Integrating an Identity-Based Control Plane with the HIMALIS Network Architecture
|
|
- Angelica Small
- 8 years ago
- Views:
Transcription
1 Integrating an Identity-Based Control Plane with the HIMALIS Network Architecture Pedro Martinez-Julia 1, Ved P. Kafle 2, Antonio F. Skarmeta 1 pedromj@um.es, kafle@nict.go.jp, skarmeta@um.es 1 Department of Communication and Information Engineering, University of Murcia, Spain 2 Photonic Network Research Institute, National Institute of Information and Communication Technology (NICT), Tokyo, Japan IEEE NetSoft 2015, April 2015
2 Outline Motivation Overview of the HIMALIS Network Architecture Research Objectives Integration Approach Evaluation Scenario Evaluation Methodology Results Discussion Conclusions and Future Work
3 Motivation Background: But: Therefore: The raise of Software Defined Networking (SDN) opens a wide spectrum of improvements for network architectures for the Future Internet (FI). The HIMALIS architecture is designed to overcome mobility and multi-homen problems in big networks, such as the Internet. The HIMALIS network architecture would benefit from some degree of coupling with both SDN mechanisms and an identity-based control plane. Its general operation can be improved by leveraging dynamic but centralized knowledge of the network and its status. We claim that integrating HIMALIS with an identity-based control plane results in an improved operation (specially reflected in the reduction of time required for handover operations). Through the integration of such new control plane, which is built on top of current SDN mechanisms, the deployment of HIMALIS on current and future networks is simplified.
4 Overview of the HIMALIS Network Architecture (I)
5 Overview of the HIMALIS Network Architecture (II) HIMALIS enables communications over heterogeneous underlying networks with emphasis in mobile nodes. It follows the identifier/locator separation design principle. Its view of the network includes several edge (or access) networks and a global transit network. Its main components are: The Host Name Registry (HNR) provides the resolution of host IDs to network locators. The Domain Name Registry (DNR) resolves HNR locators. The Local Name Server (LNS) caches resolutions in the local network. The Authentication Agent/Registrant (AAR) addesses security issues (mainly access control). The connection between access networks and the global transit network is performed by particular gateways under the control of HIMALIS.
6 Research Objectives Design an approach to integrate HIMALIS with SDN mechanisms by the inclusion of an identity-based control plane that moves HIMALIS control functions from the data plane to the control plane. Design and execute an evaluation scenario to study the proposed approach working on general handover operations. Analyze the results of the evaluation to demonstrate our claims.
7 Integration Approach (I)
8 Integration Approach (II) The integrated approach qualities are: The control plane functions of HIMALIS are moved to the control plane by the design and implementation of a new controller module (split into agent and controller) that interfaces between HIMALIS elements and the SDN controller. HIMALIS elements do not lose their role. They are separated but tied to the controller. The knowledge about network hosts, their status, and the control operations they perform is concentrated in the controller. Such knowledge allows the controller to determine the actions to take into the network in the most efficient way possible.
9 Evaluation Scenario (I)
10 Evaluation Scenario (II) The main remarks of the evaluation scenario are: The scenario comprises six different networks: Five edge (access) networks. A global interconnection network. Edge networks are attached to the interconnection network by means of gateways (specifically defined by HIMALIS and our approach). Two host elements with their corresponding applications are instantiated as client and server. Specific elements from HIMALIS and our approach are instantiated where required. The same topology is used to evaluate both HIMALIS and our approach.
11 Evaluation Methodology To demonstrate our claims we have to demonstrate that the handover operations are actually improved. We have designed simulation models for both plain HIMALIS and our proposed approach. The running models have been constructed with the simulation framework provided by SimPy, which provides the ability to build discrete event simulators with the Python programing language. Both models for plain HIMALIS and the proposed approach have parallel elements and are based on the same underlying elements, so we are sure that the results are comparable. In addition, we have designed a set of generic applications to be used with either model to perform the evaluation.
12 Results (I) Handover time for the simulation scenario using hard handover operations.
13 Results (II) Handover time for the simulation scenario using SOFT handover operations.
14 Discussion (I) From the results of the evaluation we can highlight that: The proposed approach outperforms plain HIMALIS by a considerable amount of time: More than 90% of client handover operations have required less than 70 ms for the proposed approach, while the original approach requires more than 150 ms for the 80% of the operations. In the case of servers, the proposed approach requires less than 100 ms for more than 90% of the operations while the original approach requires more than 200 ms for more than 90% of handover operations. Clients require less time to complete a handover because servers and their networks are busy with the processing of data messages.
15 Discussion (II) From the results of the evaluation we can highlight that: There are 20% of operations where HIMALIS outperforms the proposed approach due to the occasions when the client and server and in the same network. In general, the proposed approach requires an average of ms to complete a handover while the best case of the original HIMALIS architecture requires an average of ms. Moving HIMALIS control messages to a separate control plane can really improve its operation, specially with complex operations such as handover.
16 Conclusions and Future Work We demonstrated our claims by evaluating the proposed solution against plain HIMALIS through comprehensible simulation models. The results from the evaluation demonstrate that the handover operations are highly improved for the majority of cases. For the future work we plan to finish the adaptation of the HIMALIS implementation to work with the proposed integration and scheme, so we can evaluate it in the real network and typical experimentation infrastructures.
17 THANKS FOR YOUR ATTENTION
18 EOF
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Course Code: M10231 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Designing a Microsoft SharePoint 2010 Infrastructure Overview This five day ILT course teaches IT professionals to design and
More informationSDN/OpenFlow Optical Network on JGN X
SDN/OpenFlow Optical Network on JGN X Hiroaki Harai (harai@nict.go.jp) Director at Network Architecture Lab. National Institute of Information and Communications Technology Koganei, Tokyo, Japan GEC20,
More informationLocator ID Separation for Mobility Management in the New Generation Network
Locator ID Separation for Mobility Management in the New Generation Network Ved P. Kafle and Masugi Inoue National Institute of Information and Communications Technology (NICT) Tokyo, Japan {kafle, inoue}@nict.go.jp
More informationModule: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
More informationComponents and Concepts of the Ambient Networks Architecture
Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,
More informationAbout this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.
Course 10231B: Designing a Microsoft SharePoint 2010 Infrastructure OVERVIEW About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Audience Profile
More informationDisaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
More informationPresented by Jordi Palet jordi.palet@consulintel.es Consulintel. University of Murcia (Spain)
Presented by Jordi Palet jordi.palet@consulintel.es Consulintel University of Murcia (Spain) PKIs... key element for providing security to distributed and dynamic networks and services New context/new
More informationSP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure
SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5 day ILT training course
More informationDEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
More informationNetwork functions virtualization and software management
ericsson White paper Uen 284 23-3248 December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationA Web Service-based Network Composition Architecture for the Next Generation Internet
A Web Service-based Network Composition Architecture for the Next Generation Internet Luciano B. de Paula 1, Rodolfo Villaça 1, Fábio L. Verdi 1, Maurício F. Magalhães 1, and Annikki Welin 2 1 Department
More informationHow To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
More informationHow To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
More informationWeb Service Robust GridFTP
Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the
More informationDesigning a Windows Server 2008 Network Infrastructure
Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure
More informationATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks
ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks Karin Anna Hummel, ETH Zurich (thanks to Vasileios Kotronis for some material) November 10, 2014 1 Locating and Connecting 2 Wireless
More informationSecurity for all: network-based protection for personal devices
Security for all: network-based protection for personal devices Antonio Lioy Politecnico di Torino < lioy @ polito.it > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015 Why SECURity at
More informationNetwork Virtualization, Control Plane and Service Orchestration of the ICT STRAUSS Project
Network Virtualization, Control Plane and Service Orchestration of the ICT STRAUSS Project R. Muñoz, R. Vilalta, R.Casellas, R. Martínez Optical Networks and Systems Department Centre Tecnològic de Telecom.
More informationModule 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.
SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 OVERVIEW About this Course This five-day, instructor-led course provides you with the knowledge and skills
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationChapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
More informationResearch Topics on Information-Centric Networking: Caching, Routing and Virtualization
Research Topics on Information-Centric Networking: Caching, Routing and Virtualization Thomas Silverston JFLI, Japanese-French Laboratory for Informatics (CNRS UMI3527) The University of Tokyo May, 21
More informationActive ISP Involvement in Content-Centric Future Internet. 2013.01.23 Eugene Kim
Active ISP Involvement in Content-Centric Future Internet 2013.01.23 Eugene Kim 1 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 Paris, France, February 7-10, 2011.
More informationMicrosoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435
coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding
More informationSensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive
More informationSDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar
SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks
More informationMS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013
MS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013 Description: This five-day instructor-led course teaches how to design and configure Enterprise Voice and Online Services in Microsoft
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Microsoft Exchange About this Course This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Server 2010. This course describes how
More informationMultidomain Network Based on Programmable Networks: Security Architecture
Multidomain Network Based on Programmable Networks: Security Architecture Bernardo Alarco, Marifeli Sedano, and Maria Calderon This paper proposes a generic security architecture designed for a multidomain
More informationCourse Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
More informationSocial-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou
Social-Aware Virtual Network Embedding for Wireless Content Delivery SAViNE Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou Network Management & Optimal Design Laboratory National Technical University
More informationRoland Bless, bless@tm.uka.de. Stephan Baucke Ericsson Research
Network Virtualization within FP7 EU Project 4WARD Network of the Future Roland Bless, bless@tm.uka.de Institute of Telematics, University of Karlsruhe Stephan Baucke Ericsson Research 1 4WARD Overview
More informationPlanning and Maintaining a Microsoft Windows Server Network Infrastructure
Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security
More informationData Center Middleboxes
Data Center Middleboxes Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking November 24, 2014 Slides from ACM SIGCOMM 2012 presentation on
More informationMOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
More informationIntent NBI for Software Defined Networking
Intent NBI for Software Defined Networking 1 SDN NBI Challenges According to the architecture definition in Open Networking Foundation (ONF), a Software Defined Network (SDN) includes three vertically
More informationThe use of Xen Virtualization Technology for the Analysys and Teaching of Communications Protocols
The use of Xen Virtualization Technology for the Analysys and Teaching of Communications Protocols Jose Saldana, Julián Fernández-Navajas, José Ruiz-Mas Communication Technologies Group (GTC) Aragon Institute
More informationAn Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview
An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable
More informationMINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationA REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
More informationOptimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan
More informationData Center Virtualization and Cloud QA Expertise
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
More informationCARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
More informationABNO: The IETF approach for carrier SDN
ABNO: The ITF approach for carrier SDN FIA Athens 2014 Software Defined Networking SDN Network equipment as Black boxes Open interfaces (OpenFlow) for instructing the boxes what to do OPRATING SYSTM OPRATING
More information1 Introduction... 3 2 Product overview... 4. 2.1 Product description... 4. 3 System requirements... 7. 3.1 Software support... 7
Product announcement ----------------------------------------------------------------------------- ASEBA SxS PAAS module ----------------------------------------------------------------------------------------------------------
More informationCNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
More informationSecurity Testing & Load Testing for Online Document Management system
1 Security Testing & Load Testing for Online Document Management system Abstract The client is a leading provider of online technical documentation solutions in UK, they wanted to protect their documents
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Course: 10233 Length: 5 Days
About this Course Designing and Deploying Messaging Solutions with This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Microsoft
More informationEU Cross-border e-id & Safety Services Antonio Skarmeta Gómez Universidad de Murcia. IPv6@GOV workshop Brussels, 23-24 January, 2013
EU Cross-border e-id & Safety Services Antonio Skarmeta Gómez Universidad de Murcia IPv6@GOV workshop Brussels, 23-24 January, 2013 Index Motivations General objectives Cross-border services Cross-border
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationEasier - Faster - Better
Highest reliability, availability and serviceability ClusterStor gets you productive fast with robust professional service offerings available as part of solution delivery, including quality controlled
More informationWireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar
Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Rutgers University 2014 Fall IAB December 12 th, 2014 Need for Inter-network Cooperation Interaction between managed wireless
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Course 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day,
More informationKrishan Sabnani Bell Labs. Converged Networks of the Future
Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation
More informationHigh Performance Computing for Wireless Telecom Research
High Performance Computing for Wireless Telecom Research Maziar Nekovee BT Research & University College London maziar.nekovee@bt.com T. Hewer, R. Saksena, P. V. Coveney (UCL) Keith Briggs, S. Kawade,
More informationFundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
More informationRelease the full potential of your Cisco Call Manager with Ingate Systems
Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective
More informationEffective disaster recovery using Software defined networking
Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this
More informationGlassfish Architecture.
Glassfish Architecture. First part Introduction. Over time, GlassFish has evolved into a server platform that is much more than the reference implementation of the Java EE specifcations. It is now a highly
More informationImplementing a Microsoft Windows 2000 Network Infrastructure
Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing
More informationMobile and Wireless ATM (WATM)
Mobile and Wireless ATM (WATM) Defense Information Systems Network (DISN) Syed Shah Larry Bowman Robert Riehl Defense Information Systems Agency Center for Systems Engineering Reston, VA20191 Abstract:
More informationRequest Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
More informationThe Ultimate in Scale-Out Storage for HPC and Big Data
Node Inventory Health and Active Filesystem Throughput Monitoring Asset Utilization and Capacity Statistics Manager brings to life powerful, intuitive, context-aware real-time monitoring and proactive
More informationInternetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
More informationMS 20413A: Designing and Implementing a Server Infrastructure
MS 20413A: Designing and Implementing a Server Infrastructure Description: Days: 5 Prerequisites: This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and
More informationCourse Outline: 6435- Designing a Windows Server 2008 Network Infrastructure
Course Outline: 6435- Designing a Network Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide students with an understanding
More informationOracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
More informationEND-TO-END CLOUD White Paper, Mar 2013
END-TO-END CLOUD White Paper, Mar 2013 TABLE OF CONTENTS Abstract... 2 Introduction and Problem Description... 2 Enterprise Challenges... 3 Setup Alternatives... 4 Solution Details... 6 Conclusion and
More informationFundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
More informationPLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
More informationNetwork Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE
Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE Networked Systems (NetSys) 2013 Stuttgart, 14.03.2013 Outline
More informationCloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures
4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius
More informationSupercomputing applied to Parallel Network Simulation
Supercomputing applied to Parallel Network Simulation David Cortés-Polo Research, Technological Innovation and Supercomputing Centre of Extremadura, CenitS. Trujillo, Spain david.cortes@cenits.es Summary
More informationIndex. Registry Report
2013.1-12 Registry Report 01 02 03 06 19 21 22 23 24 25 26 27 28 29 31 34 35 Index Registry Report 02 Registry Report Registry Report 03 04 Registry Report Registry Report 05 06 Registry Report Registry
More informationNetwork Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Course Outline Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment This
More informationMicrosoft Compute Clusters in High Performance Technical Computing. Björn Tromsdorf, HPC Product Manager, Microsoft Corporation
Microsoft Compute Clusters in High Performance Technical Computing Björn Tromsdorf, HPC Product Manager, Microsoft Corporation Flexible and efficient job scheduling via Windows CCS has allowed more of
More informationDisaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)
More informationData Structure and Switch Categorization for Mobility Management Service in Software Defined Networking
Vol.117 (Information Technology and Computer Science 2015), pp.1-5 http://dx.doi.org/10.14257/astl.2015.117.01 Data Structure and Switch Categorization for Mobility Management Service in Software Defined
More informationA Supply Chain Management Framework Based on SOA
A Supply Chain Management Framework Based on SOA Luo Duanhong College of Economics and Trade, Hunan University, P.R.China, 410079 Hunan Provincial Laboratory of Logistics Information and Simulation Technology
More informationExperimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds
Experimental research on communication networks at CTTC The ADRENALINE and EXTREME testbeds Josep Mangues-Bafalluy and Raül Muñoz Communication Networks Division Centre Tecnològic de Telecomunicacions
More informationGENI Network Virtualization Concepts
GENI Network Virtualization Concepts Alexander Gall 22.2.2007 EFNI Workshop, Amsterdam 2007 SWITCH The GENI initiative GENI: Global Environment for Network Innovations. Initiative planned
More informationIntel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
More informationP2P and IMS Cooperation / Integration
P2P and IMS Cooperation / Integration Jens Fiedler Fraunhofer FOKUS Group for Next Generation Network Infrastructures 1 P2P vs. IMS Isn t P2P and IMS like Fire and Water? No, more like Fish and Chips.
More informationsoftware networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
More informationTri-Tel Telecommunications FAX via SMTP
Tri-Tel Telecommunications FAX via SMTP - 1 - Index: Introduction:... 3 Usage:... 3-2 - Introduction: Tri-Tel Telecommunications allows you to send Fax through its gateways by simply sending an email (SMTP)
More informationVIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
More informationDeploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE
Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE Table of Contents Overview... 2 Installation and Initial Configuration of SharePoint services... 3 System Requirements...
More informationPentaho High-Performance Big Data Reference Configurations using Cisco Unified Computing System
Pentaho High-Performance Big Data Reference Configurations using Cisco Unified Computing System By Jake Cornelius Senior Vice President of Products Pentaho June 1, 2012 Pentaho Delivers High-Performance
More information