Leveraging Virtualization Technology for Command and Control Systems Training
|
|
|
- Conrad Patrick
- 10 years ago
- Views:
Transcription
1 Approved for Public Release: Distribution Unlimited. Leveraging Virtualization Technology for Command and Control Systems Training Mr. Joseph Connery, Jr. NORAD and USNORTHCOM/J Vandenberg St, Suite B-016 Peterson AFB, CO Abstract The North American Aerospace Defense Command (NORAD) and United States Northern Command (USNORTHCOM) (N-NC) crew training has been hindered by an inability to conduct dynamic training and exercises on multiple Command and Control (C2) systems. There was no common simulation injector because of stove-piped acquisitions and legacy interfaces that were incompatible with the Live-Virtual-Constructive Toolkits. The N-NC Joint Training and Exercise Directorate could not afford traditional replication or emulation of all C2 systems and their data sources, nor the inevitable sustainment costs. This paper presents a cost-effective solution to provide dynamic scenario injection into multiple C2 systems: leveraging server and desktop virtualization technology described in previous I/ITSEC papers. The virtualization process transforms stand-alone systems into functionally equivalent virtual machines (VMs). Server virtualization technology lets multiple VMs run as guests on a single host, and a host can support VMs running different operating systems. This allows entire processing strings, distributed throughout North America, to be converted into VMs on a single server. Because the VMs inherit the fidelity of the actual processors, their outputs are as authentic as the operational systems. These VMs feed processed simulation event data into actual C2 systems or equivalent VMs. Future operational system upgrades can be virtualized and then replace existing VMs without changing this infrastructure. Desktop virtualization technology allows users to run multiple VMs in separate windows on a common display. N- NC exploited desktop virtualization to simplify the trainee and model operator s workspaces. They can view and manage multiple VMs with one monitor, keyboard and mouse (controlling simulations, lower echelon processing and operator interaction, and viewing C2 workstation displays). N-NC successfully leveraged server and desktop virtualization to overcome training shortfalls with authentic processing and display of dynamic simulation data. This approach can be used as an archetype for a variety of testing, training, or operational uses. About the Author Mr. Joseph Connery, Jr., from The MITRE Corporation, is the senior systems engineer for the Modeling and Simulation Branch, Joint Resources and Readiness Division, Joint Training and Exercise Directorate, NORAD and USNORTHCOM, Peterson AFB, Colorado. He has been responsible for designing and deploying distributed, multiechelon training and exercise capabilities across all NORAD C2 mission systems since Mr. Connery s professional experience includes over 30 years of DoD system acquisition, engineering and testing, while active duty Air Force and with the MITRE Corporation. He was the Lead Engineer for integrating Space, Intelligence, Air and Missile Warning mission systems into NORAD s Cheyenne Mountain underground complex. Mr. Connery was an Assistant Professor at the United States Air Force Academy and program manager at Strategic Air Command Headquarters. Mr. Connery holds a BS in Electrical Engineering from the USAF Academy and an MS in Electrical Engineering from California Institute of Technology
2 Leveraging Virtualization Technology for Command and Control Systems Training BACKGROUND The North American Aerospace Defense Command (NORAD) and United States Northern Command (USNORTHCOM) (N-NC) Joint Training and Exercise Directorate s Modeling and Simulation Branch has been updating the simulation injection capabilities into legacy and emerging Command and Control (C2) systems. These enhanced simulation capabilities will allow the warfighters to better train for the NORAD and USNORTHCOM missions. The NORAD and USNORTHCOM Command Center (N2C2) Training Program consists of four phases: 1) Initial Qualification Training (QT), 2) Mission Qualification Training, 3) Certification, and 4) Continuation Training with NORAD Regions, USNORTHCOM Subordinate, Component, and Supporting Commands, and Interagency partners. QT for all NORAD mission crews is conducted in an isolated training facility, and includes hands-on interaction with a limited set of the Command s legacy systems. Following QT, the students transition to On-the-Job Training in the operational N2C2 and learn to use their complete set of C2 systems. N2C2 Operations is not staffed with extra crews, which could allow the operators to go to an off-site location for crew proficiency training and exercises. This forces crews to train at their operational workstations during lulls in real-world activities. Common technical solutions for this training would either be a separate, but co-located, training system or a training capability integrated into the operational system (Simulation-over-Live). Either approach may not interfere unduly with ongoing operations, or require a bigger footprint of displays, keyboards and mice. Figure 1 shows the overall goal of conducting local training and exercises by capitalizing on the Department of Defense Service Modeling and NORAD mission: to conduct aerospace warning, aerospace control, and maritime warning in the defense of North America. USNORTHCOM mission: partner to conduct homeland defense, civil support, and security cooperation to defend and secure the United States and its interests. (N-NC 2011) Simulation Training Toolkits to stimulate all of NORAD and USNORTHCOM missions C2 systems (NORAD 2011). Figure 1. Simulations to N2C2 Missions C2 Systems (N-NC 2010) The initial focus of the Modeling and Simulation Branch was to upgrade the Air Domain training and exercise capabilities. Their Initial Qualification, Mission Qualification and Certification training historically relied on scenarios for the Air Mission Evolution (AME) C2 system. These scenarios contained events ranging from a hijacked airliner to mass bomber raids. Because of the high cost and lengthy development time, there were a limited set of these scenarios, and they were static replaying the same events each time. Further, AME was not designed to interface with dynamic injections from any of the Services Joint Live, Virtual, and Constructive (JLVC) Toolkit simulation capabilities. N2C2 crews regularly documented the lack of dynamic scenarios as a training shortfall. To address shortfalls, the Modeling and Simulation Branch contracted for changes to the Air Warfare Simulation (AWSIM) Toolkit s database and to output unique messages used by AME. Also, AME s stove-piped communications system required the development of a specialized interface adapter to inject simulation-tagged data. These changes provided a path to conduct local training with dynamic scenarios, and met the objective of Train as you Fight by training on the real AME system in the N2C2.
3 CHANGING C2 SYSTEMS AND NEW CHALLENGES The initial training enhancement efforts had to be reevaluated when NORAD changed the priority of Air Domain C2 systems in AME went from primary, and almost exclusive use, to a tertiary role. The other two higher priority C2 systems are the Remote Tactical Air Picture (RTAP) and Global Command and Control System (GCCS). Operationally, the source of data to all three of these C2 systems is from the Battle Control Systems (BCS), located at the four NORAD Sectors in Alaska, Canada, Western US, and Eastern US. The basic source of the data did not change, but the crews were directed to use different systems and displays to conduct their missions. The inability to locally stimulate these systems with scenario data became a significant training limitation in both the IQT facility and N2C2. One of the new systems is the Remote Tactical Air Picture (RTAP). This C2 system provides NORAD and USNORTHCOM Headquarters with a more detailed and timely view of tactical air events. The need for a tactical view is because of the post-9/11 homeland defense missions. Domestic events (i.e., hijacking or entering restricted airspace) often have shorter timelines, compared to strategic bomber attack by long-range aircraft. However, RTAP cannot accept local injection of simulation-tagged scenario data and is too complex to emulate. The option to purchase a separate training suite was cost prohibitive, and simply could not fit into the existing server room. The second priority suite of C2 tools includes Global Command and Control System (GCCS), its Integrated C4I System Framework (ICSF) display client, and an associated Track of Interest (TOI) Tracker. GCCS is the Common Operational Picture and is used to share data with other Combatant Commanders. TOI Tracker extracts some information from the GCCS server database to populate a new decision support information display. With re-prioritization, the new challenge was to provide realistic, dynamic training with events synchronously delivered to these three C2 systems while constrained to the same operator workstation footprint in the command center. The Modeling and Simulation Branch met this challenge by taking advantage of the common data source, BCS. We shifted away from AWSIM emulating the inputs into the AME C2 systems. Instead, we focused on using JLVC Toolkit to stimulate a BCS with simulation data, and sending outputs from its processing into our systems. With this approach, the BCS processing and outputs would be authentic, and BCS s simulation-tagged outputs become the inputs to RTAP, GCCS and AME. To afford the proposed authentic processing, we exploited server and desktop virtualization technologies. Server virtualization provided a way to basically replicate dozens of separate systems onto a set of servers that fit into half a rack of equipment. Desktop virtualization enabled us to display the multiple C2 training system views on a single, shared display much like the windowed views of several applications or documents on a personal computer. VIRTUALIZATION TECHNOLOGY There are numerous white papers, case studies, and vendor descriptions of server and desktop virtualization technology. Virtualization, and some of its benefits and limitations, was described in the I/ITSEC 2011 Software for the Rest of Us session s Next Generation of Distributed Training utilizing SOA, Cloud Computing, and Virtualization (Lanman, J.T., Horvath, S.D., Linos, P.K. 2011). Server virtualization software can be used to transform or virtualize the hardware resources of a computer to create a fully functional virtual machine that can run its own operating system and applications just like a real computer. Virtualization works by inserting a thin layer of software, a hypervisor, directly on the virtualization server hardware to translate the processing needs of the virtual machine. The leveraging aspect of virtualization is that the hypervisor can manage multiple VM guests running concurrently on a single physical server. It allocates hardware resources dynamically and transparently so each virtual machine is essentially self-contained, eliminating potential conflicts. Another feature of this isolation is that the hypervisor can interface with VMs running different operating systems, such as Windows and Linux. With server virtualization, multiple VMs with different operating systems and applications can run at the same time on a single server or spread across a pool of servers, with each VM having access to the resources it needs when it needs them. (VMWare 2012) It is important to note that server virtualization is about consolidating the processing of multiple machines onto a server it does not include the
4 separate monitors, keyboards, mice and other external components. An exception to this is the virtualization of network switches. Virtualized switches allow VMs that would normally be interconnected on a local or wide area network to be hooked together internally on the same physical server. Also, because the hypervisor isolates the virtual machines from the physical hardware, we are anticipating an easier upgrade to the next major BCS software release than the actual operational systems. The next BCS version requires all the physical computers to be upgraded to a newer generation of servers, whereas our architecture should not require hardware upgrades. The two hypervisor licenses we used were from VMWare and Red Hat. VMWare was chosen because of its industry-leading role and product maturity. Red Hat provided cost-effective licensing for the majority of systems we were targeting to become VMs. (Red Hat Enterprise Linux Advanced Platform license allows an unlimited number of virtual guests per host server to run Red Hat as their operating system.) (Red Hat 2009) For our training and exercise use, we needed to create an end-to-end string of virtual machines that represented everything from the stimulus, through the Sector and local C2 mission processing, and on to the crews client or workstations, as shown in Figure 2. The final stage was to allow crews to see and control the client VM, since unlike a physical PC, virtual machines do not have direct connection to a keyboard, display video or mouse (KVM). inside its window; just as internet users view and interact with several web sites in different tabs. TRAINING AND EXERCISE ARCHITECTURE COMPONENTS As shown in Figure 2, the dynamic stimulus in our architecture is a virtualized AWSIM from the JLVC Toolkit. This gives the capability to inject the two necessary types of scenario data into a virtual BCS. One of the data feeds from AWSIM is synthetic radar data to simulating radar data from the Federal Aviation Administration, Transport Canada, or the U.S. or Canadian military. The other type is Tactical Data Link (TADIL) information, representing data from military airborne warning systems or interceptor aircraft. The virtualized BCS is made up of components normally deployed on several single-purpose computers, as shown in Figure 3. (Thales-Raytheon Systems Company LLC 2008) At the NORAD Sectors, the main processing is by the BCS Sentry Real-Time server. Dozens of separate operator workstations are used to perform tasks such as surveillance and interceptor control. For the training system, we virtualized the Sentry Real-Time server and two of the operator workstations, and connected them on their own internal network. A virtualized RTAP server replicates the physical version of a Sector BCS s new RTAP server. One other necessary BCS component is a protocol translator for changing AWSIM radar data from a Common Digitizer-2 (CD- 2) format into BCS s internal ASTERIX format. Figure 2. End-to-end String and Participants Viewing a virtual machine s display presented a different set of challenges. Desktop virtualization provides several techniques that show the display, or displays of multiple VMs. Thin clients act as dumb terminals allowing the user to have keyboard and mouse interaction with one or more VMs while showing their individual displays in separate windows on a common monitor. Alternatively, the user may view different VMs through a browser, such as Internet Explorer. Display virtualization allows the user to run several VMs in parallel taking control of any individual VM by clicking Figure 3. BCS Block Diagram with RTAP Server VMs are basically files. Creating a duplicate VM is as simple as duplicating the file, and giving it a unique VM name, network name and IP address. So, creating the second operator workstations mentioned above was a relatively simple duplication task. All of
5 these BCS components run on VMs with Red Hat Linux as the Operating System. Because the virtual AWSIM and virtual BCS components are integrated onto a single virtualization server, an internal network switch connection replaces long-haul communications. This direct connection is functionally equivalent to the realworld s multiple communications interface boxes, crypto gear and circuits. The output from the virtual BCS is also locally available on internal networks on the virtualized platform. This eliminated the need for more external communications boxes from the BCS RTAP directly to the virtualized receiving RTAP Web Server. However, the other two receiving systems, AME and GCCS, needed minor interface adaptors to complete their respective connections. The virtualized RTAP, representing the primary C2 system used at the Headquarters, is also made up of multiple components. The real-world system has an RTAP Web Servers that normally interface long-haul to the RTAP servers at the NORAD Sectors. This Web Server pushes data to the Operators RTAP Workstations. In our training and exercise environment, the Web Server and all the RTAP Workstations were converted into a set of virtual machines on their own private network switch. As noted above, creating eight RTAP Workstations was relatively easy; duplicating the RWS1 Virtual machine files, renaming them RWS2 through RWS8, and assigning each a unique network name and IP addresses. The second output from our virtual BCS is the TADIL data to GCCS. This data stream is handled somewhat differently from the others because we chose to re-use a separate hardware platform for the GCCS server. The GCCS server was not virtualized because the commercial virtualization industry did not have a hypervisor for older Sun Microsystems hardware. The server was essentially no cost - basically pulled out of the recycling bin with GCCS software re-installed. Also, the TADIL interface from BCS to GCCS needed a minor format change. The reformatting is done using a Common Boundary System (CBS) GOTS tool that normally runs on its own stand-alone computer. The CBS application is installed on a virtualized version of a generic Windows PC. Operationally, the ICSF clients that display GCCS TADIL track data are normally individual PCs. In our architecture the eight clients were converted to VMs running a Windows OS with the ICSF software application. Because the ICSF clients are on the virtual server, we have another external network connection from the separate, physical GCCS server back into the virtualization server. The same external connection allows TOI Tracker to access the GCCS database. The third output from the virtual BCS is data to AME. Because of strict limitations on injecting simulation data into AME, that data stream is converted to a special Service Oriented Scenario Injector format. This reformatting is also done by the same Common Boundary System tool. For a more robust training capability, we chose to provide the capability to exercise with air tracks flying from Sector to Sector. This allows crews to practice their Cross-Border Operations procedures. This necessitated creating three more complete sets of virtual BCS systems, so we could model all four NORAD Sectors. The replication task was somewhat more difficult than cloning individual VMs because of Sector-specific naming data imbedded inside the BCS subsystem component adaptation files. The expanded architecture (only showing two of the four virtual BCS systems) is depicted in Figure 4. A modification to AWSIM was needed in areas of overlapping radar coverage to insure that synthetic radar data was sent to both affected BCSs. Note that the adapters between the individual virtual BCS outputs to GCCS and AME also serve as consolidation nodes for combining outputs from the separate BCSs into merged inputs to the C2 systems. The adapters to AME and GCCS were combined into a single Windows- based virtual machine along with the TOI Tracker application, and labeled Common Boundary System in Figure 4. The virtualized systems described above all reside in the server room. But these virtual machines do not have direct connections to displays. Students in the Qualification Trainer and crews in the N2C2 need to see the simulate event data. Additionally, the Modeling and Simulation Operator needs to see the AWSIM VM in order to control the dynamic scenario inputs. A White Cell player needs to see BCS Workstations to act as the BCS Operator and execute essential actions in reaction to an event. We used a combination of two technical solutions for viewing the virtual machines; installing new thin clients, and re-using Internet Explorer on existing workstations.
6 Figure 4. Training and Exercise Virtual and Physical Architecture DEPLOYMENT AND USES There are three virtualized Air Domain training and exercise capabilities; at the NORAD and USNORTHCOM Command Center, the Qualification Trainer, and the Canadian Forces Air Warfare Centre. The N2C2 Air Domain training capability is integrated into the operational command center. This imposes a limitation not to interfere with monitoring real-world operations, and constrains the display of the training/exercise information. The deployment reuses the existing AME exercise capability and its display. RTAP, ICSF and TOI Tracker are windows on a single monitor driven by a new thin client. Figure 5 shows the AWSIM Operator driving scenario data into the virtual BCS, then on to AME for processing and display. In parallel the virtual BCS sends data to RTAP and GCCS and their respective displays. Figure 5. Scenario Injection through to N2C2 Operator Displays The Qualification Trainer has a full end-to-end capability to stimulate the RTAP, GCCS and AME C2 systems for hands-on training. The QT s systems were intentionally designed to be isolated and have no capability to connect to other operational systems or networks. There is no competition for space on their display because there is no requirement for students to concurrently monitor real-world operations. The three C2 system views can be spread across several monitors through a browser on the existing AME workstation and a new thin client. The Canadian Air Warfare Center utilizes a scaled back version of the training/exercise capability
7 because they are only required to support the single Canadian Sector, rather than the four Sectors that supply data to NORAD Headquarters. Their system can function as both a training/exercise tool on the Canadian Forces Experimentation Network, or as a laboratory and development suite. SAVINGS An apples-to-apples savings comparison to acquiring a set of equivalent environments on physical systems could not be easily estimated. Virtualization gave us the additional flexibility to easily expand to a full breadth and depth to simulate four NORAD Sectors. Our training and exercise environment can dynamically stimulate the three C2 systems. At the low end, the costs in Table 1 show a baseline configuration with eight clients. This may not be representative of other potential virtualization activities because the principle software components and some hardware were government off-the-shelf (GOTS) software or government-furnished equipment (GFE). The costs are conservatively a factor of ten lower than estimates for a comparable version if built on separate physical servers and clients. Table 1. QT Facility H/W and S/W Costs Item Unit Cost Number Total Dell PowerEdge R710 $ 8,387 3 $ 25,161 Red Hat Enterprise Virtualization for Servers $ $ 1,996 Red Hat Enterprise Virtualization for Desktops $ $ 375 Red Hat Enterprise Linux (RHEL) Standard $ 1,999 2 $ 3,998 VMware vsphere Essentials $ $ 611 Windows 2003 Server $ $ 150 Cisco SF Switch $ $ 430 HP 5740 Thin Client $ $ 4,400 Total $ 32,782 GCCS-J ICSF Client S/W (Win OS) GOTS 8 Common Boundary System S/W (Win OS) GOTS 1 BCS S/W components - NORAD Sector (RHEL OS) GOTS 4 RTAP S/W components - NORAD HQ (RHEL OS) GOTS 1 AWSIM S/W (RHEL OS) GOTS 1 TOI Tracker (Win 2003 ServerOS) GOTS 1 Sun V240 GCCS Server (Surplus) GFE 1 < $1000 Rack (Surplus) GFE 1 < $1500 Misc H/W - Cables, tie downs GFE < $80 An often asked question regarding server virtualization is how many physical systems can be run as virtual machines on a server. There are numerous variables that have significant influence (processor cores/socket counts and speed, RAM, and disk size/spindle speed), in addition to the operator s actual utilization and workload demands. We contracted with the AME developer to conduct a virtualization study and make enhancements to the QT facility. As part of the study, they did some quantitative analyses on the performance of physical systems versus virtualized machines running the same applications and under the same loads and operator interactions. Table 2 shows the density expectations if VMs ran on platforms approximately equivalent to those that hosted the stand-alone applications and workstation functionalities. The data shows an ability to host twenty times as many virtual application servers or ten times the number of virtual workstations a considerable savings of equipment costs and associated power, HVAC, and rack space. Table 2. VM Performance and Capacity Analysis A significant impact in most computing environments is the cost, time and effort associated with Information Assurance. As noted in a previous I/ITSEC paper, The largest challenge affecting the functionality of SOA, cloud computing, and virtualization is security. Security practices are necessary in order to protect systems from viruses and data leakage; however, security degrades system performance. (Lanman et al.) With virtualization technology, the IA burden can be reduced or simplified. AWSIM is GOTS software, and came secured with a patch from the Air Force and a Security Compliance Guide for the necessary manual steps. The ICSF clients were also GOTS, with lock-down procedures integrated into the installation procedures. Once one ICSF client was created, the duplicates inherited the IA lock-down profile. In the case of the software for the BCS and RTAP components, they were considered GOTS under agreement with the Prime Contractor, Thales Raytheon. The BCS components took considerable effort to lock-down. However, the virtual RTAP machines inherited a locked-down IA profile from its physical twin. The Common Boundary System was GOTS, and was installed as an application on a locked-down Windows VM. The thin clients were left as pre-configured from the manufacturer since they always return to that state after being powered down. The only changes were to install the latest patch version of Adobe Flash
8 Player, assign a fixed IP address, and new Username and Password. SUMMARY NORAD and USNORTHCOM crew training has historically been hindered by an inability to conduct dynamic training and exercises on all of their Command and Control systems. The Joint Training and Exercise Directorate had to redirect its training and exercise enhancement approach when N-NC changed the priority of C2 systems used to conduct the missions. We leveraged server and desktop virtualization technology to create an affordable virtual environment mimicking the operational systems and crew s workstations. The server virtualization process created functionally equivalent virtual machines with the authentic end-to-end processing and message exchanges. Desktop virtualization technology allowed the crews to view and manage multiple client VMs without significantly affecting their existing workspace. This enabled the Air Domain crews to Train as you Fight. REFERENCES Lanman, J.T., Horvath, S.D., Linos, P.K. (2011), Next Generation of Distributed Training utilizing SOA, Cloud Computing, & Virtualization, I/ITSEC 2011 N-NC (2010), NORAD and USNORTHCOM Distributed Training Capability Implementation, 24 Feb 2010, Page 2 N-NC (2011), NORAD and USNORTHCOM Vision, Missions, and Priorities, Briefing, 28 Nov 2011, Page 2 NORAD (2011), North American Aerospace Defense Command (NORAD) Distributed Air Mission Training Capability Enabling Concept, 20 Dec 2011, Pages Red Hat (2009), Red Hat Enterprise Virtualization For Servers: Pricing & Licensing Guide, Page 4 Thales-Raytheon Systems Company LLC (2008), NORAD Training Capability Upgrade Distributed Mission Training (DMT), 21 November 2008, Page 6 (with RTAP Server modification) VMWare (2012), How Does Virtualization Work?, Retrieved June 2012, from The specifics detailed in this paper describe the savings N-NC realized in overcoming C2 system training shortfalls. In general, the versatility of virtualization can provide similar savings for other operational, testing, training, or office uses.
Leveraging Virtualization Technology for Command and Control Systems Training
Leveraging Virtualization Technology for Command and Control Systems Training Joseph J. Connery, Jr., Robert C. Callahan, Dr. Philip N. Brown NORAD and USNORTHCOM/J7 Joint Training and Exercises Directorate
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework GSAW 2014 Thomas J. Sullivan, Aerospace Ground Systems Lab Rico Espindola, MMSOC Flight Operations
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper
Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
Expert Reference Series of White Papers. VMware vsphere Essentials
Expert Reference Series of White Papers VMware vsphere Essentials 1-800-COURSES www.globalknowledge.com VMware vsphere Essentials Raj Tolani, Global Knowledge Instructor Introduction Every VMware class
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
Technical Brief. Userful Multiplatform Desktop Virtualization Software
Technical Brief Userful Multiplatform Desktop Virtualization Software 11.04.2014 SUMMARY: This Technical Brief will summarize the installation and set up of Userful Multiplatform desktop virtualization
LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing
LICENSING MANAGEMENT SERIES A Guide to Assessing Windows Server Licensing July 2010 This document provides customers of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
VMware Virtualization and Software Development
VMware Virtualization and Software Development 1 VMware Virtualization and Software Development Mark Cloutier Undergraduate Student, Applied Math and Computer Science Keywords: Virtualization, VMware,
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
Selecting the Right NAS File Server
Selecting the Right NAS File Server As the network administrator for a workgroup LAN, consider this scenario: once again, one of your network file servers is running out of storage space. You send out
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
Why is the V3 appliance so effective as a physical desktop replacement?
V3 Appliance FAQ Why is the V3 appliance so effective as a physical desktop replacement? The V3 appliance leverages local solid-state storage in the appliance. This design allows V3 to dramatically reduce
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,
Taking the Disaster out of Disaster Recovery
Taking the Disaster out of Disaster Recovery Agenda Challenges of Traditional DR Properties of Virtualization for DR Using VMware Virtualization in DR 10 Steps to better DR using VMware Virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
Business Virtualization
Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15
Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark.
IOmark- VDI HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Copyright 2010-2014 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VM, VDI- IOmark, and IOmark
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE PRICING GUIDE
WHITEPAPER RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE PRICING GUIDE AT A GLANCE Buy RHEV for Servers on a per managed-socket per year subscription No costly Editions that force you into
Integrating NComputing Virtual Desktops with VMware and Citrix
Click to edit Master title style Integrating NComputing Virtual Desktops with VMware and Citrix Karen Gaines Director of Southern Europe, NComputing, Inc. September, 2010 1 Click Topicsto edit Master title
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007
Oracle On Demand Infrastructure: Virtualization with Oracle VM An Oracle White Paper November 2007 Oracle On Demand Infrastructure: Virtualization with Oracle VM INTRODUCTION Oracle On Demand Infrastructure
ABB Technology Days Fall 2013 System 800xA Server and Client Virtualization. ABB Inc 3BSE074389 en. October 29, 2013 Slide 1
ABB Technology Days Fall 2013 System 800xA Server and Client ization October 29, 2013 Slide 1 System 800xA ization Customers specify it Customers harmonize with IT Training environments Lower cost of ownership
Achieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
Achieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor
ASPE RESOURCE SERIES Virtualization 101 Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor Real Skills. Real Results. Real IT. in partnership with Virtualization 101
Lexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
Migrating Control System Servers to Virtual Machines
Migrating Control System Servers to Virtual Machines Decisions and experiences at the Canadian Light Source in 2008-2009 Glen Wright ICALEPCS 2009 What is a Virtual Machine? A Virtual Machine (VM) is a
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Three Ways to Secure Virtual Applications
WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.
Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore
Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates
Deployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
VMware Virtual Infrastucture From the Virtualized to the Automated Data Center
VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. [email protected] Agenda Vision VMware Enables Datacenter Automation VMware Solutions
SCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
Technology Insight Series
Evaluating Storage Technologies for Virtual Server Environments Russ Fellows June, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved Executive Summary
SAP HANA - an inflection point
SAP HANA forms the future technology foundation for new, innovative applications based on in-memory technology. It enables better performing business strategies, including planning, forecasting, operational
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center Marshall, David ISBN-13: 9780849339318 Table of Contents BASIC CONCEPTS Introduction to Server Virtualization Overview
Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper
Enterprise Deployment: Laserfiche 8 in a Virtual Environment White Paper August 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4
Building Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
Server Virtualization with VMWare
Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing
Dell Desktop Virtualization Solutions Simplified. All-in-one VDI appliance creates a new level of simplicity for desktop virtualization
Dell Desktop Virtualization Solutions Simplified All-in-one VDI appliance creates a new level of simplicity for desktop virtualization Executive summary Desktop virtualization is a proven method for delivering
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Microsoft Virtual Desktop Infrastructure (VDI) FAQ
Microsoft Virtual Desktop Infrastructure (VDI) FAQ Q1: What is VDI? A1: Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution that enables organizations to store and execute desktop
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Virtualization @ Google
Virtualization @ Google Alexander Schreiber Google Switzerland Libre Software Meeting 2012 Geneva, Switzerland, 2012-06-10 Introduction Talk overview Corporate infrastructure Overview Use cases Technology
Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing
Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge
IT@Intel. Developing an Enterprise Client Virtualization Strategy
White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the
How To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
Unlimited Server 24/7/365 Support
Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,
HP SN1000E 16 Gb Fibre Channel HBA Evaluation
HP SN1000E 16 Gb Fibre Channel HBA Evaluation Evaluation report prepared under contract with Emulex Executive Summary The computing industry is experiencing an increasing demand for storage performance
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization Barb Goldworm Founder, president & chief analyst, FOCUS, LLC [email protected] The
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
BC43: Virtualization and the Green Factor. Ed Harnish
BC43: Virtualization and the Green Factor Ed Harnish Agenda The Need for a Green Datacenter Using Greener Technologies Reducing Server Footprints Moving to new Processor Architectures The Benefits of Virtualization
Estimating Cloud Computing Costs: Practical Questions for Programs
Estimating Cloud Computing Costs: Practical Questions for Programs Kathryn Connor RAND Corporation June 2014 In 2010, the OMB proposed Federal Agencies consolidate data centers to save money. In 2013,
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Hard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses
Hard Partitioning and Virtualization with Oracle Virtual Machine An approach toward cost saving with Oracle Database licenses JANUARY 2013 Contents Introduction... 2 Hard Partitioning Concepts... 2 Oracle
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Deploying Red Hat Enterprise Virtualization On Tintri VMstore Systems Best Practices Guide
TECHNICAL WHITE PAPER Deploying Red Hat Enterprise Virtualization On Tintri VMstore Systems Best Practices Guide www.tintri.com Contents Intended Audience... 4 Introduction... 4 Consolidated List of Practices...
Server-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
Monitoring Databases on VMware
Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com
