture Framework Blue Print of network architecture Implementation 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 17 Conclusion / Benefits Create a new network architecture if needed Every virtual network can have their own You could even have applications come with their own Has to be a simple process! The Design Process enables this s can be treated as almost arbitrary black boxes Approaches like RNA and SILO can run in a We try to not introduce too many invariants Allow for future development Choosing the and Network Architecture dynamically 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 18
10 Thank you for your attention Dipl.-Inform. Lars Völker Zirkel 2 Geb Karlsruhe Tel.: Fax: [email protected] Peter Baumung The Project Website: 11/11/2008 GI/ITG Future Internet 2008 Karlsruhe WP2/Slide 19
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
The Sierra Clustered Database Engine, the technology at the heart of
A New Approach: Clustrix Sierra Database Engine The Sierra Clustered Database Engine, the technology at the heart of the Clustrix solution, is a shared-nothing environment that includes the Sierra Parallel
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
REDEFINING THE ENTERPRISE OS RED HAT ENTERPRISE LINUX 7
REDEFINING THE ENTERPRISE OS RED HAT ENTERPRISE LINUX 7 Rodrigo Freire Sr. Technical Account Manager May 2014 1 Roadmap At A Glance CY2010 CY2011 CY2012 CY2013 CY2014.0 RHEL 7 RHEL 5 Production 1.1.0 RHEL
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
Performance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
Components and Concepts of the Ambient Networks Architecture
Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,
Business transformation with Hybrid Cloud
Business transformation with Hybrid Cloud Presenter : Hoang Hung Cloud Business Development Manager Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Roland Bless, [email protected]. Stephan Baucke Ericsson Research
Network Virtualization within FP7 EU Project 4WARD Network of the Future Roland Bless, [email protected] Institute of Telematics, University of Karlsruhe Stephan Baucke Ericsson Research 1 4WARD Overview
ARIS 9 Highlights and Outlook
ARIS 9 Highlights and Outlook Karl Wagner Senior Vice President ARIS R&D 2013 Software AG. All rights reserved. ARIS at a Glance 2M END FIRST BPA Solution 25 SUCCESS LEADER YEARS OF 10,000 CUSTOMERS USERS
Ariba: A Framework for Developing Decentralized Services
Ariba: A Framework for Developing Decentralized Services Christian Hübsch, Christoph P. Mayer, and Oliver P. Waldhorst NGN Service Delivery Platforms and Service Overlays, 13. November 2009, Berlin Institute
ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed
ASPERA HIGH-SPEED TRANSFER SOFTWARE Moving the world s data at maximum speed PRESENTERS AND AGENDA PRESENTER John Heaton Aspera Director of Sales Engineering [email protected] AGENDA How Cloud is used
Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
The Evolution of Cloud Storage - From "Disk Drive in the Sky" to "Storage Array in the Sky" Allen Samuels Co-founder & Chief Architect
The Evolution of Cloud Storage - From "Disk Drive in the Sky" to "Storage Array in the Sky" Allen Samuels Co-founder & Chief Architect Cloud Storage Definition Not clustered NAS rebadged Not private cloud
CCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014
CCN CCNx 1.0 Internet of Things Architectural Overview Computer Science Laboratory Networking & Distributed Systems March 2014 CCN IoT Platform Accomodate multiple IoT protocols Improve performance and
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
Sentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
ABC of Storage Security. M. Granata NetApp System Engineer
ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection
Using Story Points to Estimate Software Development Projects in the Commercial Phase
Using Story Points to Estimate Software Development Projects in the Commercial Phase Accurately estimating a software development project s total effort is an essential step to providing your customer
Software-defined Storage Architecture for Analytics Computing
Software-defined Storage Architecture for Analytics Computing Arati Joshi Performance Engineering Colin Eldridge File System Engineering Carlos Carrero Product Management June 2015 Reference Architecture
Donky Technical Overview
Donky Technical Overview This document will provide the reader with an overview of the features offered and technologies used with the Donky Messaging Network. This document will give a good base level
EMC IRODS RESOURCE DRIVERS
EMC IRODS RESOURCE DRIVERS PATRICK COMBES: PRINCIPAL SOLUTION ARCHITECT, LIFE SCIENCES 1 QUICK AGENDA Intro to Isilon (~2 hours) Isilon resource driver Intro to ECS (~1.5 hours) ECS Resource driver Possibilities
.NET and J2EE Intro to Software Engineering
.NET and J2EE Intro to Software Engineering David Talby This Lecture.NET Platform The Framework CLR and C# J2EE Platform And Web Services Introduction to Software Engineering The Software Crisis Methodologies
Deploying telecom-grade products in the cloud
30 Deploying telecom-grade products in the cloud 284 23-3182 Uen Gone are the days when the cloud was simply considered to be extra and unreliable computing capacity. Today it has developed to become the
IRTF Network Virtualization BAR-BOF
IRTF Network Virtualization BAR-BOF 72th IETF Minneapolis, MN, USA November 20, 2008 Discussions: Session chair: [email protected] Martin Stiemerling (NEC & University of Göttingen) [email protected]
Secure and Semantic Web of Automation
Secure and Semantic Web of Automation Wolfgang Kastner 1, Andreas Fernbach 1, Wolfgang Granzer 2 1 Technische Universität Wien 2 NETxAutomation Software GmbH Automation Systems Group Computer Engineering/Software
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
Eliminating End User and Application Downtime. Continuous Availability for your Business Applications
Eliminating End User and Application Downtime Continuous Availability for your Business Applications March 2010 Table of Contents Introduction... 3 Availability vs. Ecosystem Availability... 3 Cost, Complexity,
Sentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
The Design and Implementation of the Zetta Storage Service. October 27, 2009
The Design and Implementation of the Zetta Storage Service October 27, 2009 Zetta s Mission Simplify Enterprise Storage Zetta delivers enterprise-grade storage as a service for IT professionals needing
ITU-T Future Networks and Its Framework of Virtualization
ITU-T Future Networks and Its Framework of Virtualization Ziaul Ain Usmani 1, Dr. Gulabchand K. Gupta 2 1 Research Scholar, JJT University, Jhunjhunu, Rajasthan, India 2 Western College of Commerce and
Blue Planet. Introduction. Blue Planet Components. Benefits
Blue Planet Introduction Cyan Blue Planet is the first Software- Defined Network (SDN) and Network Function Virtualization (NFV) platform purpose- built for service providers and the wide area network.
How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
A Distributed Approach to Business Intelligence Systems Synchronization
A Distributed Approach to Business Intelligence Systems Synchronization Vlad Ciobanu, Florin Pop, Decebal Popescu, Valentin Cristea Computer Science Department, Faculty of Automatic Control and Computers
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Application Monitoring Maturity: The Road to End-to-End Monitoring
Application Monitoring Maturity: The Road to End-to-End Monitoring Robert Cheung ITCAM for Transactions Australian Development Lab What is Composite Application Monitoring? Composite Application is N-tiered
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Oracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts
Chapter 2 Introduction to Distributed systems 1 Chapter 2 2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts Client-Server
Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
Policy-based Pre-Processing in Hadoop
Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden [email protected], [email protected] Abstract While big data analytics provides
Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
Charter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
SAVI/GENI Federation. Research Progress. Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria.
SAVI/GENI Federation Research Progress Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria. Canada Outline Introduction SAVI/GENI Federation objectives Work Involved
Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine
Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
GigaSpaces Real-Time Analytics for Big Data
GigaSpaces Real-Time Analytics for Big Data GigaSpaces makes it easy to build and deploy large-scale real-time analytics systems Rapidly increasing use of large-scale and location-aware social media and
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center A NEW NETWORK PARADIGM What do the following trends have in common? Virtualization Real-time applications
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Cisco Wide Area Application Services (WAAS) Software Version 4.0
Cisco Wide Area Application Services () Software Version 4.0 Product Overview Cisco Wide Area Application Services () is a powerful application acceleration and WAN optimization solution that optimizes
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Cisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
Figure 1: Illustration of service management conceptual framework
Dagstuhl Seminar on Service-Oriented Computing Session Summary Service Management Asit Dan, IBM Participants of the Core Group Luciano Baresi, Politecnico di Milano Asit Dan, IBM (Session Lead) Martin
Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization
Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization A Riverbed whitepaper Riverbed participated in an early Microsoft TAP program to validate interoperability for Exchange
Generalised Socket Addresses for Unix Squeak 3.9 11
Generalised Socket Addresses for Unix Squeak 3.9 11 Ian Piumarta 2007 06 08 This document describes several new SocketPlugin primitives that allow IPv6 (and arbitrary future other) address formats to be
Cloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11
Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!
Collaboration. Michael McCabe Information Architect [email protected]. black and white solutions for a grey world
Collaboration Michael McCabe Information Architect [email protected] black and white solutions for a grey world Slide Deck & Webcast Recording links Questions and Answers We will answer questions at
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
How Network Operators Do Prepare for the Rise of the Machines
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
NEW BSS ARCHITECTURE. Michael Levitin June 2015
NEW BSS ARCHITECTURE Michael Levitin June 2015 CONTENT Actual state of BSS at the beginning of 2012 year Setting targets for improvement BSS architecture The solution of defined tasks Reached result 2
Network Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
Enterprise Integration using AssetWise
Enterprise Integration using AssetWise Hilmar Retief, Product Manager Bentley Systems What you ll learn today How to ensure that all affected information is taken into account when planning and managing
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
SDN Testbed Experiences: Challenges and Next Steps
SDN Testbed Experiences: Challenges and Next Steps SDN Concertation Workshop January 30 th, 2014 Daniel King [email protected] Panagiotis Georgopoulos [email protected] Nicholas Race
Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015
Transport SDN Toolkit: Framework and APIs John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit Providing carriers with essential tools in the Transport SDN toolkit How to apply SDN to a
In Memory Accelerator for MongoDB
In Memory Accelerator for MongoDB Yakov Zhdanov, Director R&D GridGain Systems GridGain: In Memory Computing Leader 5 years in production 100s of customers & users Starts every 10 secs worldwide Over 15,000,000
Realizing the next step in storage/converged architectures
Realizing the next step in storage/converged architectures Imagine having the same data access and processing power of an entire Facebook like datacenter in a single rack of servers Flash Memory Summit
Workspace & Storage Infrastructure for Service Providers
Workspace & Storage Infrastructure for Service Providers Garry Soriano Regional Technical Consultant Citrix Cloud Channel Summit 2015 @rhipecloud #RCCS15 The industry s most complete Mobile Workspace solution
MDM for the Enterprise: Complementing and extending your Active Data Warehousing strategy. Satish Krishnaswamy VP MDM Solutions - Teradata
MDM for the Enterprise: Complementing and extending your Active Data Warehousing strategy Satish Krishnaswamy VP MDM Solutions - Teradata 2 Agenda MDM and its importance Linking to the Active Data Warehousing
BT 21CN Network IPv6 Transformation
BT 21CN Network IPv6 Transformation Mircea Pisica IP and Data Architect 21CN, Global Networks & Computing Infrastructure BT Innovate and Design 14 Dec 2010 Ghent Belgium Agenda BT 21CN Overview IPV6 on
ENOVIA V6 Architecture Performance Capability Scalability
ENOVIA V6 Technical Advantages Whitepaper ENOVIA V6 Architecture Performance Capability Scalability a Product Lifecycle Management Whitepaper Prepared by ENOVIA, a Dassault Systèmes Brand Executive Summary
Oracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
Copyright 2011, Storage Strategies Now, Inc. All Rights Reserved.
Likewise Storage Services provides OEM NAS developers with file services and security Linux and Unix appliances can provide full file, identity and security services for Windows clients By James E. Bagley
Best Practices for Implementing Oracle Data Integrator (ODI) July 21, 2011
July 21, 2011 Lee Anne Spencer Founder & CEO Global View Analytics Cheryl McCormick Chief Architect Global View Analytics Agenda Introduction Oracle Data Integrator ODI Components Best Practices Implementation
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
