Managing Networks, Users & Applications in the New Millennium

Size: px
Start display at page:

Download "Managing Networks, Users & Applications in the New Millennium"

Transcription

1 Managing Networks, Users & Applications in the New Millennium John Thomas 1

2 Agenda What is Network Management? Current Architecture(s) Two New Architectures Examples Concluding Remarks 2

3 Network Management s Primary Role Validate user experience connectivity, response times Anticipate network change failures, growth, user mobility, new apps online Enforce conformance with corporate policies user auditing/control, user/application differentiation Report findings to management who s not happy, what s my ROI Identify how to leverage network as an asset marketing! 3

4 NetMgmt Must Grow w/ Networking Trends Users more mobile, demanding & skilled expected to conform to corporate policies (e.g. URL blocking) Applications more delay sensitive, bandwidth hungry (aka multimedia) unsupported apps on network (e.g. DOOM) Both Users & Applications Have Increased dependency on network Require Service Level differentiation 4

5 NetMgmt Must Grow w/ Networking Trends New Network Designs Intranets Extranets VPNs Traffic Patterns (e.g. unexpected congestion points) increasingly short-lived flows (e.g. WEB) dynamic ports encryption n-tiered architectures 5

6 Agenda What is Network Management? Current Architecture(s) Two New Architectures Examples Concluding Remarks 6

7 Current Network Management Architecture 3rd Party Apps Cisco Apps SAP BMC Patrol MRTG NMS Platform Standardsbased protocols Intelligent Network Devices NMS Framework e.g. HP OV SNMP SNMP, RMON, Telnet, ICMP Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 7

8 SNMP owned the 90s Motivation behind SNMP manage heterogeneous networking devices (not systems, users or applications) enhancement of SGMP console consolidation SNMP Architecture Intelligent Managers, dumb Agents TRAP-directed polling (unreliable) Clear-text communities MIBs document what is available from a device 8

9 SNMP Needs help in the 00s SNMP is practical & will live-on, but Security in V3 required for more configuration control Unwieldy instancing/indexing makes life difficult Not Extranet friendly (typically not allowed thru FW) MIB s continue to pro-create, but don t define relationships 9

10 NMS/Frameworks Still useful But - eliminate duplication of efforts (e.g. fault mgmt) provide structured, documented integration Proprietary APIs slow development from ISVs Integration today requires application co-location, which complicates software install system admin & maintenance Common place to represent each device, but not store it s information 10

11 Report Card - Current Network Management Architecture Apps #1 App #2 App #3 App #4 NMS SNMP, RMON, Telnet, ICMP Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 11

12 What will happen to our friends? SNMP will continue to be a good data collection mechanism You can manage a device with SNMP, not a network Remember - Simple Network Management Protocol NMS Frameworks become a node on the Management Intranet the architectures of the prior generation of management products are not likely to dominate the market over the next five years September 1999 Susan Aldrich - Patricia Seybold Group James Herman & Theodore Forbath - Northeast Consulting Resources 12

13 Agenda What is Network Management? Current Architecture(s) Two New Architectures - WBEM - DEN Examples Concluding Remarks 13

14 WBEM Network Management Architecture XML/CIM Management Intranet BMC Patrol Cisco App #1 NMS App #n Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 14

15 WBEM Built Upon DMTF s CIM WBEM initiative Cisco, Compaq, Microsoft, Intel, BMC - Build a Common Information Model(CIM) for management - Harness the power of the Web for management interoperation => CIM & XML make up the WBEM core technology 15

16 So What is CIM? The Common Information Model (CIM) defines the Schemas used to represent the real-world objects being managed. CIM uses an objectoriented paradigm, where manageable objects and their inter-relationships are modeled using the concepts of classes and instances. Vendors extend the standard classes to represent unique feature/functions. It may be helpful to think of CIM as standard and extended MIBs that also include relationship definitions 16

17 What Is CIM(2)? An object-oriented information model A conceptual framework within which any information system may be modeled independent of repository and implementation standardizes data and reduces its complexity Supports enterprise-wide (vs. node-centric) management of data Allows integration of management information from different sources with different syntaxes 17

18 What is CIM (3)? Core Model Captures information that is applicable to all knowledge domains Common Models Information common to particular management areas, but independent of a particular technology or implementation. Include Systems, Applications, Devices, Networks, Databases, and Events Extension Models Represent vendor or technology-specific extensions that are often dependent on a particular environment or platform 18

19 Why Object Oriented? Why Not Just a Schema Network elements and services differ from other directory objects Standard objects are simple and exist within static boundaries a user is always a user Network elements and services are complex objects and exist in a constantly changing environment a modular switch can change functions Product Service Network Device Customer Must model the interaction between network elements, network services, the network, and clients of the network 19

20 Elements of CIM CIM object-oriented building blocks Object Class (type) Inheritance (reuse, vendor extension) Associations and aggregations (relationships between objects) Cardinality (number of components that participate in each side of a relationship) Methods (interaction with objects) Constraints and meta-data (how an object or relationship is used) Perhaps CIM s most important differentiator from previous standards is its ability to show the relationships between different elements and components that make up a computer system or a corporate network Elisabeth Horwitt 20

21 Building Blocks of CIM Managed Objects in CIM PhysicalElement and LogicalElement Provides ability to abstract a complex object (such as a router) into its physical and logical aspects Wide range of applicability (from wires and chips through routers, switches, desktop computers, and systems) Associations and Aggregations Describes relationships between two classes and the characteristics of that relationship Example: A Service (OSPF) runs inside a Physical Element (a router) and an association is used to describe that relationship 21

22 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 Instance PhysicalElement Name: "RouterRack" Description: "Rack used used to store store routers" routers" Description: Caption: "" "" "Rack used to store routers" CreationClassName: string [key] Caption: Status: "In Use" Status: "In Use" "" Tag: string [key] InstallDate: 8/19/ :53 AM Status: InstallDate: "In 8/19/1994 Use" 10:53 AM CreationClassName: "Rack" Manufacturer: string InstallDate: CreationClassName: Tag: "A " 8/19/1994 "Rack" 10:53 AM Model: string Manufacturer: "Rack-Em-Up Inc." Tag: "A " Model: "R4-10x15" CableManagementStrategy: SKU: string string Manufacturer: SKU: " " "Rack-Em-Up Inc." SerialNumber: string SerialNumber: "REU " ServicePhilosophy: uint16 [ ] Model: "R4-10x15" PartNumber: "REU152 ServiceDescriptions: Version: string SKU: " " PhysicalElement string [ ] Removable: False False PartNumber: string Replacable: False LockPresent: SerialNumber: Replacable: False "REU " HotSwappable: False AudibleAlarm: CreationClassName: OtherIdentifyingInfo: booleanstring [key] PartNumber: HotSwappable: Height: "8 ft" "REU152" False Tag: PoweredOn: string [key] boolean Depth: "18 in" VisibleAlarm: boolean Height: Width: "18 in" PhysicalFrame "8 ft" SecurityBreach: Manufacturer: string uint16 Depth: Weight: "92"18 lbs in" CableManagementStrategy: "RatsNest" BreachDescription: Model: string string Width: "18 in" "RatsNest" CableManagementStrategy: string LockPresent: True SKU: string Weight: LockPresent: "92 lbs True ServicePhilosophy: IsLocked: Rack boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis IsLocked: True string IsLocked: TypeOfRack: True17 ServiceDescriptions: string [ ] TypeOfRack: LockPresent: Version: uint16 string NumberOfPowerCords: CountryDesignation: uint16 "USA" Removable: CountryDesignation: boolean PartNumber: string Replaceable: CurrentRequiredOrProduced: sint16 AudibleAlarm: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 22

23 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 PhysicalElement Instance CreationClassName: string [key] Tag: string [key] Manufacturer: string Model: string CableManagementStrategy: SKU: string string ServicePhilosophy: SerialNumber: string uint16 [ ] ServiceDescriptions: Version: string PhysicalElement string [ ] LockPresent: PartNumber: boolean string AudibleAlarm: CreationClassName: OtherIdentifyingInfo: boolean string string [key] VisibleAlarm: Tag: PoweredOn: string [key] boolean boolean PhysicalFrame SecurityBreach: Manufacturer: string uint16 CableManagementStrategy: BreachDescription: Model: string string string ServicePhilosophy: IsLocked: SKU: Rack string boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis ServiceDescriptions: string string [ ] TypeOfRack: LockPresent: Version: uint16 string Removable: boolean CountryDesignation: AudibleAlarm: PartNumber: string Replaceable: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 Rack: Name= Rack 1 ChassisInRack NumberOfPowerCords: uint16 CurrentRequiredOrProduced: sint16 ChassisInRack ChassisInRack Chassis: Name= Chas A Chassis: Name= Chas B Chassis: Name= Chas D 23

24 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 PhysicalElement CreationClassName: string [key] Tag: string [key] Manufacturer: string Model: string CableManagementStrategy: SKU: string string ServicePhilosophy: SerialNumber: string uint16 [ ] ServiceDescriptions: Version: string PhysicalElement string [ ] LockPresent: PartNumber: boolean string AudibleAlarm: CreationClassName: OtherIdentifyingInfo: boolean string string [key] VisibleAlarm: Tag: PoweredOn: string [key] boolean boolean PhysicalFrame SecurityBreach: Manufacturer: string uint16 CableManagementStrategy: BreachDescription: Model: string string string ServicePhilosophy: IsLocked: SKU: Rack string boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis ServiceDescriptions: string string [ ] TypeOfRack: LockPresent: Version: uint16 string Removable: boolean CountryDesignation: AudibleAlarm: PartNumber: string Replaceable: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 NumberOfPowerCords: uint16 CurrentRequiredOrProduced: sint16 Rack: ChassisInRack Chassis: Name= Rack 1 Name= Chas A Rack: Name= Rack 2 ChassisInRack Chassis: Name= Chas B Chassis: Name= Chas D Chassis: Name= Chas A Chassis: Name= Chas C Chassis: Name= Chas D 24

25 XML Extensible Markup Language a simplified derivative of SGML XML structures data it uses TAGs much like HTML with an unambiguous grammar Transported using HTTP Used to encode CIM data for exchange between management stations Courtesy of the W3C (not DMTF) 25

26 HTML Example <html> <head> <title>welcome to Harvard University</title> <meta name="keywords" content="harvard University Harvard University Harvard College Harvard College Harvard University Harvard University Harvard College Harvard College"> <meta name="description" content= "The Harvard University Homepage: an overview of academic programs, campus life, resources, news and events, with extensive links to other web sites located throughout the University."> <script language="javascript"> <!-- //Create array of nav bar "on" images 26

27 XML / CIM Example <?XML version="1.0" > <!DOCTYPE CIM SYSTEM " <CIM CIMVERSION="2.0" DTDVERSION="1.0" > <CLASS> <CLASSPATH> <NAMESPACEPATH> <ROUTER>WBEM_ROUTER_2</ROUTER> <NAMESPACE> <NAMESPACENODE>ROOT</NAMESPACENODE> <NAMESPACE> <NAMESPACENODE>CIMV2</NAMESPACENODE> </NAMESPACE> </NAMESPACE> </NAMESPACEPATH> <CLASSNAME>CIM_ManagedSystemElement</CLASSNAME> </CLASSPATH> <QUALIFIER NAME="Abstract" LOCAL="true" TYPE="boolean OVERRIDABLE="EnableOverride 27

28 Agenda What is Network Management? Current Architecture(s) Two New Architectures - WBEM - DEN Examples Concluding Remarks 28

29 DEN Network Management Architecture Unifying Model LDAPv3 based Directory Management Intranet BMC Patrol Cisco App #1 NMS App #n Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 29

30 DEN Bridges CIM and LDAP DEN is both an information model and a directory mapping Major portions integrated into the Core and Common Models Specifies a mapping to a directory Adds classes specifically for mapping Translates relationships Mapping is not automatic, but a separate activity of specification Could specify additional mappings 30

31 DEN Extends DMTF s CIM WBEM initiative Cisco, Compaq, Microsoft, Intel, BMC - Build a Common Information Model(CIM) for management - Harness the power of the Web for management interoperation => CIM & XML make up the WBEM core technology DEN Initiative Cisco, Microsoft - An extension of CIM focused on modeling network elements and services - An optimized mapping that assumes a directory as the data repository => CIM & LDAPv3/Directory make up the DEN core technology Cisco will continue to innovate, then standardize... 31

32 DEN Extends CIM DEN CIM LDAP Schema Mappings v2.1 v2.2 v2.3 System Policy User Core Apps Database Logical Network Physical Device Extension Schema 32

33 What Does DEN Consist Of? Physical Sub-Model Physical structure and connectivity of network devices; enhanced to model other objects Logical Sub-Model Logical connectivity and topology, network services, protocols, and administrative domains; hooks for defining interaction with users and other entities Policy Sub-Model How entities are controlled and provisioned Set of mappings to a Directory 33

34 Why use an LDAP Directory? A special purpose database optimized for reads Contain user, group & application info Facilitate finding info Highly distributed, scalable by design Replicated for High Availability LDAP provides standardization Simply, because it is there and business already knows how to use it, and.. It provides information containment, security and descriptive power. John Strassner - the father of DEN 34

35 CIM / DEN Value Proposition Integration of end systems, networks, and users into one coherent model Common model enables centralized repository for common information Common representation of information enables different applications to share and reuse data Device-dependent repositories are costly and don t scale Enables Binding people to services Policy-based management requires a network-wide model rather than a device specific one 35

36 Agenda What is Network Management? Current Architecture(s) New Architectures Examples - WBEM - DEN Concluding Remarks 36

37 WBEM Example #1 CW2000 Management Intranet Heterogeneous Management Servers Inventory CIM/XML CIM/XML Device ID AssetView 37

38 Cisco s Management Intranet Ecosystem Partnerships Partnerships 38

39 Example #2 - Using XML to Exchange Data Service Service Management Management Q1 00 CiscoWorks 2000 Service Level Management Suite Measure & report on performance & availability for VPNs, VoIP, QoS, etc. Extensible application with open data access 39

40 Service Level Manager End to End Scenario Service Service Management Management Q1 00 Head Office VPN-Gwy-SFO Router-Chicago Lan Users Router-NewYork Wwwin-HR NAS ISP Branch Office Dial-User Mass RTP Irvine SC# Verified by Sorce Destination How tested SLAM SLA Type Comments 1 Inverse LAN-Users to wwwin-hr HTTP End to end test 2 Cisco Router-NewYork - VPN-Gwy-SFO PING ICMP 3 Cisco VPN-Gwy-SFO - wwwin-hr Http HTTP 4 Inverse Dial-User - wwwin-hr RAS Connectivity 5 Cisco VPN-Gwy-SFO - RTP, Irvine, Mass Jitter VoIP 40

41 Reporting End to End Service Levels Service Service Management Management Q1 00 Edge to Edge Edge to Service 41

42 Agenda What is Network Management? Current Architecture(s) New Architectures Examples - WBEM - DEN Concluding Remarks 42

43 DEN Example #1 CiscoAssure User Policies Users identified by - login ID (NT/NDS) - IP/MAC address - DNS name Sample policies include - Admission control (VLAN membership, Firewalling) - Network Connectivity - Service Availability - Preferential treatment (QoS) 43

44 User Policies Available Today - Done Without DEN HR HR21 LOGIN VLAN ( /24) HR Sales Sales20 Sales 1. Get DHCP on LOGIN VLAN 2. Login to NT/NDS 3. URT.BAT downloaded/executed login info sent to URT server URT server configures switch for appropriate VLAN client release/renew IP DHCP URT CW2000 NT/NDS Domain Sales VLAN ( /24) Controller HR VLAN ( /24) 44

45 User Policies w/ DEN USER assigned to OU/Group Directory & Domain Controller Client PC USER logs in to Msoft or NDS domain controller Application Server URT maps User or OU/Group to USER Class URT Server USER Class mapped to IP Pool CNR DHCP Server Slow Link QPM sets QoS policy by USER class Router directs USER session to QPM specified queue QPM Server 45

46 Cisco Qos Policy Manager Directory Support QPM will support major enterprise Directory Services via LDAPv3 Initially certify with: Active Directory iplanet Directory Service then later certify with: NDS SecureWay Directory Service IETF policy standards and DMTF CIM and DEN compliant Based on IETF drafts for Core and QoS policy schema and information model 46

47 QoS Policy Manager Directory Enabled Networking Summer 2000 Functionality Enable user-based policies by reading from directory the user group to address bindings made by Cisco DHCP (CNR) Share policy by exporting QoS policies to directory eg HP WebQoS reads QPM policy to enforce similar QoS on server Future directions Read user or application profiles including QoS requirements 47

48 COPS is key for dynamic, scalable policy provisioning Common Open Policy Service Protocol for policy decision point (PDP) to policy enforcement point (PEP) communication Provides negotiation & capabilities discovery, dynamic policies Roles (labels) are assigned to network interfaces COPS-RSVP for policing signaled QoS IETF RFC standard enables device to query policy server for policy decision upon receiving RSVP request from host for QoS COPS-PR for Provisioning draft stage promise of multi-vendor interoperability standardized protocol standard PIB for representing policies to devices 48

49 DEN Example #2 CNS/AD (for SPs) Fault Management Network Devices Performance and Planning Desktop, Net and Server Net Device and App Server Managed Entities Network Services Service Definition and User Subscription L2/L3 Provisioning LDAP, Event Based User and Enterprise Profile Info Configure Segments of the Network Network Configuration Accounting Billing Manage Segments of the Network FCAPS Usage Based Authentication, Credentials VPN, TagVPN, Data Encryption Integrated User Network User and Network Security Security Security Network Management Network Resources 49

50 Enterprise A CNS/AD (UNIX) Cisco Networking Services for Active Directory CNS/AD (NT) Implementation Example AD CNS/AD (UNIX) Service Provider CNS/AD (UNIX) CNS/AD (UNIX) CNS/AD Mobile User Customer DB Integrated directories: Within enterprise Enterprise and ISP Trusted relationship between directories CNS/AD (NT) AD Provisioning Server CNS/AD (NT) Policy Server Enterprise B 50

51 Cisco Networking Services for Active Directory (CNS/AD) CNS/AD provides: A secure, scalable, and distributed event-based infrastructure for device signaling A dynamic, replicable repository for maintaining a variety of user and network data A standard set of APIs for applications to be easily written and extended For the rapid definition and provisioning of network services For the association of users, applications, and network services An integrated set of authentication services 51

52 CNS/AD Foundation Classes and Objects CNS/AD schema is built upon the active directory schema and the DEN foundation classes and objects. Cisco Networking Services for Active Directory (For Example: Cisco Devices, Cisco IOS Services, CNS Services, IP Address Management, Physical and Logical Topologies) Directory Enabled Networks (For Example: Network Device, Network Protocol, Network Media, Network Service, Profile, and Policy) Active Directory NOS Objects (For Example: User, Computer, Printer, Application, Group Policy Object) Active Directory Domain Configuration and Management (For Example: Site, Replication, Schema, Global Catalogue) 52

53 Agenda What is Network Management? Current Architecture(s) New Architectures Examples Concluding Remarks 53

54 Network Management Looking Forward Unifying Model LDAPv3 based Directory Management Intranet BMC Patrol Cisco App #1 NMS App #n XML/CIM Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 54

55 Cheat Sheet CIM schemas = extensible MIBs + relationships XML defines data like HTML defines page layout Directory is a distributed, unifying data store LDAPv3 defines the access mechanism to the Directory WBEM s focus is management interoperability from desktop thru network to server/appl. DEN adds models for network devices & svcs COPS - key to dynamic, scalable policy provisioning 55

56 SNMP+ LAN Managers Web-based Management Revolution Enterprise Frameworks HP, Tivoli, CA WBEM Initiative Early Web UIs DEN Initiative CiscoWorks2000 Cisco Management Connection QoS Policy Manager 2.0 Cisco Network Registrar WBEM/DEN ratified Ubiquitous enterprise Directory Services Windows 2000 (WMI, Active Directory) CIM Work Continues /1 56

57 CIM Roadmap CIM 2.0 Past Future CIM 2.1 CIM 2.2 CIM 2.3 Core System Device Physical Network User Policy Final DEN Draft Final DEN Draft Submitted to DMTF Additional First CIMfi LDAP CIMfi LDAP Mappings Mappings (Network, etc.) (Physical) Update to DEN Specification 57

58 Credits Content from the following WEB sites was used to build this presentation: 58

59 Please Complete Your Evaluation Form: Managing Networks, Users & Applications in the New Millennium 59

60 Make your plans to attend Cisco Networkers 2000! Las Vegas, NV - June Orlando, FL - July

WBEM Web-based Enterprise Management

WBEM Web-based Enterprise Management 1 WBEM Web-based Enterprise Management Outline What is Enterprise Management? What are the drivers in Enterprise Mgt.? Distributed Management Technology Forum (DMTF) Web Based Enterprise Management (WBEM)

More information

Location (CORE) Name : string {key} PhysicalPosition : string {key} Address : string. PhysicalElement (CORE)

Location (CORE) Name : string {key} PhysicalPosition : string {key} Address : string. PhysicalElement (CORE) Title : Physical Specification V2.44.1 Filename : CIM_Physical.vsd Author : DMTF CIM Core Schema WG Date : 18 May 2015 Page 1: Overvie Page 2: Physical Packages, Storage Packages, Connectors & Links Page

More information

Management Intranet: Integrating Web-based Network Management Applications

Management Intranet: Integrating Web-based Network Management Applications Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125

More information

Location (CORE) Name : string {key} PhysicalPosition : string {key} Address : string PhysicalElement (CORE)

Location (CORE) Name : string {key} PhysicalPosition : string {key} Address : string PhysicalElement (CORE) Title : Physical Specification 2.8 (UML) Filename : CIM_Physical28.vsd Author : DMTF SysDev-g Date : 01/26/2004 Page 1: Overvie Page 2: Physical Packages, Storage Packages, Connectors & Links Page 3: Physical

More information

Realizing the Promise of SANs

Realizing the Promise of SANs Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry

More information

Lecture 19: Web Based Management

Lecture 19: Web Based Management Lecture 19: Web Based Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 19-1 Using the Web for Management Web browser UI connects with the management

More information

Network Management Functions - Fault. Network Management

Network Management Functions - Fault. Network Management Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures

More information

Directory Enabled Networks

Directory Enabled Networks Directory Enabled Networks May 17,2000 Kerem ERZURUMLU Department of Computer Science and Engineering Hacettepe University Abstract DEN, Directory Enabled Networks, are networks where users and applications

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

CIM Common Information Model

CIM Common Information Model CIM Common Information Model Web-based Enterprise Management Matthias Hölzer-Klüpfel 2004-08-22, akademy, Ludwigsburg Overview What's the problem? Distributed Management Task Force Common

More information

WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning

WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning Jong-Cheol Seo 1, Hyung-Soo Kim 2, Dong-Sik Yun 2, Young-Tak Kim 1, 1 Dept. of Information and

More information

CS Efficient Network Management. Class 14 *

CS Efficient Network Management. Class 14 * CS236635 Efficient Network Management Class 14 * Danny Raz * Special thanks to Prof. Morris Sloman, Imperial College London, UK 1 Minhalot Ex2: will be returned today Projects : first report DONE Project

More information

Overview of the Pegasus CIM/WBEM Implementation

Overview of the Pegasus CIM/WBEM Implementation Overview of the Pegasus CIM/WBEM Implementation July 24 th 2002 Karl Schopmeyer Chair Open Group Entermprise Mgt. Forum k.schopmeyer@opengroup.org Version 1.1, 18 July 2002 7/25/2002 1 Agenda CIM/WBEM

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Overview. About the Common Information Model. Send documentation comments to CHAPTER

Overview. About the Common Information Model. Send documentation comments to CHAPTER CHAPTER 1 The Cisco MDS 9000 Family of multilayer directors and fabric switches provide an industry standard application programming interface (API) using the Storage Management Initiative Specification

More information

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 Choong Seon Hong and Joon Heo School of Electronics and Information, Kyung Hee University 1 Seocheon,

More information

Directory-Enabled Networking

Directory-Enabled Networking 52 CHAPTER Chapter Goals Provide a brief introduction to object-oriented information modeling. Provide a brief introduction to directories. Provide a brief overview of DEN. Show how DEN will be used in

More information

DMTF Management Initiatives for Academics

DMTF Management Initiatives for Academics DMTF Management Initiatives for Academics Jeff Hilland VP of Technology, DMTF 1 Agenda DMTF Management Initiatives SMASH DASH CDM Additional DMTF Standardization Protocols, Profiles, Generic Operations,

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

IMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS

IMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS IMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS E.Grampín 1, J.Rubio 1, N.Vardalachos 2, A.Galis 2, J.Serrat 1 1 Universitat Politècnica Catalunya, Dept Teoria Senyal i Comunicacions,

More information

Introducing the VoiceXML Server

Introducing the VoiceXML Server Introducing the VoiceXML Server David Asher Product Manager, Platform Solutions, NMS July 2005 Webinar Agenda Markets and introduction What is VoiceXML? System configurations Product description and features

More information

Introduction to Broadband Access Center Topics

Introduction to Broadband Access Center Topics CHAPTER 1 The Cisco Broadband Access Center software for Broadband Aggregation supports the mass-market deployment of broadband services by providing a provisioning system to replace labor-intensive and

More information

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

GLOSSARY. See ACL. access control list.

GLOSSARY. See ACL. access control list. GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly

More information

Enabling the Autonomic Data Center with a Smart Bare-Metal Server Platform

Enabling the Autonomic Data Center with a Smart Bare-Metal Server Platform Enabling the Autonomic Data Center with a Smart Bare-Metal Server Platform Arzhan Kinzhalin, Rodolfo Kohn, Ricardo Morin, David Lombard 6 th International Conference on Autonomic Computing Barcelona, Spain

More information

Cisco TelePresence Video Communication Server

Cisco TelePresence Video Communication Server Data Sheet Cisco TelePresence Video Communication Server Cisco TelePresence Video Communication Server: Advanced Applications and Session Management Product Overview Figure 1. Cisco TelePresence Video

More information

Distribution of Client Security Policies

Distribution of Client Security Policies Distribution of Client Security Policies Made for Nokia Internet Communications Eero Kukko Supervisor: Professor Raimo Kantola Instructor: Dr. Heikki Riittinen 1 Networking Laboratory Helsinki University

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

Smarter Business Agility with WebSphere DataPower Appliances Introduction

Smarter Business Agility with WebSphere DataPower Appliances Introduction Mike Masterson Worldwide Executive WebSphere Appliances 14 October 2010 Smarter Business Agility with WebSphere DataPower Appliances Introduction Smarter Business Agility with WebSphere DataPower Appliances

More information

Managing Your Enterprise from Microsoft Windows

Managing Your Enterprise from Microsoft Windows Managing Your Enterprise from Microsoft Windows Jon Haworth Senior Consultant Solution Services HP OpenView jonathon_haworth@hp.com Tel: +44 1344 365439 Agenda! Overview of ManageX and OVO/W. Architecture

More information

Introduction to Systems and Network Management

Introduction to Systems and Network Management Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course

More information

CIM 101. Andrea Westerinen & Julie Schott & December 3, 2002

CIM 101. Andrea Westerinen & Julie Schott & December 3, 2002 CIM 101 Andrea Westerinen & Julie Schott andreaw@cisco.com & jschott@cisco.com December 3, 2002 1 Agenda Information Modeling Management Environment DMTF Terminology CIM Advantages DMTF Models and Process

More information

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are

More information

Security Assertions Markup Language (SAML)

Security Assertions Markup Language (SAML) Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity

More information

Boost your Portal productivity with Monitoring Studio Express. Bertrand Martin Sentry Software

Boost your Portal productivity with Monitoring Studio Express. Bertrand Martin Sentry Software Boost your Portal productivity with Monitoring Studio Express Bertrand Martin Sentry Software November 26, 2007 2 Typical BMC Portal Environment Solutions BPM for Hardware BPM for Servers BPM for Log Management

More information

The Road to Centralized Management

The Road to Centralized Management Business without interruption. The Road to Centralized Management Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

USING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION

USING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION USING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION B.F. Marques*, J.A. Oliveira*, P.M. Coelho*, R.F. Oliveira *{bmarq,jaoliveira,pcoelho}@estv.ipv.pt, Electrical and Computer

More information

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

BMC Remedyforce Discovery and Client Management. Frequently asked questions

BMC Remedyforce Discovery and Client Management. Frequently asked questions BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce

More information

Cisco Wide Area Bonjour Solution Overview

Cisco Wide Area Bonjour Solution Overview , page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical

More information

The Knowledge Enterprise & Digital Libraries. Manuel Jaffrin EMEA Senior Architect Education & Research Sun Microsystems

The Knowledge Enterprise & Digital Libraries. Manuel Jaffrin EMEA Senior Architect Education & Research Sun Microsystems The Knowledge Enterprise & Digital Libraries Manuel Jaffrin EMEA Senior Architect Education & Research Sun Microsystems Agenda Sun and the Education community Evolution of the traditional campus Trends

More information

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates. Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4

More information

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Discovery in the WBEM Architecture (Infrastructure Discovery)

Discovery in the WBEM Architecture (Infrastructure Discovery) Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem

More information

SIP as an Enabling Technology

SIP as an Enabling Technology SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

IPv6 Network Management

IPv6 Network Management IPv6 Network Management Ralph Droms, Cisco Systems North American IPv6 Summit July, 2004 1 Cisco IPv6 Calendar IPv6 Integration & Co-Existence October 1996 Cisco IOS IPv6 Technology Preview software deployed

More information

Cisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet

Cisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet Cisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet CONTENT Overview... 2 Appearance... 2 Key Features and Benefits... 3 Product Specifications... 6 Basic Ordering Information... 11

More information

Overview of the ML-Series Card

Overview of the ML-Series Card CHAPTER 1 This chapter provides an overview of the ML-100T-8 card for Cisco ONS 15310-CL and the Cisco ONS 15310-MA. It lists Ethernet and SONET capabilities and Cisco IOS and Cisco Transport Controller

More information

Secure Access. Novell. Overview and Installation QUICK START

Secure Access. Novell. Overview and Installation QUICK START Novell Secure Access 1.5 QUICK START www.novell.com Overview and Installation Novell Secure Access is an integrated suite of access and security products that simplify, secure, accelerate, and extend identity

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Beta Material. This is subject to change

Beta Material. This is subject to change System Center Configuration Manager v.next Overview This content could change Due to the content in this slide deck being related to future product development, the Microsoft System Center product group

More information

IBM TotalStorage SAN Switch F32

IBM TotalStorage SAN Switch F32 Intelligent fabric switch with enterprise performance for midrange and large storage networks IBM TotalStorage SAN Switch F32 High port density packaging helps save rack space Highlights Can be used as

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2.1 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Pre-Installation Checklist v5.0

Pre-Installation Checklist v5.0 Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course 6421B; 5 Days, Instructor-led Course Description: This five-day instructor-led course provides students with the knowledge

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express

More information

Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework

Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework White Paper Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework August 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Inventory Reports. Detailed Device Report CHAPTER

Inventory Reports. Detailed Device Report CHAPTER CHAPTER 2 include the following device reports. Detailed Device Report Device Attributes Reports Generating a 24-Hour Inventory Change Report Hardware Reports Management Status Reports Software Reports

More information

Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure

Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure Course No. 6421B 5 Days Instructor-led, Hands-on Introduction This five-day instructor-led co urse provides students with the

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Powering Transformation With Cisco

Powering Transformation With Cisco Shape Your Business For the Future: Powering Transformation With Cisco Cisco Prime for Service Provider: Optimize Your Agility, Lower Your Costs Kenneth CHAN Consulting Systems Engineer Global Service

More information

Basic Concepts. Network Management. Spring Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Basic Concepts. Network Management. Spring Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Basic Concepts Network Management Spring 2018 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology This presentation is based on the slides listed in references. Outline Introduction:

More information

Cisco TelePresence Exchange System

Cisco TelePresence Exchange System Data Sheet Cisco TelePresence Exchange System Product Overview The Cisco TelePresence Exchange System is an integrated telepresence and video service-creation platform that can help service providers and

More information

DevNet Technical Breakout: Introduction to ACI Programming and APIs.

DevNet Technical Breakout: Introduction to ACI Programming and APIs. DevNet Technical Breakout: Introduction to ACI Programming and APIs. Michael Cohen Agenda Introduction to ACI ACI Policy ACI APIs REST API Python API L4-7 Scripting Opflex 3 Application Centric Infrastructure

More information

Network Design and Management. Nixu Ltd.

Network Design and Management. Nixu Ltd. Network Design and Management Nixu Ltd. Contents Network Design and Management The FCAPS Model High Availability solutions SNMP protocol Nixu Ltd. 2/31 Network Design and Management Network Design and

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

VoIP / RoIP for Technicians

VoIP / RoIP for Technicians Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going

More information

PassReview. PassReview - IT Certification Exams Pass Review

PassReview.   PassReview - IT Certification Exams Pass Review PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid

More information

SBC Site Survey Questionnaire Forms

SBC Site Survey Questionnaire Forms SBC Site Survey Questionnaire Forms For Design and Deployment of AudioCodes Mediant SBC Product Line This document is intended for the persons responsible for the design and deployment of AudioCodes SBC

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

Mobile IP QoS Using Flow in BcN. Contents

Mobile IP QoS Using Flow in BcN. Contents Mobile IP Using Flow in BcN 2007. 2. 8 MC CTO 최준환 Cjw8724@mobilecvg.com Contents 1 Mobile IP Requirements 2 xgmip 3 Mobile solution 2 Conclusion 1/ 전체페이지번호 1 Mobile IP Requirements 2 xgmip 3 Mobile solution

More information

Managing Your IP Telephony Environment

Managing Your IP Telephony Environment Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining

More information

Cisco Service Control Overview

Cisco Service Control Overview CHAPTER 1 This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco service control concept and capabilities. It also briefly describes the hardware capabilities

More information

Implementing Cisco Quality of Service 2.5 (QOS)

Implementing Cisco Quality of Service 2.5 (QOS) Implementing Cisco Quality of Service 2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as

More information

Memory Instance Provider

Memory Instance Provider Memory Instance Provider Provider overview Description Memory Instance Provider provides information about system s physical memory. The Memory Instance Provider is a Web-Based Enterprise Management (WBEM)

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

COMP211 Chapter 5 Network Layer: The Control Plane

COMP211 Chapter 5 Network Layer: The Control Plane COMP211 Chapter 5 Network Layer: The Control Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith

More information

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Agenda Why Secure a SAN? SAN Security Threats Weaknesses Fabric Security Controls Security

More information

Identity Management Technology

Identity Management Technology Identity Management Technology Version 1.0 Dr. Horst Walther, Software Integration GmbH, 2004-10-20 Lefkosia / Cyprus Technology Evolution how did we get here? Directory services Metadirectory services

More information

Designing Windows Server 2008 Network and Applications Infrastructure

Designing Windows Server 2008 Network and Applications Infrastructure Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of

More information

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA  White Paper Nomadix Service Engine Integration into Public Access Devices Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agnoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com 230-1024-001 Sheet

More information

Cisco 9E0-300 Questions $ Answers

Cisco 9E0-300 Questions $ Answers Cisco 9E0-300 Questions $ Answers Number: 9E0-300 Passing Score: 800 Time Limit: 120 min File Version: 22.2 http://www.gratisexam.com/ Cisco 9E0-300 Questions $ Answers Exam Name: Network Management Exam

More information

Architecting the Right SOA Infrastructure

Architecting the Right SOA Infrastructure Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA

More information