1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3
|
|
|
- Lilian Eleanore Gibbs
- 10 years ago
- Views:
Transcription
1
2 Page 2 Table of contents 1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3 CPU - The most versatile, but the slowest solution... 3 ASIC A fast, but non-upgradeable and non-extensible solution... 3 FPGA The fast and upgradeable solution Choosing the Right Form of Deployment... 4 Dedicated Appliance... 4 Integrated Network Appliance: Add-On Card for Encryption... 4 Integrated Network Appliance: Encryption on NIC... 5 Integrated Security Appliance... 6 Virtual Appliance Dedicated Appliances: Making the Right Business Choice... 7 Flexibility... 7 Security... 7 Performance... 7 Upgradeability... 7 Cost Conclusion... 8 ID Quantique SA Tel: +41 (0) Ch. de la Marbrerie, 3 Fax: +41 (0) Carouge Switzerland [email protected] Information in this document is subject to change without notice. Copyright 2011 ID Quantique SA. Printed in Switzerland. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the permission of ID Quantique. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. ID Quantique SA disclaims any proprietary interest in the trademarks and trade names other than its own.
3 Page 3 1. Securing Untrusted Layer 2 Networks Metropolitan and Wide Area Networks interconnect companies data centers and different sites. Metro and Carrier Ethernet provide the foundation for this interconnection. The setup is simple and fast and the cost/performance ratio of Metropolitan Area Networks (MAN) or Wide Area Network (WAN) shows a noticeable improvement. The problem faced by enterprises is that, while they may be able to trust their own internal networks and data centers, they cannot trust the interconnections provided by the MAN or WAN. To make things worse, there is no builtin security standard for Ethernet and MPLS. While Ethernet encryption at layer 2 the data link layer will protect all Ethernet and MPLS payload in a fast, efficient and secure way, there is no interoperability between the different layer 2 encryption solutions on the market. Therefore selecting the right approach to layer 2 encryption is essential, and saves money and headaches. 2. The Different Processing Approaches to Implementing Network Encryption There is more than one approach to the implementation and deployment of layer 2 encryptors. Network encryption requires network access, which can either be provided by a dedicated appliance or by a host system. The more powerful the processing capabilities available to the encryption process, the faster the encryption. While network encryption can run on any CPU (Central Processing Unit), hardware acceleration will boost the encryption performance tremendously. Direct hardware support can be implemented in a CPU, an ASIC (Application Specific Integrated Circuit) or on a FPGA (Field-Programmable Gate Array). Of those three, only FPGAs can be updated to provide hardware acceleration for new functionalities. CPU - The most versatile, but the slowest solution Network encryption can be run on any CPU, but for sustained bandwidths above 50Mb/sec hardware acceleration is necessary to counteract increased latency and jitter. A few of Intel s current high-end CPUs come with hardwired instruction sets for AES encryption. However, the AES encryption itself is only one of the functions which utilise the hardware acceleration, so that even high-end CPUs with AES hardware support start to stutter well before reaching 1Gb/sec in bandwidth. ASIC A fast, but non-upgradeable and non-extensible solution Application Specific Integrated Circuits (ASIC) are integrated circuits that combine a collection of functions and are customized for a particular use, such as Cisco s ASIC on a card for MACSEC implementations. These processors are not intended for general-purpose use. For network encryption an ASIC in the form of a security processor can offer hardware acceleration for certain functions. As the functions are delivered in silicon, they cannot subsequently be extended or upgraded by the user. An ASIC-based solution cannot keep up with evolving security threats and security standards, and therefore has a very limited lifespan. FPGA The fast and upgradeable solution Field-Programmable Gate Arrays (FPGA) combine the hardware acceleration of a customized chip with the added benefit of upgradeability. They are optimized for speed, functionality and extensibility with the lowest total cost of ownership of all the options. Although FPGAs are slightly more costly to manufacture and the costs increase with the number of gates that the FPGA supports, this is mitigated by the reduced operational costs over the lifetime of the
4 Page 4 unit. One issue with the use of FPGAs is the management of the heat produced. The heat increases with the utilization rate of the available gates, favoring the use of slightly over-dimensioned FPGAs to reduce that heat. Ample reserves of available gates are also needed to support extensions of the product functionality. Most leading layer 2 encryption vendors, including ID Quantique, favour FPGAs over other deployment methods. 3. Choosing the Right Form of Deployment Due to the lack of vendor compatibility in network encryption, an enterprise needs to find a vendor who offers a complete range of products able to cover all their layer 2 network encryption needs. It is also essential to remember that only a dedicated appliance will work with other network equipment from different vendors, such as switches or any active network elements. Here are the different options: Dedicated Appliance Most leading layer 2 encryptors, including those of ID Quantique, come as independent and dedicated appliances that are placed between the trusted internal network and the untrusted external network. They create a clear physical and logical separation between the internal and the external network. Only dedicated appliances work independently of any other network device and are entirely built for purpose. High-end appliances come with hardware acceleration based on FPGAs and are currently capable of encrypting up to 10Gb/sec sustained full-duplex network traffic even in complex multipoint networks. Bump-in-the-wire technology, integrating seamlessly into existing network Compatible with existing network equipment for lower operational costs Supports multi-vendor network environments to reduce customer lock-in Integrates all required functionalities in a dedicated secure appliance (network encryption, key management, etc) Best performance in terms of throughput and latency for FPGA-based appliances Designed for security, with tamper-evident chassis and tamper-proof key Physical separation of trusted and un-trusted networks Separation of duties between network and security functions for best practices Extensive configurable functionalities for improved security and compliance (audit reporting, role management, etc) FPGA- and CPU-based appliances are upgradeable, increasing lifetime and functionalities of the appliance Longer MTBF for better cost amortisation Lower installation, maintenance and operational costs than integrated appliances Lowest total cost of ownership for mid- and longer-term cost savings Needs rack space as dedicated hardware appliance Slightly higher initial costs than an integrated appliance Integrated Network Appliance: Add- On Card for Encryption Layer 2 encryption functionality is also available as an add-on card for switches (such as those of Cisco) or certain multiplexers. Adding a board with specialized hardware to support the encryption requires a slot in the chassis, tamper-proof key storage and shielding from the rest of the chassis. The functionality of such add-on cards is often limited due to space, heat and cost constraints. This approach ties the encryption to the device that hosts the add-on card.
5 Page 5 Combines core functionality (switching, routing) with add-on functionality (network encryption) Small upfront cost savings over separate dedicated appliance Less space required for data center and remote locations Fulfills basic compliance requirements The total cost of ownership is higher than for dedicated devices (See 4. Cost below). There are multiple hidden costs after initial purchase, including cost of the add-on card/blade for indispensable hardware acceleration, cost of slot in chassis, change of hardware for future upgrades Mostly no retrofit for existing network equipment, requires purchase of new network equipment Cost, heat and space constraints limit scope of encryptor network compatibility and upgradeability Often lacks the necessary internal shielding and tamper-proof key storage Lifespan of encryptor limited by lifespan of host network device Vendor- and model-specific add-on cards/blades produce a vendor lock-in Vulnerability of host network device extended to network encryption Network and network security consolidated in a single device, forcing changes in best business practices (ie. no separation of duty) Lower performance and potential packet loss at high bandwidths due to competition for limited resources (eg. encryption & switching) Higher operating and maintenance costs lead to higher total cost of ownership Integrated Network Appliance: Encryption on NIC Another way to implement layer 2 encryption functionality is directly on the network interface card (NIC) using an ASIC (Application Specific Integrated Circuit). This is the approach used by the Cisco Nexus While providing hardware acceleration for the encryption, such a solution is not designed for security as it lacks tamper-proof key storage and efficient shielding. Currently on the market there are only network interface cards that support MacSec. MacSec is a proprietary hop-to-hop Ethernet encryption protocol designed to protect links on internal Local Area Networks, which brings significant limitations to reallife WAN and MAN environments. Firstly, MacSec cannot support a multipoint scenario, or be used securely on managed networks, as each switch opens up (decrypts) the packet and then encrypts it again before sending it on. Secondly, there are compatibility issues with existing (or future) network equipment especially in VLAN topologies, as the MacSec tag is placed in front of the VLAN tag. Using a proprietary protocol forces vendor lock-in for other networking equipment, increasing the cost of ownership. Combines network interface and encryption Network access and network security consolidated on a single card Space savings for data center and remote locations Fulfills basic compliance requirements Encryption is tied to network interface card Cost for slot in chassis needs to be taken into consideration Cost, heat and space constraints limit scope of encryptor network compatibility and upgradeability
6 Page 6 Lifespan of encryptor limited by lifespan of host network device Vendor- and model-specific add-on cards/blades produce a vendor lock-in Mostly no retrofit for existing network equipment, requires purchase of new network equipment Vulnerability of host network device extended to network encryption Higher operating costs and higher Total cost of ownership (see 4. Cost below) Limited deployment options (company operated vs. managed security service) Integrated Security Appliance While there are currently no integrated solutions that work without add-on cards, such units will undoubtedly become available within the next few years. These will most probably be multi-functional security appliances which can handle different security tasks, including layer 2 encryption. The biggest challenge for integrated security appliances is the need to perform all the different tasks concurrently without either a degradation in performance degradation or a reduction in functionality. An integrated solution tends to do many things, but not everything well. The reason for this lack of excellence is in large part due to the compromises required to make the integrated appliance cheaper than the dedicated appliances it competes with. Tamper-proof key storage and efficient shielding do not come automatically with an integrated security appliance, but are needed to meet security requirements. Comprehensive security in a single device Addresses major security concerns at the network perimeter Cost savings over component-specific appliance purchases Space savings for data center and remote locations Fulfills basic compliance requirements No separation of duties and tasks Mixes different network and encryption layers Multi-tasking without sufficient computing power impacts performance Increased vulnerability of appliance extended to network encryption Jack-of-all-trades but master of none No optimization of layer 2 encryption Virtual Appliance CPU-based encryption can be deployed as a virtual appliance in the cloud, running on a virtual machine. However, even when it run as virtual appliance in an elastic cloud, it remains CPU-based and comes without hardware acceleration. As a result any virtual appliance suffers from limited throughput and increased latency. Contrary to hardware accelerated deployment methods, virtual appliances cannot provide Gigabit/second throughput with single-digit microsecond latency. Simple deployment Software only Easy to update Reduced cost Scalable encryption for cloud-based services that are accessed over Ethernet Can be used complementary to dedicated appliances in single network Fulfills basic compliance requirements Higher latency and lower throughput than hardware accelerated solutions Security dependent on security of virtual machine No tamper-proof key storage No hardware security
7 4. Dedicated Appliances: Making the Right Business Choice So why go for a dedicated encryption appliance if you can get encryption as an integrated or add-on function or even as a virtual appliance? There are five reasons: flexibility, security, performance, upgradeability and cost. Flexibility Dedicated appliances can be added to an existing network as bump-in-the-wire, saving companies the (often hidden) cost of other network hardware upgrades. There is no need to reconfigure a router, and as there are no dependencies on other hardware there is reduced vendor lock-in. Security Dedicated appliances are designed for security and meet the highest requirements. The systems form a closed and tested environment which has been proven to be secure. Since the unit s interfaces are limited to those which are absolutely necessary, the number of entry points is reduced and the unit s own security is improved. Both the case and key storage are fully secured and the protection includes measures against emissions. Any attempt to tamper with the unit will result in the immediate emptying of the key storage and the notification that an attempt at tampering took place. The casings are tamper resistant. For integrated appliances it is impossible to provide this level of security. These units have far more interfaces to the outside than a dedicated appliance and thus feature many more entry points for attackers. This increased vulnerability is also illustrated by the number of important security patches for integrated appliances. Page 7 Performance Dedicated appliances are optimized for performance. There is no competition for the available resources between different functionalities. Integrated appliances are optimized for specific performance features which can hardly everbe fully exploited in parallel. for example when an integrated unit needs to do a lot of switching, the throughput of encrypted data is reduced and the latency increased in unpredictable ways. Also, cost considerations often favor the use of ASICs (Application Specific Integrated Circuits) over FPGAs. Those ASICs support only a limited set of functions and if functions are used that are not implemented in the hardware, they are then executed in software which leads to a performance loss. As ASICs are not field-upgradeable, no new functions can be added without changing the ASIC itself. Upgradeability Dedicated layer 2 encryptors tend to be specified and dimensioned in a way that allows the extension of new functionalities at a later point in time. This is an essential requirement to keep the device state-of-theart for the years to come. Amply dimensioned FPGAs (Field Programmable Gate Array) fit the requirement, but they also increase the initial cost. Underpowered FPGAs are quickly saturated and draw a high amount of power, which leads to extensive heat development. Hardware upgradeability and expandability are cost drivers and thus not that high on the priority list for developers of integrated appliances. They focus on initial cost containment rather than on mid- to longterm cost efficiency for the customer. Cost Encryption implemented as a supplementary function in integrated appliances can use a lot of the basic network and management infrastructure provided by the main functionality of the device. There is no cost
8 Page 8 for an additional casing, an additional redundant power-supply or a network processor. This reduces initial cost and price, but it ties the encryption to the proprietary integrated appliance. The average product life of a dedicated encryption appliance exceeds that of an integrated appliance by 2-3 years, leading to lower cost of the dedicated encryption appliance over the entire product life. The initial cost savings of the integrated appliance turn into higher cost over time. When combined with the changes to network configuration required for integrated devices (often hidden or under-scoped at the time of the original purchase), it is clear that the total cost of ownership for dedicated devices is significantly lower. Another aspect that is often not taken sufficiently into consideration is the vendor lock-in: Although dedicated layer 2 encryptors from different vendors are not compatible, this is compounded if the encryption is integrated with the switch or router, leading to double vendor lock-in. Changing the vendor at a single site will exclude that site in terms of encryption from the MAN/WAN. It is mandatory to use the same vendor for encryption and for switching at all sites, resulting in a double lock-in. This means that it is no longer possible to seek cost reductions through a change of suppliers, such as from Cisco to Juniper, HP, Ciena or Huawei, as all integrated appliances would need to be exchanged at the same time. A 2010 Gartner report 1 estimates a 15-25% price premium over 5 years for having an all-cisco network. A singlevendor network also suffers from increased operational complexity. Only dedicated encryption appliances are completely independent of switches and routers and thus reduce vendor lock-in. Introducing a second network vendor reduces lock-in, improves network performance and reduces cost. 1 Debunking the Myth of the Single Vendor Gartner Nov 2010 Gartner s November 2010 report Debunking the Myth of the Single-Vendor Network states: Most organizations that introduced a second vendor report a lasting decrease in network complexity, compared with an all- Cisco network Introducing a second networking vendor will reduce Total Cost of Ownership by at least 15% to 25% over a 5-year time frame. 5. Conclusion Purpose-built and dedicated layer 2 encryptors constitute the best solution for securing layer 2 Metro and Wide Area Networks. They come without dependencies and keep their focus sharply on their sole task, thus operating as efficiently as possible. Processes and management are simple, straightforward and completely optimized for the job at hand, and the separation of duties between network and security matches business and compliance requirements. As well as providing clear benefits in performance and security, dedicated encryption appliances also have a positive mid- and long-term impact on flexibility and cost, offering a lower total cost of ownership over the lifetime of the product. FPGA- and CPU-based solutions can be updated with software to ensure that they constantly evolve to meet new business and technical requirements. While there are different ways to integrate layer 2 encryption into other appliances and to perform encryption as a side-job, none of these approaches provide the security, efficiency or cost-effectiveness of a purpose-built encryption appliance. For highperformance, low latency solutions, a dedicated hardware encryptor is a must.
LAYER 2 ENCRYPTORS METRO AND CARRIER ETHERNET METROS AND WIDE AREA NETWORKS ETHERNET ENCRYPTION FOR PRESENTS:
PRESENTS: LAYER 2 ENCRYPTORS FOR METRO AND CARRIER ETHERNET METROS AND WIDE AREA NETWORKS ETHERNET ENCRYPTION INTRODUCTION: PROTECTING VIRTUAL PRIVATE NETWORKS AND LAN EXTENSIONS: LAYER 2 VS. LAYER 3 Version
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
PRODUCTS & TECHNOLOGY
PRODUCTS & TECHNOLOGY DATA CENTER CLASS WAN OPTIMIZATION Today s major IT initiatives all have one thing in common: they require a well performing Wide Area Network (WAN). However, many enterprise WANs
Getting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
High Speed Ethernet WAN: Is encryption compromising your network?
High Speed Ethernet WAN: Is encryption compromising your network? 2015 Gemalto 2015. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
100 Gigabit Ethernet is Here!
100 Gigabit Ethernet is Here! Introduction Ethernet technology has come a long way since its humble beginning in 1973 at Xerox PARC. With each subsequent iteration, there has been a lag between time of
Oracle SDN Performance Acceleration with Software-Defined Networking
Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN, which delivers software-defined networking, boosts application performance and management flexibility by dynamically connecting
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
How Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
ConnectX -3 Pro: Solving the NVGRE Performance Challenge
WHITE PAPER October 2013 ConnectX -3 Pro: Solving the NVGRE Performance Challenge Objective...1 Background: The Need for Virtualized Overlay Networks...1 NVGRE Technology...2 NVGRE s Hidden Challenge...3
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
Accelerating UTM with Specialized Hardware WHITE PAPER
Accelerating UTM with Specialized Hardware WHITE PAPER FORTINET Accelerating UTM with Specialized Hardware PAGE 2 Summary Tighter security requirements and ever-faster enterprise networks are placing extraordinary
Database Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
Silver Peak s Virtual Acceleration Open Architecture (VXOA)
Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents
WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
White Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
Best Practices for Deploying WAN Optimization with Data Replication
Best Practices for Deploying WAN Optimization with Data Replication Keys for Successful Data Protection Across the WAN The Weak Link in data Protection All too often, the Wide Area Network (WAN) link is
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
JUNIPER CARE PLUS ADVANCED SERVICES CREDITS
DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments
Block based, file-based, combination. Component based, solution based
The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
EVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
HyperQ Storage Tiering White Paper
HyperQ Storage Tiering White Paper An Easy Way to Deal with Data Growth Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com [email protected]
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
Testing Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]
Unified Computing Systems
Unified Computing Systems Cisco Unified Computing Systems simplify your data center architecture; reduce the number of devices to purchase, deploy, and maintain; and improve speed and agility. Cisco Unified
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
Definition of a White Box. Benefits of White Boxes
Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies [email protected] Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview
Management & Orchestration of Metaswitch s Perimeta Virtual SBC
Metaswitch.com OvertureNetworks.com Management & Orchestration of Metaswitch s Perimeta Virtual SBC Fortify your edge and protect your core with the Perimeta Session Border Controller: Virtual The 1st
Juniper Networks QFabric: Scaling for the Modern Data Center
Juniper Networks QFabric: Scaling for the Modern Data Center Executive Summary The modern data center has undergone a series of changes that have significantly impacted business operations. Applications
Jive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Reasons to Choose the Juniper ON Enterprise Network
Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The
10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED TO PROTECT
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE
THE SDN TRANSFORMATION A Framework for Sustainable Success
WHITE PAPER THE SDN TRANSFORMATION A Framework for Sustainable Success The promise of Software Defined Networking (SDN) is gaining more and more attention as traffic growth increases the costs and complexity
White paper. Business Applications of Wide Area Ethernet
White paper Business Applications of Wide Area Ethernet 1 Introduction When enterprises use Ethernet as a wide area networking solution, they have the potential to realize significant gains in network
TrustNet Group Encryption
TrustNet Group Encryption Executive Summary Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along
How To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
Addressing Scaling Challenges in the Data Center
Addressing Scaling Challenges in the Data Center DELL PowerConnect J-Series Virtual Chassis Solution A Dell Technical White Paper Dell Juniper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
Why Software Defined Networking (SDN)? Boyan Sotirov
Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,
media network & internet access
This document explains the design principles behind the Sohonet Media Network, how it provides enhanced ISP services, and provides a single fully integrated connectivity solution. The Sohonet Media Platform
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
White Paper. Innovate Telecom Services with NFV and SDN
White Paper Innovate Telecom Services with NFV and SDN 2 NEXCOM White Paper As telecommunications companies seek to expand beyond telecommunications services to data services, they find their purposebuilt
Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th Generation Servers
White Paper Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th As the deployment of bandwidth-intensive applications such as public and private cloud computing continues to increase, IT administrators
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
Why Migrate to the Cisco Unified Wireless Network?
Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
The virtualization of SAP environments to accommodate standardization and easier management is gaining momentum in data centers.
White Paper Virtualized SAP: Optimize Performance with Cisco Data Center Virtual Machine Fabric Extender and Red Hat Enterprise Linux and Kernel-Based Virtual Machine What You Will Learn The virtualization
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
Driving Down the Cost and Complexity of Application Networking with Multi-tenancy
White Paper AX Series Driving Down the Cost and Complexity of Application Networking with Multi-tenancy February 2013 WP_ADC_ADP_012013.1 Table of Contents 1 Introduction... 3 2 Application Delivery Partition
Group Encryption. The key to protecting data in motion BLACK BOX. 724-746-5500 blackbox.com
The key to protecting data in motion BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Why data encryption?... 3 Types of data encryption... 4 The problem with IPsec... 5 The group
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES It is possible to consolidate multiple network appliances into a single server using intelligent flow distribution, data sharing and virtualization
Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
MPLS provides multi-site solution
MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s
Consolidating Multiple Network Appliances
October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application
WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
