NSLS-II Control System Network Architecture
|
|
|
- Verity Goodman
- 10 years ago
- Views:
Transcription
1 NSLS-II Control System Network Architecture Robert Petkus NSLS-II Controls Group NSLS-II Data Acquisition Workshop April 20, 2010
2 Overview Introduction, areas of responsibility Control network overview Control network components Beamline - Control System network access Impact of DAQ on network Timing system and beamlines Lab security policies Remote access Remote access NX and Citrix i closer look Conclusion
3 Introduction and Scope Areas of responsibility Control system network architecture Multilayer Ethernet switches, media converters, security appliances Cable and fibre optic distribution for control and instrumentation, timing, and fast orbit feedback systems Related server infrastructure File and name servers, gateways, databases, archivers, modeling systems, display managers, monitoring services, and boot servers What we provide to beamlines (network): Ethernet switch, EVR (1 st 6 BLs), EPICS gateway, and connectivity (fibre) to beamline Secure terminal services (NX, Citrix) and ssh gateways to control resources What we don t provide (network): Access to BNL campus network and administrative/computing resources Cabling or switch (to campus), network configuration (MAC registration), etc.
4 Control Network Overview Provide connectivity to all subsystems required for control and operation of the accelerator and beamlines Designed to be fault-tolerant, scalable, and high performance Network is private and secure traffic is not routed to the BNL campus LAN NIST/BNL Cybersecurity compliant No , web-surfing, network cross-pollination Resources 100% dedicated to controls and instrumentation Network is broadly defined as both Control (global) and Instrumentation (local) featuring VLANs segmenting traffic for performance and ACLs to control access to resources Network perimeter security to deny unauthorized, rogue access QoS and storm control functionality Robust monitoring and EPICS integration
5 Control Network
6 Control Network Edge Switches & Cabling Edge Switches Managed 8-port GbE, line-rate, multi-layer Redundant uplinks to core 10GbE ready All potential ti edge switches have been evaluated including *Brocade, *Juniper, *Force10, Cisco, 3Com Brocade GS648 Single Cell, Mezzanine Juniper EX4200 Force10 S50N Cat 6 patch panels and cable tie each rack group (6 total) to the (2) edge switches located in each cell.
7 Fibre Distribution Control Network Fibre radiates both clock and counter-clockwise around the ring in mezzanine cable trays (2) 60-fibre bundles SMF in each direction; i.e., 60-fibres cells 1-15, 60-fibres cells Total (8) drops / cell future capacity Laser-optimized MM (OM3 50/125µm) and SM fibre utilized for 10GE capacity Control Network
8 Core Control Network Evaluated Brocade, Juniper, Force10 core OS functionality Control core switch characteristics Brocade MLX-16 Juniper EX-8208 Enterprise-grade: robust, scalable, reliable, fault Force10 600i tolerant Redundant power, routing and crossbar switching modules High performance ensure control network is not bandwidth limited Line-rate GbE/10GbE on every port (10GbE can be oversubscribed depending on requirements) Switch failover using virtualization, VRRP
9 Beam Line Network Connectivity to control network via MMF via mezzanine cable-tray complex and down over-hang Control group provides Ethernet switch and connectivity Beam lines are assigned to their own VLANs Channel Access Gateways bridge between BL hardware and ours External access to workstations achievable using NX/SSH and/or Citrix Key, certificate, 2-factor authentication (TBD) Policy: Users must have valid BNL account DAQ: Given a clear set of requirements, the network architecture is flexible enough to accommodate a high performance distributed or centralized file manager or database. E.g., Hadoop, GlusterFS, Hypertable, MongoDB, etc. Network options at the beam-line can be tailored to need (e.g., 10GbE uplinks) However, 10GbE uplinks at a majority of beamlines will require an additional network layer
10 Impact of DAQ Storage on Control Network Case 1: BYO storage (NSLS-I) Beamlines provide and manage their own DAQ storage E.g., small Linux file server, external SATA disk drives, etc. Pros Low cost, private/proprietary data kept off network & shared storage, no impact on network Cons Poor performance, irrecoverable and/or lost data, not scalable, physical security concerns
11 Impact of DAQ Storage on Control Network Case 2: High performance local or localized distributed storage Experiments requiring higher performance storage for DAQ deploy it at beamline Data can reside locally yyet potentially participate in a distributed system Data can be scheduled to be shipped for analysis and/or archival Pros Network traffic is local to the beamline switch Scalable buy only what is required Flexible experiments get tailored solution (e.g., SSD disks) vs. one-size fits all Cons Learning-curve, expertise Maintenance, administration Physical security, environmental concerns
12 Impact of DAQ Storage on Control Network Case 3: High performance central storage solution A centralized or centrally-located distributed storage solution is deployed in a data center somewhere. All beamlines read and write data to this location. Pros Fully, managed solution, presumably backed-up and with a full support contract Can be high-performance Proximity to analysis facilities Cons Expensive Strain on network fabric Performance traits may be adequate for some but not all Privacy concerns data residing on shared storage
13 Example DAQ System Network Impact
14 Timing System and Beamlines As with the control network, timing system fibre originates in A-418 (Computer Room) Fibre travels both clock and counter-clockwise, ½ way around ring. Distribution composed of individual duplex fibres, not a bundle All fibre is multi-mode with LC connectors All fibres are the same length (longest point-to-point), slack is spooled in A-418 Fibre terminates at the cell and fans out (to cell and beam-line EVR.
15 Lab Security Policy BNL / NIST Cybersecurity compliant; e.g., Information Systems (800-53) Remote Access (800-46) Wireless (800-97) Industrial Control Systems (800-82) Central log facilities, preferably encrypted Periodic security scanning (Nessus) of campus attached network devices Strong authentication (CryptoCard, C RSA SecureID) Authorization against lab-wide Active Directory domain Lab configuration guidelines enforced through managed Cfengine
16 Remote Access It is important to determine what methods of remote access will meet the requirements of experimental and scientific staff Cybersecurity policy within the DOE complex is evolving, tighter controls While we will provide SSH gateways for remote access, other potential solutions include: NX and Citrix secure terminal services for remote desktop Secure web access via proxy VPN Will create survey for beamline users Need to know sooner rather than later in order to plan accordingly and within acceptable lab guidelines
17 NX Remote Access NX is an attractive secure remote desktop implementation currently in use within the Controls Group NX components NXServer: allows UNIX system to act as a terminal server, balances request among NXNodes NXNode: support thousands of connections, redistribute sessions among servers, chooses shortest network path to user NXAgent: multiplexes X client connections into single connection NX utilizes highly-efficient X protocol compression Maintains memory cache with high hit rate Encodes and calculates checksums, decodes on the fly 30% reduction of final data stream using ZLIB Can encapsulate RDP (MS) and RFB (VNC) Tunneled via SSH Cryptographic host key exchange
18 Citrix Remote Access Citrix Metaframe (server buffer push, client-side caching) replaced with XenServer Citrix i XenServerarchitecture: Combines Linux Xen Hypervisor & vitual desktop infrastructure (VDI) entire user environment remotely accessed As with other VMs, network traffic is bridged to ensure packet isolation Each user has a dedicated desktop image including OS and applications, OS streamed to desktop on demand Encrypted tunneled connection via SSH or XenAPI SSL network service Cryptographic host key exchange (essentially same as NX) ACLs are enforce client access However, optimal configuration suggests expensive storage backend, infrastructure
19 Conclusion Network is designed to accommodate all control system needs and beamline gigabit Ethernet (GbE) uplink connectivity Network flexibility exists at the beamline, including 10GbE local to the switch but with limited 10GbE into the control network as spec d Many beamlines requiring 10GbE through the control network is acceptable but requires more funding Core network concerns are: Beamline network bandwidth, performance requirements How many network attached devices/beamline? Anticipated bandwidth Future growth External access to control network Is SSH and remote remote desktop access enough? What else?
20 Thanks Questions Comments?
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of
SSL VPN A look at UCD through the tunnel
SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
John Ragan Director of Product Management. Billy Wise Communications Specialist
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, 2015. 20014 IBM Corporation
Boas Betzler Cloud IBM Distinguished Computing Engineer for a Smarter Planet Globally Distributed IaaS Platform Examples AWS and SoftLayer November 9, 2015 20014 IBM Corporation Building Data Centers The
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
Solving I/O Bottlenecks to Enable Superior Cloud Efficiency
WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one
Perspective on secure network for control systems in SPring-8
Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan Contents Network architecture Requirement and design
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
Private cloud computing advances
Building robust private cloud services infrastructures By Brian Gautreau and Gong Wang Private clouds optimize utilization and management of IT resources to heighten availability. Microsoft Private Cloud
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
How To Design A Data Centre
DATA CENTRE TECHNOLOGIES & SERVICES RE-Solution Data Ltd Reach Recruit Resolve Refine 170 Greenford Road Harrow Middlesex HA1 3QX T +44 (0) 8450 031323 EXECUTIVE SUMMARY The purpose of a data centre is
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Whitepaper. 10 Things to Know Before Deploying 10 Gigabit Ethernet
Whitepaper 10 Things to Know Before Deploying 10 Gigabit Ethernet Table of Contents Introduction... 3 10 Gigabit Ethernet and The Server Edge: Better Efficiency... 3 SAN versus Fibre Channel: Simpler and
How To Make A Data Center More Efficient
Data Center: Technology Drivers Infrastructure Trends 40G / 100G Migration Maurice F. Zetena III Vice President Leviton Technology Data Center Group Leviton Network Solutions Technology Drivers Convergence
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50
Question: 1 Which network security strategy element refers to the deployment of products that identify a potential intruder who makes several failed logon attempts? A. test the system B. secure the network
LCLS Network & Support Planning. Terri Lahey
LCLS Network & Support Planning Outline Goal: build production hosts, workstations, & networks Engineering Teams Apply experience and new architectures Integrated Security at SLAC Servers & desktops Network
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Data Center Optimization: Component Choice. Innovative Design. Enabling Infrastructure
Data Center Optimization: Component Choice and Innovative Design Combine to Allow the Creation of an Enabling Infrastructure Data Center Spaces Data Center Spaces as Defined by the TIA 942 Standard Source:
Vyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
ITEC 495 Capstone Project Ideas
ITEC 495 Capstone Project Ideas Open Source Content Filtering OpenDNS A 25 person architectural firm with one single location needs to implement a low cost, secure, easy to deploy and administer web content
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Who s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
Logical & Physical Security
Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole
Implementing Cisco Data Center Unified Computing (DCUCI)
Certification CCNP Data Center Implementing Cisco Data Center Unified Computing (DCUCI) 5 days Implementing Cisco Data Center Unified Computing (DCUCI) is designed to serve the needs of engineers who implement
Oracle SDN Performance Acceleration with Software-Defined Networking
Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN, which delivers software-defined networking, boosts application performance and management flexibility by dynamically connecting
Meraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
Citrix XenDesktop Backups with Xen & Now by SEP
Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5
NetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
KFUPM Enterprise Network. Sadiq M. Sait [email protected]
KFUPM Enterprise Network Sadiq M. Sait [email protected] 1 Outline KFUPM Enterprise Network Diagram KFUPM Network Model KFUPM Backbone Network Connectivity: Academic Buildings, SDN, RAS Major Acheivements
Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks
Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks Todd Bundy Director, Global Alliances-Enterprise ADVA Optical Networking [email protected] 203-746-8060 Connecting
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Technical Brief: Virtualization
Technical Brief: Virtualization Technology Overview Tempered Networks automates connectivity and network security for distributed devices over trusted and untrusted network infrastructure. The Tempered
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
CVE-401/CVA-500 FastTrack
CVE-401/CVA-500 FastTrack Description The CVE-400-1I Engineering a Citrix Virtualization Solution course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate
(VDI) William Stein, LHRIC. Jim Geueke, MainLine
Virtual Desktop Infrastructure (VDI) William Stein, LHRIC Jim Geueke, MainLine Why Desktop Virtualization? Central management of desktop images User receives a fresh image every time Easier Windows OS
Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide
Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation
PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
VMware vsphere-6.0 Administration Training
VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast
Using High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
over Ethernet (FCoE) Dennis Martin President, Demartek
A Practical Guide to Fibre Channel over Ethernet (FCoE) Dennis Martin President, Demartek Demartek Company Overview Industry analysis with on-site test lab Lab includes servers, networking and storage
Cisco Unified Computing Remote Management Services
Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing
Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
Cisco Network Switches Juniper Firewall Clusters
Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Network Technologies for Next-generation Data Centers
Network Technologies for Next-generation Data Centers SDN-VE: Software Defined Networking for Virtual Environment Rami Cohen, IBM Haifa Research Lab September 2013 Data Center Network Defining and deploying
Brocade Solution for EMC VSPEX Server Virtualization
Reference Architecture Brocade Solution Blueprint Brocade Solution for EMC VSPEX Server Virtualization Microsoft Hyper-V for 50 & 100 Virtual Machines Enabled by Microsoft Hyper-V, Brocade ICX series switch,
The Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer
The Future of Computing Cisco Unified Computing System Markus Kunstmann Channels Systems Engineer 2009 Cisco Systems, Inc. All rights reserved. Data Centers Are under Increasing Pressure Collaboration
Dell Virtual Remote Desktop Reference Architecture. Technical White Paper Version 1.0
Dell Virtual Remote Desktop Reference Architecture Technical White Paper Version 1.0 July 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Scalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
Oracle Big Data Appliance: Datacenter Network Integration
An Oracle White Paper May 2012 Oracle Big Data Appliance: Datacenter Network Integration Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Application-Centric WLAN. Rob Mellencamp
Application-Centric WLAN Rob Mellencamp Agenda NX Integrated Services Platform Integrated Services Architecture Application Installation Example Application Monitoring Enterprise Mobility Architecture
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Load Balancing ContentKeeper With RadWare
Load Balancing ContentKeeper With RadWare The RadWare Fireproof may be used with ContentKeeper to provide load balanced and redundant Internet content filtering for your network. The RadWare FireProof
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
SN0054584-00 A. Reference Guide Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
SN0054584-00 A Reference Guide Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP Reference Guide Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP Information
An Oracle White Paper December 2011. Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops
An Oracle White Paper December 2011 Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops Introduction... 2! Design Goals... 3! Architectural Overview... 5! Logical Architecture...
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
Restricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
Unified Storage Networking
Unified Storage Networking Dennis Martin President Demartek Demartek Company Overview Industry analysis with on-site test lab Lab includes servers, networking and storage infrastructure Fibre Channel:
