NSLS-II Control System Network Architecture



Similar documents
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center

SSL VPN A look at UCD through the tunnel

Network Design. Yiannos Mylonas

IP Telephony Management

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

John Ragan Director of Product Management. Billy Wise Communications Specialist

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Perspective on secure network for control systems in SPring-8

Networking Devices. Lesson 6

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Brocade One Data Center Cloud-Optimized Networks

Data Center Networking Designing Today s Data Center

Private cloud computing advances

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

How To Design A Data Centre

Network Access Security. Lesson 10

Whitepaper. 10 Things to Know Before Deploying 10 Gigabit Ethernet

How To Make A Data Center More Efficient

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Steelcape Product Overview and Functional Description

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

LCLS Network & Support Planning. Terri Lahey

Network Virtualization Network Admission Control Deployment Guide

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Data Center Optimization: Component Choice. Innovative Design. Enabling Infrastructure

Vyatta Network OS for Network Virtualization

Associate in Science Degree in Computer Network Systems Engineering

AppDirector Load balancing IBM Websphere and AppXcel

Troubleshooting and Maintaining Cisco IP Networks Volume 1

ITEC 495 Capstone Project Ideas

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

RuggedCom Solutions for

ADVANCED NETWORK CONFIGURATION GUIDE

Who s Endian?

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

Logical & Physical Security

Implementing Cisco Data Center Unified Computing (DCUCI)

Oracle SDN Performance Acceleration with Software-Defined Networking

Meraki MX Family Cloud Managed Security Appliances

Citrix XenDesktop Backups with Xen & Now by SEP

NetScaler VPX FAQ. Table of Contents

Lecture 02b Cloud Computing II

KFUPM Enterprise Network. Sadiq M. Sait

Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks

Observer Probe Family

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

Technical Brief: Virtualization

SAN Conceptual and Design Basics

CVE-401/CVA-500 FastTrack

(VDI) William Stein, LHRIC. Jim Geueke, MainLine

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Chapter 3. Enterprise Campus Network Design

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

VMware vsphere-6.0 Administration Training

Using High Availability Technologies Lesson 12

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

over Ethernet (FCoE) Dennis Martin President, Demartek

Cisco Unified Computing Remote Management Services

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Chapter 1 Reading Organizer

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Cisco Network Switches Juniper Firewall Clusters

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

APPENDIX 3 LOT 3: WIRELESS NETWORK

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Technologies for Next-generation Data Centers

Brocade Solution for EMC VSPEX Server Virtualization

The Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer

Dell Virtual Remote Desktop Reference Architecture. Technical White Paper Version 1.0

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Scalable Approaches for Multitenant Cloud Data Centers

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

Oracle Big Data Appliance: Datacenter Network Integration

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Security. TestOut Modules

Application-Centric WLAN. Rob Mellencamp

Implementing Cisco IOS Network Security

Load Balancing ContentKeeper With RadWare

WAN Failover Scenarios Using Digi Wireless WAN Routers

SN A. Reference Guide Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP

An Oracle White Paper December Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops

Recommended IP Telephony Architecture

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Restricted Document. Pulsant Technical Specification

Unified Storage Networking

Transcription:

NSLS-II Control System Network Architecture Robert Petkus NSLS-II Controls Group NSLS-II Data Acquisition Workshop April 20, 2010

Overview Introduction, areas of responsibility Control network overview Control network components Beamline - Control System network access Impact of DAQ on network Timing system and beamlines Lab security policies Remote access Remote access NX and Citrix i closer look Conclusion

Introduction and Scope Areas of responsibility Control system network architecture Multilayer Ethernet switches, media converters, security appliances Cable and fibre optic distribution for control and instrumentation, timing, and fast orbit feedback systems Related server infrastructure File and name servers, gateways, databases, archivers, modeling systems, display managers, monitoring services, and boot servers What we provide to beamlines (network): Ethernet switch, EVR (1 st 6 BLs), EPICS gateway, and connectivity (fibre) to beamline Secure terminal services (NX, Citrix) and ssh gateways to control resources What we don t provide (network): Access to BNL campus network and administrative/computing resources Cabling or switch (to campus), network configuration (MAC registration), etc.

Control Network Overview Provide connectivity to all subsystems required for control and operation of the accelerator and beamlines Designed to be fault-tolerant, scalable, and high performance Network is private and secure traffic is not routed to the BNL campus LAN NIST/BNL Cybersecurity compliant No email, web-surfing, network cross-pollination Resources 100% dedicated to controls and instrumentation Network is broadly defined as both Control (global) and Instrumentation (local) featuring VLANs segmenting traffic for performance and ACLs to control access to resources Network perimeter security to deny unauthorized, rogue access QoS and storm control functionality Robust monitoring and EPICS integration

Control Network

Control Network Edge Switches & Cabling Edge Switches Managed 8-port GbE, line-rate, multi-layer Redundant uplinks to core 10GbE ready All potential ti edge switches have been evaluated including *Brocade, *Juniper, *Force10, Cisco, 3Com Brocade GS648 Single Cell, Mezzanine Juniper EX4200 Force10 S50N Cat 6 patch panels and cable tie each rack group (6 total) to the (2) edge switches located in each cell.

Fibre Distribution Control Network Fibre radiates both clock and counter-clockwise around the ring in mezzanine cable trays (2) 60-fibre bundles SMF in each direction; i.e., 60-fibres cells 1-15, 60-fibres cells 16-30 Total (8) drops / cell future capacity Laser-optimized MM (OM3 50/125µm) and SM fibre utilized for 10GE capacity Control Network

Core Control Network Evaluated Brocade, Juniper, Force10 core OS functionality Control core switch characteristics Brocade MLX-16 Juniper EX-8208 Enterprise-grade: robust, scalable, reliable, fault Force10 600i tolerant Redundant power, routing and crossbar switching modules High performance ensure control network is not bandwidth limited Line-rate GbE/10GbE on every port (10GbE can be oversubscribed depending on requirements) Switch failover using virtualization, VRRP

Beam Line Network Connectivity to control network via MMF via mezzanine cable-tray complex and down over-hang Control group provides Ethernet switch and connectivity Beam lines are assigned to their own VLANs Channel Access Gateways bridge between BL hardware and ours External access to workstations achievable using NX/SSH and/or Citrix Key, certificate, 2-factor authentication (TBD) Policy: Users must have valid BNL account DAQ: Given a clear set of requirements, the network architecture is flexible enough to accommodate a high performance distributed or centralized file manager or database. E.g., Hadoop, GlusterFS, Hypertable, MongoDB, etc. Network options at the beam-line can be tailored to need (e.g., 10GbE uplinks) However, 10GbE uplinks at a majority of beamlines will require an additional network layer

Impact of DAQ Storage on Control Network Case 1: BYO storage (NSLS-I) Beamlines provide and manage their own DAQ storage E.g., small Linux file server, external SATA disk drives, etc. Pros Low cost, private/proprietary data kept off network & shared storage, no impact on network Cons Poor performance, irrecoverable and/or lost data, not scalable, physical security concerns

Impact of DAQ Storage on Control Network Case 2: High performance local or localized distributed storage Experiments requiring higher performance storage for DAQ deploy it at beamline Data can reside locally yyet potentially participate in a distributed system Data can be scheduled to be shipped for analysis and/or archival Pros Network traffic is local to the beamline switch Scalable buy only what is required Flexible experiments get tailored solution (e.g., SSD disks) vs. one-size fits all Cons Learning-curve, expertise Maintenance, administration Physical security, environmental concerns

Impact of DAQ Storage on Control Network Case 3: High performance central storage solution A centralized or centrally-located distributed storage solution is deployed in a data center somewhere. All beamlines read and write data to this location. Pros Fully, managed solution, presumably backed-up and with a full support contract Can be high-performance Proximity to analysis facilities Cons Expensive Strain on network fabric Performance traits may be adequate for some but not all Privacy concerns data residing on shared storage

Example DAQ System Network Impact

Timing System and Beamlines As with the control network, timing system fibre originates in A-418 (Computer Room) Fibre travels both clock and counter-clockwise, ½ way around ring. Distribution composed of individual duplex fibres, not a bundle All fibre is multi-mode with LC connectors All fibres are the same length (longest point-to-point), slack is spooled in A-418 Fibre terminates at the cell and fans out (to cell and beam-line EVR.

Lab Security Policy BNL / NIST Cybersecurity compliant; e.g., Information Systems (800-53) Remote Access (800-46) Wireless (800-97) Industrial Control Systems (800-82) Central log facilities, preferably encrypted Periodic security scanning (Nessus) of campus attached network devices Strong authentication (CryptoCard, C RSA SecureID) Authorization against lab-wide Active Directory domain Lab configuration guidelines enforced through managed Cfengine

Remote Access It is important to determine what methods of remote access will meet the requirements of experimental and scientific staff Cybersecurity policy within the DOE complex is evolving, tighter controls While we will provide SSH gateways for remote access, other potential solutions include: NX and Citrix secure terminal services for remote desktop Secure web access via proxy VPN Will create survey for beamline users Need to know sooner rather than later in order to plan accordingly and within acceptable lab guidelines

NX Remote Access NX is an attractive secure remote desktop implementation currently in use within the Controls Group NX components NXServer: allows UNIX system to act as a terminal server, balances request among NXNodes NXNode: support thousands of connections, redistribute sessions among servers, chooses shortest network path to user NXAgent: multiplexes X client connections into single connection NX utilizes highly-efficient X protocol compression Maintains memory cache with high hit rate Encodes and calculates checksums, decodes on the fly 30% reduction of final data stream using ZLIB Can encapsulate RDP (MS) and RFB (VNC) Tunneled via SSH Cryptographic host key exchange

Citrix Remote Access Citrix Metaframe (server buffer push, client-side caching) replaced with XenServer Citrix i XenServerarchitecture: Combines Linux Xen Hypervisor & vitual desktop infrastructure (VDI) entire user environment remotely accessed As with other VMs, network traffic is bridged to ensure packet isolation Each user has a dedicated desktop image including OS and applications, OS streamed to desktop on demand Encrypted tunneled connection via SSH or XenAPI SSL network service Cryptographic host key exchange (essentially same as NX) ACLs are enforce client access However, optimal configuration suggests expensive storage backend, infrastructure

Conclusion Network is designed to accommodate all control system needs and beamline gigabit Ethernet (GbE) uplink connectivity Network flexibility exists at the beamline, including 10GbE local to the switch but with limited 10GbE into the control network as spec d Many beamlines requiring 10GbE through the control network is acceptable but requires more funding Core network concerns are: Beamline network bandwidth, performance requirements How many network attached devices/beamline? Anticipated bandwidth Future growth External access to control network Is SSH and remote remote desktop access enough? What else?

Thanks Questions Comments?