CARRIER GRADE PROFILE FOR WIND RIVER LINUX

Size: px
Start display at page:

Download "CARRIER GRADE PROFILE FOR WIND RIVER LINUX"

Transcription

1 CARRIER GRADE PROFILE FOR WIND RIVER LINUX Carrier Grade Profile for Wind River Linux meets the registration requirements of the Linux Foundation s Carrier Grade Linux 5.0 specification. As an add-on profile for Wind River Linux 6.0, this turnkey solution delivers all of the technologies essential to building a powerful, flexible, responsive, stable, and secure platform. Built on the Yocto Project Compatible Wind River Linux 6.0 platform, Carrier Grade Profile provides complete architecture support across major BSPs, with increased interoperability allowing changes to fit your future business needs while reducing switching costs and development effort. Backed by our unrivaled global support and services, Carrier Grade Profile provides essential capabilities for all industries, enabling the next generation of embedded Linux designs that require secure, standards-based, and reliable solutions. TABLE OF CONTENTS Technical Specifications... 2 Key Features... 2 Carrier Grade Kernel... 2 Carrier Grade User Space... 3 Broader Testing... 5 Yocto Project Compatibility... 7 Wind River Professional Services... 7 Product Note INNOVATORS START HERE.

2 TECHNICAL SPECIFICATIONS Linux base: Wind River Linux 6.0 Supported processor architectures: Full architecture support for any BSP provided in the Wind River Linux 6.0 base Linux Foundation s Carrier Grade Linux registration: Specification 5.0 Yocto Project version: 1.5 (Wind River Linux 6.0) KEY FEATURES Carrier Grade Kernel The kernel updates in Wind River Linux 6.0 form the basis of many features to support Carrier Grade Linux (CGL) registration, including the following: Error Detection and Correction (EDAC): A set of Linux kernel modules for reporting and handling hardware-related errors Security Enhanced Linux (SELinux): A full-featured Linux Security Module providing a reference monitor capable of providing multilayer security and multi-category security, implementing both mandatory access control (MAC) and role-based access control (RBAC) Integrity Measurement Architecture: Support for run-time validation of executables and critical system files optionally using a hardware Trusted Platform Module Interrupt threading: Configuring interrupt handling and scheduling handler routines as any other software thread, allowing for maximum flexibility and higher predictability when designing a system Logical Volume Management (LVM): The ability to dynamically resize disks on a system according to changing needs Low latency event monitoring: A variant of poll(2) that can be used as either an edge- or a level-triggered interface that scales well to large numbers of watched file descriptors Open Cryptographic Framework: Transparent hardware-accelerated cryptographic support for specific BSPs Redundant array of independent disks (RAID): Both software and hardware RAID support, including striping Reliable file system support: Various highly reliable file systems are supported (e.g., ext4, btrfs, ocfs2) Group management: Support for grouping sets of processes together, for use with process control subsystems such as cpusets, CFS, memory controls, and device isolation; includes net traffic controller, memrlimit controller, dm-ioband bio_tracking, and group scheduling controllers kdump: Kernel crash dump for analyzing the cause of a deployed kernel crash kexec: A system call that provides the ability to shut down the current kernel and start another without rebooting hardware Persistent data storage: Data storage that persists across reboots for storing debug and log information (e.g., pstore, pramfs) Profiling: Support for kernel and system-call profiling through LTTng, oprofile and perf (rich abstractions over hardware performance monitoring capabilities; per-task, per-cpu, and per-workload counters and counter groups and sampling capabilities) 2 Product Note

3 Carrier Grade User Space In addition to the kernel features, the Carrier Grade Profile for Wind River Linux user space is a hardened, reliable base on which to develop applications and systems, whether they are headless, remote systems or must support multiple concurrent users with varying levels of access and clearance. Supported features include the following: SELinux and the Reference Policy SELinux is a full-featured Linux Security Module providing a reference monitor capable of providing multilayer security and multi-category security, implementing both MAC and RBAC. Based on the SELinux official reference policy and the Yocto Project selinux layer, the Wind River SELinux reference policy is tailored to support both strict and mcs modes out of the box. Transparent Inter-process Communication (TIPC) Protocol As a major contributor and one of the maintainers of the TIPC project, Wind River actively develops this cross-platform, high-speed communications technology aimed specifically at clustered computing environments. TIPC is a communications protocol that provides developers with an extremely flexible means of creating distributed, cooperative applications that may migrate as required throughout the cluster seamlessly. Wind River continues to invest in TIPC, and Wind River Linux remains up to date with developments in the TIPC project. Security Originally developed by the National Security Agency (NSA), SELinux is the gold standard of flexible and trusted computing environments. SELinux is both a Linux Security Module (LSM) a piece of the kernel that arbitrates access to all system resources based on the system policy and a collection of supporting user space tools for developing, applying, enforcing, auditing, and debugging the security policy used by the LSM. Wind River Linux includes three levels of security out of the box for SELinux-enabled configurations, based on the SELinux Reference Policy Project and configured specifically for Wind River Linux. Wind River Linux also includes advanced, preemptive security technologies such as multilevel run-time stack and buffer overflow protection and a suite of tools that together provide a complete intrusion detection and prevention system. Reliability, Availability, Manageability Carrier Grade Profile meets the SCOPE Alliance Linux profile and addresses key SCOPE Alliance gaps. Relevant features include persistent shared memory with the system black box, coherent user and kernel tracing framework with LTTng, run-time analysis tools, and common command-line tools such as strace and ltrace for doing system call and library tracing. 3 Product Note

4 The following Carrier Grade Profile features go beyond the existing CGL requirements: Coarse resource enforcement that allows memory and scheduling limits to be enforced on a group basis rather than per process or per object Layer 2 Tunneling Protocol (L2TP version 3) support File access tracing that provides extensive logging and notification options for monitoring file access and recording system events Redundant virtual routing support, based on the Common Address Redundancy Protocol, that provides the ability to create highly available dynamic routers and gateways Feature-rich IPsec environment ranging from simple certificate creation and management to cryptographic reliability and integrity self-tests Dynamic multi-category security management tools for virtual guests through libvirt and the SELinux svirt tools Support for advanced system architectures that leverage memory and processor latency domains with tools such as numactl and libnuma that enable application and system designers to get the best performance out of their real and virtual machines Reliable damage-resistant file system support, detailed in the CGL 5.0 specification, including data and metadata integrity checking mechanisms With support for standalone and clustered systems as well as the PICMG Advanced Telecommunications Computing Architecture (ATCA) specification, Carrier Grade Profile provides highly available solutions for devices at the network core and edge. Network-Based Storage Solutions Carrier Grade Profile provides functionality for centralized logging servers, centralized billing and accounting servers, and share file system servers by integrating technologies such as the distributed replicated block device (DRBD), multiple redundant communication paths to external storage over fiber channel links, ATA over Ethernet, the Oracle Cluster File System version 2 (OCFS2), and Internet Small Computer System Interface (iscsi). IP Security (IPsec) Carrier Grade Profile supports a number of mechanisms for establishing trust between two systems with IPsec, the most common being Internet Key Exchange (IKE, both version 1 and version 2). IKE sets up a shared session secret via a Diffie-Hellman key exchange, using either public key techniques or a pre-shared key. IKE functionality can come from the IPsec- Tools suite in the form of the racoon daemon, from the standalone Racoon2 daemon, or from a dedicated IPsec implementation provided by strongswan. All of the expected standards (for example, X.509 for single sign-on, AH and ESP for header and payload encapsulation, IKEv2 for mobile devices via MOBIKE RFC 4555, HMAC-SHA-256+/RFC 4868 and Suite B cryptography/rfc 4869 for IPSec) are available through IPsec-Tools, Racoon2, or the strongswan suite. 4 Product Note

5 Broader Testing Wind River is committed to implementing and conforming to standards wherever possible. That commitment extends well beyond the Linux Foundation s Carrier Grade specification. As with past releases of Wind River Linux, Carrier Grade Profile for Wind River Linux provides all the necessary tools to validate conformance to the Linux Standard Base 4.1 Specification. Wind River Linux 6.0 is IPv6-Ready and certified. Carrier Grade Profile is not certified, but maintains the IPv6-Ready status and can be certified if required. Carrier Grade Profile is the first version of Wind River Linux to undergo IPv4 conformance testing, resulting in a more complete, interoperable product, and a more complete view of platforms based on it. Wind River has developed a robust, scalable, and automated build and test infrastructure with more than 4,000 test cases and 301,336 test runs. This infrastructure supports many processor architectures and uses a combination of commercial, open source, and proprietary tests, including LTP Core, LTP Network, LSB, TAHI, and Open POSIX. Wind River uses coverage tools, such as gcov and lcov, to optimize test development and close gaps in existing test suites. Automated and manual tests include the following: Automated boot login: This tests the booting process of any target architecture for a given kernel and rootfs. The process is completely automated for a set of targets, which helps in determining the boot sanity of the target. CD sanity: This automation suite covers CD installation on a new release, followed by building the rootfs for various target combinations using prebuilt RPMs. It boots the target with the prebuilt kernel and rootfs and executes KGDB and user-mode tests on the target, then reports the results to the database. Linux Test Project (LTP): This test suite validates the reliability, robustness, and stability of the Linux kernel and its network components. Open Hardware Platform Interface (HPI): The Open HPI is an abstracted interface for managing computer hardware, typically chassis and rack-based servers. It includes resource modeling; access to and control over sensor, control, watchdog, and inventory data associated with resources; abstracted System Event Log interfaces; hardware events and alarms; and a managed hotswap interface. Open POSIX: This test suite is for POSIX 2001 APIs not tied to specific implementations. It provides conformance, functional, and stress testing, with an initial focus on threads, clocks and timers, signals, message queues, and semaphores. Real-Time Feature Testing with Lmbench Realfeel: Real-Time Feature Testing tests performance. Lmbench is used to measure I/O of the kernel. Realfeel tests scheduler behavior. 5 Product Note

6 Saftest: Saftest tests the Open HPI package. Kernel Feature Test Package (kftp): This package tests kernel features against architecture and hardware configurations. User space: User space tests verify that user packages have compiled and operated correctly in target run-time systems. Toolchain: This verifies that toolchains comply and operate correctly in target run-time systems. nmap: This is a network exploration tool and security scanner. Netperf: This tool tests networking performance. CGL compliance: This tests more than 120 P1 requirements. kexec and core-dump, server-based install: This tests CGL features. TAHI IPv6 conformance: The TAHI Project is a joint effort to develop and provide verification technology for IPv6. The TAHI IPv6 conformance tests ensure interoperability with IPv6 protocols. iozone: This is a file system performance test tool. nbench byte: This tests CPU calculation performance. Footprint: This tests the static kernel footprint. Static rootfs footprint: This tests the static rootfs footprint size. Dynamic footprint: This tests the run-time system footprint. Boot-time: This measures board boot-up time. Coverity: The system is tested using Coverity static analysis software. Board-specific: Along with new BSPs, there are board-specific tests mentioned in the board readme file. Documentation: Documentation for Wind River Linux 6.0 was tested to make sure all steps are properly recorded. Host OS: Installation is tested on various host operating systems supported for Wind River Linux 6.0, as well as sample application build and debugging from Wind River Workbench and platform build. HRT regression: HRT features for previous releases were tested for regression on the supported platforms. Install bundle: Installation testing was done for various product structure bundles. Regression testing (RT) regression: RT features in previous releases were tested for regression on the supported platforms. Use case: The use cases for Workbench, run-time analysis tools, and build system were tested on supported hosts and platforms. Workbench integration: Wind River tests the feature integration of Workbench with Wind Manage, System Viewer, and run-time analysis tools. 6 Product Note

7 Yocto Project Compatibility Similar to an OpenEmbedded metadata layer, Carrier Grade Profile for Wind River Linux builds on top of the Yocto Project Compatible base of Wind River Linux 6.0. The OpenEmbedded meta-networking layer is the foundation layer between the Yocto Project and Carrier Grade Profile. Meta-networking provides common services required in carrier grade systems (e.g., File Transfer Protocol (FTP) daemons and network configuration, and authentication tools like autofs and Network Information Service (NIS)). Carrier Grade Profile provides more complex components (e.g., Cluster management services like the Corosync Cluster Engine) that assume the presence of such infrastructure in the underlying layers. Carrier Grade Profile also draws upon the meta-selinux layer, leveraging the work done by the OpenEmbedded community to integrate SELinux features into the Yocto base. Carrier Grade Profile also extends meta-selinux upward in order to fully provide the features required by the Security Requirements Definition of the CGL specification. WIND RIVER PROFESSIONAL SERVICES Wind River has the proven expertise to customize Carrier Grade Profile for Wind River Linux platforms to your unique device requirements and maintain the stack for the long term. Our embedded Linux experts can help you plan, build, and manage even the most advanced and mission-critical Yocto Project Compatible software. Take your product to the next level with these solutions: Embedded Linux architecture and design Yocto Project Compatible BSP factory BSP creation, compatibility submission, and maintenance Support for ARM, IA, PPC, MIPS Yocto Project Compatible and carrier grade middleware and kernel development Networking, security, medical Real-time, graphics Migration from roll-your-own or hardware vendor provided Linux to Carrier Grade Profile for Wind River Linux Acceleration of embedded multi-core Linux designs using open source and Wind River Hypervisor based virtualization Benchmark, functional, and performance testing and documentation IP compliance and results documentation and analysis based on the Linux Foundation s Software Package Data Exchange (SPDX) specification Long-term support and maintenance of your Yocto Project Compatible custom software Wind River Professional Services can help you meet your robustness, functionality, and security requirements to rapidly and cost-efficiently deliver your next-generation embedded Carrier Grade Linux device. 7 Product Note

8 SUPPORT CONTACTS North America, South America, Asia/Pacific Toll-free tel.: (800-USA-4WRS) Tel.: Fax: Hours: 6:00 a.m. 5:00 p.m. (Pacific time) Japan Tel.: Fax: Hours: 9:00 a.m. 5:30 p.m. (local time) Europe, Middle East, Africa support-ec@windriver.com Toll-free tel.: France tel.: France fax: Germany tel.: Germany fax: Italy tel.: Italy fax: Middle East Region tel.: Middle East Region fax: Nordic tel.: Nordic fax: UK tel.: UK fax: Hours: 9:00 a.m. 6:00 p.m. (local time) Wind River is a world leader in embedded software for intelligent connected systems. The company has been pioneering computing inside embedded devices since 1981, and its technology is found in nearly 2 billion products. To learn more, visit Wind River at Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems,Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev. 01/2015

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data

More information

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components

More information

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

WIND RIVER INTELLIGENT DEVICE PLATFORM XT WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but

More information

Management of VMware ESXi. on HP ProLiant Servers

Management of VMware ESXi. on HP ProLiant Servers Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................

More information

COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications

COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications COMPUTING Data Sheet Centellis VP provides the hardware and software platform to deploy carrier grade virtualized applications. Application virtualization software framework based on industry standard

More information

White Paper. Real-time Capabilities for Linux SGI REACT Real-Time for Linux

White Paper. Real-time Capabilities for Linux SGI REACT Real-Time for Linux White Paper Real-time Capabilities for Linux SGI REACT Real-Time for Linux Abstract This white paper describes the real-time capabilities provided by SGI REACT Real-Time for Linux. software. REACT enables

More information

Using Linux in Medical Devices: What Developers and

Using Linux in Medical Devices: What Developers and Using Linux in Medical Devices: What Developers and Manufacturers Need to Know By Ken Herold, Engineering Specialist, Wind River INNOVATORS START HERE. EXECUTIVE Overview Linux is the operating system

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS. By Alex Wilson, Director of Business Development, Aerospace and Defense

SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS. By Alex Wilson, Director of Business Development, Aerospace and Defense SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS By Alex Wilson, Director of Business Development, Aerospace and Defense EXECUTIVE SUMMARY Cost efficiency and affordability will always be key

More information

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com Next Generation Now: Virtualization A Unique Cloud Approach Jeff Ruby Channel Manager jruby@redhat.com Introducing Extensive improvements in every dimension Efficiency, scalability and reliability Unprecedented

More information

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote. Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.

More information

RED HAT ENTERPRISE VIRTUALIZATION

RED HAT ENTERPRISE VIRTUALIZATION Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April

More information

CGL Architecture Specification

CGL Architecture Specification CGL Architecture Specification Mika Karlstedt Helsinki 19th February 2003 Seminar paper for Seminar on High Availability and Timeliness in Linux University of Helsinki Department of Computer science i

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

CHOOSING LINUX FOR MEDICAL DEVICES

CHOOSING LINUX FOR MEDICAL DEVICES Advantages, Issues, and Recommendations for Device Manufacturers By Ken Herold, Engineering Specialist, Medical and Security Solutions INNOVATORS START HERE. EXECUTIVE SUMMARY Linux is the operating system

More information

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges

More information

IPv6 Security: How is the Client Secured?

IPv6 Security: How is the Client Secured? IPv6 Security: How is the Client Secured? Jeffrey L Carrell Network Conversions Network Security Consultant 1 IPv6 Security: How is the Client Secured? IPv6/IPsec IPsec Challenges IPsec Monitoring/Management

More information

FOR SERVERS 2.2: FEATURE matrix

FOR SERVERS 2.2: FEATURE matrix RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,

More information

RED HAT ENTERPRISE VIRTUALIZATION 3.0

RED HAT ENTERPRISE VIRTUALIZATION 3.0 OVERVIEW Red Hat Enterprise Virtualization (RHEV) is a complete virtualization management solution for server and desktop virtualization and the first enterprise-ready, fully open-source virtualization

More information

RedHat (RHEL) System Administration Course Summary

RedHat (RHEL) System Administration Course Summary Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with

More information

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web:

More information

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications White Paper Wind River Hypervisor and Operating Systems Intel Processors for Embedded Computing Applying Multi-core and Virtualization to Industrial and Safety-Related Applications Multi-core and virtualization

More information

What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.

What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4

More information

RED HAT ENTERPRISE VIRTUALIZATION 3.0

RED HAT ENTERPRISE VIRTUALIZATION 3.0 FEATURE GUIDE RED HAT ENTERPRISE VIRTUALIZATION 3.0 OVERVIEW Red Hat Enterprise Virtualization (RHEV) is a complete virtualization management solution for server and desktop virtualization and the first

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems

More information

2 Purpose. 3 Hardware enablement 4 System tools 5 General features. www.redhat.com

2 Purpose. 3 Hardware enablement 4 System tools 5 General features. www.redhat.com A Technical Introduction to Red Hat Enterprise Linux 5.4 The Enterprise LINUX Team 2 Purpose 3 Systems Enablement 3 Hardware enablement 4 System tools 5 General features 6 Virtualization 7 Conclusion www.redhat.com

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite from Extreme Networks is a scalable full-featured network management tool that simplifies configuration, troubleshooting and status monitoring

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

QLogic 16Gb Gen 5 Fibre Channel in IBM System x Deployments

QLogic 16Gb Gen 5 Fibre Channel in IBM System x Deployments QLogic 16Gb Gen 5 Fibre Channel in IBM System x Deployments Increase Virtualization Density and Eliminate I/O Bottlenecks with QLogic High-Speed Interconnects Key Findings Support for increased workloads,

More information

BUSINESS INTELLIGENCE ANALYTICS

BUSINESS INTELLIGENCE ANALYTICS SOLUTION BRIEF > > CONNECTIVITY BUSINESS SOLUTIONS FOR INTELLIGENCE FINANCIAL SERVICES ANALYTICS 1 INTRODUCTION It s no secret that the banking and financial services institutions of today are driven by

More information

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu PeteDulany@yahoo.com, ChangSooKim@yahoo.com, jyu@cs.depaul.edu School of Computer Science,

More information

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to Hanspeter Vogel Triadem Solutions AG Real-Time Systems GmbH Gartenstrasse 33 D-88212 Ravensburg Germany

More information

Red Hat Enterprise Linux as a

Red Hat Enterprise Linux as a Red Hat Enterprise Linux as a file server You re familiar with Red Hat products that provide general-purpose environments for server-based software applications or desktop/workstation users. But did you

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

Network connectivity controllers

Network connectivity controllers Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially

More information

Virtualized Network Services SDN solution for service providers

Virtualized Network Services SDN solution for service providers Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers

More information

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010 Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010 Giuseppe Gippa Paterno' Solution Architect EMEA Security Expert gpaterno@redhat.com Who am I Currently Solution Architect and EMEA Security

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Cisco Wireless Security Gateway R2

Cisco Wireless Security Gateway R2 Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

INFOBrief. Red Hat Enterprise Linux 4. Key Points

INFOBrief. Red Hat Enterprise Linux 4. Key Points INFOBrief Red Hat Enterprise Linux 4 Key Points Red Hat Enterprise Linux 4 (RHEL 4) is the first release from Red Hat to support the 2.6 operating system kernel. This is a significant release as it contains

More information

Bivio 7000 Series Network Appliance Platforms

Bivio 7000 Series Network Appliance Platforms W H I T E P A P E R Bivio 7000 Series Network Appliance Platforms Uncompromising performance. Unmatched flexibility. Uncompromising performance. Unmatched flexibility. The Bivio 7000 Series Programmable

More information

VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8. VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8

VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8. VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8 VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8 VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8 Copyright 2009 Wind River Systems, Inc. All rights reserved. No part of this publication

More information

Windows Server Virtualization An Overview

Windows Server Virtualization An Overview Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.

More information

Red Hat Enterprise Linux 6 Server:

Red Hat Enterprise Linux 6 Server: Tech notes Red Hat Enterprise Linux 6 Server: FEATURES AND BENEFITS Red Hat Enterprise Linux 6 is the best platform to tranform current and future technology innovations into the best value and scale for

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell PowerVault storage solutions, based on the Microsoft

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Oracle Solaris: Aktueller Stand und Ausblick

Oracle Solaris: Aktueller Stand und Ausblick Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It

More information

OpenClovis Product Presentation

OpenClovis Product Presentation OpenClovis Product Presentation 2014 Corporate Background! Founded in 2002! Open Source business model! Profitable since 2008! $40M invested on products! Product Release 6.0 is mature and shipping! SAF

More information

Dell High Availability Solutions Guide for Microsoft Hyper-V

Dell High Availability Solutions Guide for Microsoft Hyper-V Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

ENTERPRISE LINUX SYSTEM ADMINISTRATION

ENTERPRISE LINUX SYSTEM ADMINISTRATION ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR CERN-ATS-2011-200 A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS F. Ehm, A. Dworak, CERN, Geneva, Switzerland Abstract

More information

A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011

A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users

More information

Oracle Linux Advanced Administration

Oracle Linux Advanced Administration Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Linux Advanced Administration Duration: 5 Days What you will learn This Oracle Linux Advanced Administration training is

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

SECURITY IN THE INTERNET OF THINGS

SECURITY IN THE INTERNET OF THINGS The Intelligence in the Internet of Things SECURITY IN THE INTERNET OF THINGS Lessons from the Past for the Connected Future By AJ Shipley, Senior Director, Security Solutions, Wind River INNOVATORS START

More information

Red Hat. www.redhat.com. By Karl Wirth

Red Hat. www.redhat.com. By Karl Wirth Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always

More information

Brocade Solution for EMC VSPEX Server Virtualization

Brocade Solution for EMC VSPEX Server Virtualization Reference Architecture Brocade Solution Blueprint Brocade Solution for EMC VSPEX Server Virtualization Microsoft Hyper-V for 50 & 100 Virtual Machines Enabled by Microsoft Hyper-V, Brocade ICX series switch,

More information

Company & Solution Profile

Company & Solution Profile Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Open-E Data Storage Software and Intel Modular Server a certified virtualization solution

Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Contents 1. New challenges for SME IT environments 2. Open-E DSS V6 and Intel Modular Server: the ideal virtualization

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

EECatalog SPECIAL FEATURE

EECatalog SPECIAL FEATURE Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that

More information

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management streamline management and cut administrative costs with the alcatel-lucent VitalQIP

More information

Red Hat Global File System for scale-out web services

Red Hat Global File System for scale-out web services Red Hat Global File System for scale-out web services by Subbu Krishnamurthy (Based on the projects by ATIX, Munich, Germany) Red Hat leads the way in delivering open source storage management for Linux

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

SECURITY IN THE INTERNET OF THINGS

SECURITY IN THE INTERNET OF THINGS Lessons from the Past for the Connected Future INNOVATORS START HERE. EXECUTIVE SUMMARY Although it has been with us in some form and under different names for many years, the Internet of Things (IoT)

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

Network Function Virtualization Using Data Plane Developer s Kit

Network Function Virtualization Using Data Plane Developer s Kit Network Function Virtualization Using Enabling 25GbE to 100GbE Virtual Network Functions with QLogic FastLinQ Intelligent Ethernet Adapters DPDK addresses key scalability issues of NFV workloads QLogic

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

Resource Utilization of Middleware Components in Embedded Systems

Resource Utilization of Middleware Components in Embedded Systems Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system

More information

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1 CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation

More information

Delivers high performance, reliability, and security. Is certified by the leading hardware and software vendors

Delivers high performance, reliability, and security. Is certified by the leading hardware and software vendors Datasheet Red Hat Enterprise Linux 6 Red Hat Enterprise Linux is a high-performing operating system that has delivered outstanding value to IT environments for nearly a decade. As the world s most trusted

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms

More information

iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs

iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs iscsi Boot Functionality: Diskless Booting Enables SANlike Benefits at Lower Costs and Dated: June 2007 Page 1 of 7 8/10/2007 Copyright 2003-2007 All Rights Reserved No part of this document may be reproduced,

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

OVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST

OVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST OVERVIEW SCALABILITY SECURITY LOW COST WHAT WE DO WHAT IS THE SOLUTION JOIN OVA OUR MISSION JOIN US OPEN SOURCE OVIRT USE CASES MEMBERS GET LINUX HYPERVISOR Virtually Unmatched. Get to know. Low cost,

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS WHITEPAPER RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS INTRODUCTION The cloud is more than a marketing concept. Cloud computing is an intentional, integrated architecture

More information

Rcore Embedded Software Platform

Rcore Embedded Software Platform Industrial Computing Rcore Embedded Software Platform The high reliability and stability of Moxa s embedded computers give our customers an edge over the competition. Moxa s Rcore embedded software platform

More information

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center IOTIVITY AND EMBEDDED LINUX SUPPORT Kishen Maloor Intel Open Source Technology Center Outline Brief introduction to IoTivity Software development challenges in embedded Yocto Project and how it addresses

More information

Set Up a VM-Series Firewall on an ESXi Server

Set Up a VM-Series Firewall on an ESXi Server Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

- An Essential Building Block for Stable and Reliable Compute Clusters

- An Essential Building Block for Stable and Reliable Compute Clusters Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative

More information

#311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux

#311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux #311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux Work experience 2010 - Prevas Freelance Consultant 2007 2009 TietoEnator A/S Software Developer 2000 2007 Ericsson Telebit A/S Software

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information