Managing Networks, Users & Applications in the New Millennium
|
|
- Gervase Horton
- 5 years ago
- Views:
Transcription
1 Managing Networks, Users & Applications in the New Millennium John Thomas 1
2 Agenda What is Network Management? Current Architecture(s) Two New Architectures Examples Concluding Remarks 2
3 Network Management s Primary Role Validate user experience connectivity, response times Anticipate network change failures, growth, user mobility, new apps online Enforce conformance with corporate policies user auditing/control, user/application differentiation Report findings to management who s not happy, what s my ROI Identify how to leverage network as an asset marketing! 3
4 NetMgmt Must Grow w/ Networking Trends Users more mobile, demanding & skilled expected to conform to corporate policies (e.g. URL blocking) Applications more delay sensitive, bandwidth hungry (aka multimedia) unsupported apps on network (e.g. DOOM) Both Users & Applications Have Increased dependency on network Require Service Level differentiation 4
5 NetMgmt Must Grow w/ Networking Trends New Network Designs Intranets Extranets VPNs Traffic Patterns (e.g. unexpected congestion points) increasingly short-lived flows (e.g. WEB) dynamic ports encryption n-tiered architectures 5
6 Agenda What is Network Management? Current Architecture(s) Two New Architectures Examples Concluding Remarks 6
7 Current Network Management Architecture 3rd Party Apps Cisco Apps SAP BMC Patrol MRTG NMS Platform Standardsbased protocols Intelligent Network Devices NMS Framework e.g. HP OV SNMP SNMP, RMON, Telnet, ICMP Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 7
8 SNMP owned the 90s Motivation behind SNMP manage heterogeneous networking devices (not systems, users or applications) enhancement of SGMP console consolidation SNMP Architecture Intelligent Managers, dumb Agents TRAP-directed polling (unreliable) Clear-text communities MIBs document what is available from a device 8
9 SNMP Needs help in the 00s SNMP is practical & will live-on, but Security in V3 required for more configuration control Unwieldy instancing/indexing makes life difficult Not Extranet friendly (typically not allowed thru FW) MIB s continue to pro-create, but don t define relationships 9
10 NMS/Frameworks Still useful But - eliminate duplication of efforts (e.g. fault mgmt) provide structured, documented integration Proprietary APIs slow development from ISVs Integration today requires application co-location, which complicates software install system admin & maintenance Common place to represent each device, but not store it s information 10
11 Report Card - Current Network Management Architecture Apps #1 App #2 App #3 App #4 NMS SNMP, RMON, Telnet, ICMP Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 11
12 What will happen to our friends? SNMP will continue to be a good data collection mechanism You can manage a device with SNMP, not a network Remember - Simple Network Management Protocol NMS Frameworks become a node on the Management Intranet the architectures of the prior generation of management products are not likely to dominate the market over the next five years September 1999 Susan Aldrich - Patricia Seybold Group James Herman & Theodore Forbath - Northeast Consulting Resources 12
13 Agenda What is Network Management? Current Architecture(s) Two New Architectures - WBEM - DEN Examples Concluding Remarks 13
14 WBEM Network Management Architecture XML/CIM Management Intranet BMC Patrol Cisco App #1 NMS App #n Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 14
15 WBEM Built Upon DMTF s CIM WBEM initiative Cisco, Compaq, Microsoft, Intel, BMC - Build a Common Information Model(CIM) for management - Harness the power of the Web for management interoperation => CIM & XML make up the WBEM core technology 15
16 So What is CIM? The Common Information Model (CIM) defines the Schemas used to represent the real-world objects being managed. CIM uses an objectoriented paradigm, where manageable objects and their inter-relationships are modeled using the concepts of classes and instances. Vendors extend the standard classes to represent unique feature/functions. It may be helpful to think of CIM as standard and extended MIBs that also include relationship definitions 16
17 What Is CIM(2)? An object-oriented information model A conceptual framework within which any information system may be modeled independent of repository and implementation standardizes data and reduces its complexity Supports enterprise-wide (vs. node-centric) management of data Allows integration of management information from different sources with different syntaxes 17
18 What is CIM (3)? Core Model Captures information that is applicable to all knowledge domains Common Models Information common to particular management areas, but independent of a particular technology or implementation. Include Systems, Applications, Devices, Networks, Databases, and Events Extension Models Represent vendor or technology-specific extensions that are often dependent on a particular environment or platform 18
19 Why Object Oriented? Why Not Just a Schema Network elements and services differ from other directory objects Standard objects are simple and exist within static boundaries a user is always a user Network elements and services are complex objects and exist in a constantly changing environment a modular switch can change functions Product Service Network Device Customer Must model the interaction between network elements, network services, the network, and clients of the network 19
20 Elements of CIM CIM object-oriented building blocks Object Class (type) Inheritance (reuse, vendor extension) Associations and aggregations (relationships between objects) Cardinality (number of components that participate in each side of a relationship) Methods (interaction with objects) Constraints and meta-data (how an object or relationship is used) Perhaps CIM s most important differentiator from previous standards is its ability to show the relationships between different elements and components that make up a computer system or a corporate network Elisabeth Horwitt 20
21 Building Blocks of CIM Managed Objects in CIM PhysicalElement and LogicalElement Provides ability to abstract a complex object (such as a router) into its physical and logical aspects Wide range of applicability (from wires and chips through routers, switches, desktop computers, and systems) Associations and Aggregations Describes relationships between two classes and the characteristics of that relationship Example: A Service (OSPF) runs inside a Physical Element (a router) and an association is used to describe that relationship 21
22 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 Instance PhysicalElement Name: "RouterRack" Description: "Rack used used to store store routers" routers" Description: Caption: "" "" "Rack used to store routers" CreationClassName: string [key] Caption: Status: "In Use" Status: "In Use" "" Tag: string [key] InstallDate: 8/19/ :53 AM Status: InstallDate: "In 8/19/1994 Use" 10:53 AM CreationClassName: "Rack" Manufacturer: string InstallDate: CreationClassName: Tag: "A " 8/19/1994 "Rack" 10:53 AM Model: string Manufacturer: "Rack-Em-Up Inc." Tag: "A " Model: "R4-10x15" CableManagementStrategy: SKU: string string Manufacturer: SKU: " " "Rack-Em-Up Inc." SerialNumber: string SerialNumber: "REU " ServicePhilosophy: uint16 [ ] Model: "R4-10x15" PartNumber: "REU152 ServiceDescriptions: Version: string SKU: " " PhysicalElement string [ ] Removable: False False PartNumber: string Replacable: False LockPresent: SerialNumber: Replacable: False "REU " HotSwappable: False AudibleAlarm: CreationClassName: OtherIdentifyingInfo: booleanstring [key] PartNumber: HotSwappable: Height: "8 ft" "REU152" False Tag: PoweredOn: string [key] boolean Depth: "18 in" VisibleAlarm: boolean Height: Width: "18 in" PhysicalFrame "8 ft" SecurityBreach: Manufacturer: string uint16 Depth: Weight: "92"18 lbs in" CableManagementStrategy: "RatsNest" BreachDescription: Model: string string Width: "18 in" "RatsNest" CableManagementStrategy: string LockPresent: True SKU: string Weight: LockPresent: "92 lbs True ServicePhilosophy: IsLocked: Rack boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis IsLocked: True string IsLocked: TypeOfRack: True17 ServiceDescriptions: string [ ] TypeOfRack: LockPresent: Version: uint16 string NumberOfPowerCords: CountryDesignation: uint16 "USA" Removable: CountryDesignation: boolean PartNumber: string Replaceable: CurrentRequiredOrProduced: sint16 AudibleAlarm: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 22
23 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 PhysicalElement Instance CreationClassName: string [key] Tag: string [key] Manufacturer: string Model: string CableManagementStrategy: SKU: string string ServicePhilosophy: SerialNumber: string uint16 [ ] ServiceDescriptions: Version: string PhysicalElement string [ ] LockPresent: PartNumber: boolean string AudibleAlarm: CreationClassName: OtherIdentifyingInfo: boolean string string [key] VisibleAlarm: Tag: PoweredOn: string [key] boolean boolean PhysicalFrame SecurityBreach: Manufacturer: string uint16 CableManagementStrategy: BreachDescription: Model: string string string ServicePhilosophy: IsLocked: SKU: Rack string boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis ServiceDescriptions: string string [ ] TypeOfRack: LockPresent: Version: uint16 string Removable: boolean CountryDesignation: AudibleAlarm: PartNumber: string Replaceable: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 Rack: Name= Rack 1 ChassisInRack NumberOfPowerCords: uint16 CurrentRequiredOrProduced: sint16 ChassisInRack ChassisInRack Chassis: Name= Chas A Chassis: Name= Chas B Chassis: Name= Chas D 23
24 Using the Building Blocks of CIM Physical Realization Information Model Logical Representation ManagedSystemElement Name: string Description: string Caption: string Status: PhysicalPackage string InstallDate: datetime Removable: boolean PhysicalFrame Replaceable: boolean HotSwappable: boolean Height: real32 Depth: real32 Width: real32 Weight: real32 PhysicalElement CreationClassName: string [key] Tag: string [key] Manufacturer: string Model: string CableManagementStrategy: SKU: string string ServicePhilosophy: SerialNumber: string uint16 [ ] ServiceDescriptions: Version: string PhysicalElement string [ ] LockPresent: PartNumber: boolean string AudibleAlarm: CreationClassName: OtherIdentifyingInfo: boolean string string [key] VisibleAlarm: Tag: PoweredOn: string [key] boolean boolean PhysicalFrame SecurityBreach: Manufacturer: string uint16 CableManagementStrategy: BreachDescription: Model: string string string ServicePhilosophy: IsLocked: SKU: Rack string boolean SerialNumber: PhysicalPackage uint16 [ ] Chassis ServiceDescriptions: string string [ ] TypeOfRack: LockPresent: Version: uint16 string Removable: boolean CountryDesignation: AudibleAlarm: PartNumber: string Replaceable: boolean OtherIdentifyingInfo: HotSwappable: string HeatGeneration: uint16 VisibleAlarm: 0..1 boolean PoweredOn: Height: real32 boolean ChassisTypes: uint16 [ ] SecurityBreach: uint16 Depth: real32 TypeDescriptions: string [ ] BreachDescription: Width: real32 string IsLocked: booleanchassisinrack Weight: real32 NumberOfPowerCords: uint16 CurrentRequiredOrProduced: sint16 Rack: ChassisInRack Chassis: Name= Rack 1 Name= Chas A Rack: Name= Rack 2 ChassisInRack Chassis: Name= Chas B Chassis: Name= Chas D Chassis: Name= Chas A Chassis: Name= Chas C Chassis: Name= Chas D 24
25 XML Extensible Markup Language a simplified derivative of SGML XML structures data it uses TAGs much like HTML with an unambiguous grammar Transported using HTTP Used to encode CIM data for exchange between management stations Courtesy of the W3C (not DMTF) 25
26 HTML Example <html> <head> <title>welcome to Harvard University</title> <meta name="keywords" content="harvard University Harvard University Harvard College Harvard College Harvard University Harvard University Harvard College Harvard College"> <meta name="description" content= "The Harvard University Homepage: an overview of academic programs, campus life, resources, news and events, with extensive links to other web sites located throughout the University."> <script language="javascript"> <!-- //Create array of nav bar "on" images 26
27 XML / CIM Example <?XML version="1.0" > <!DOCTYPE CIM SYSTEM " <CIM CIMVERSION="2.0" DTDVERSION="1.0" > <CLASS> <CLASSPATH> <NAMESPACEPATH> <ROUTER>WBEM_ROUTER_2</ROUTER> <NAMESPACE> <NAMESPACENODE>ROOT</NAMESPACENODE> <NAMESPACE> <NAMESPACENODE>CIMV2</NAMESPACENODE> </NAMESPACE> </NAMESPACE> </NAMESPACEPATH> <CLASSNAME>CIM_ManagedSystemElement</CLASSNAME> </CLASSPATH> <QUALIFIER NAME="Abstract" LOCAL="true" TYPE="boolean OVERRIDABLE="EnableOverride 27
28 Agenda What is Network Management? Current Architecture(s) Two New Architectures - WBEM - DEN Examples Concluding Remarks 28
29 DEN Network Management Architecture Unifying Model LDAPv3 based Directory Management Intranet BMC Patrol Cisco App #1 NMS App #n Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 29
30 DEN Bridges CIM and LDAP DEN is both an information model and a directory mapping Major portions integrated into the Core and Common Models Specifies a mapping to a directory Adds classes specifically for mapping Translates relationships Mapping is not automatic, but a separate activity of specification Could specify additional mappings 30
31 DEN Extends DMTF s CIM WBEM initiative Cisco, Compaq, Microsoft, Intel, BMC - Build a Common Information Model(CIM) for management - Harness the power of the Web for management interoperation => CIM & XML make up the WBEM core technology DEN Initiative Cisco, Microsoft - An extension of CIM focused on modeling network elements and services - An optimized mapping that assumes a directory as the data repository => CIM & LDAPv3/Directory make up the DEN core technology Cisco will continue to innovate, then standardize... 31
32 DEN Extends CIM DEN CIM LDAP Schema Mappings v2.1 v2.2 v2.3 System Policy User Core Apps Database Logical Network Physical Device Extension Schema 32
33 What Does DEN Consist Of? Physical Sub-Model Physical structure and connectivity of network devices; enhanced to model other objects Logical Sub-Model Logical connectivity and topology, network services, protocols, and administrative domains; hooks for defining interaction with users and other entities Policy Sub-Model How entities are controlled and provisioned Set of mappings to a Directory 33
34 Why use an LDAP Directory? A special purpose database optimized for reads Contain user, group & application info Facilitate finding info Highly distributed, scalable by design Replicated for High Availability LDAP provides standardization Simply, because it is there and business already knows how to use it, and.. It provides information containment, security and descriptive power. John Strassner - the father of DEN 34
35 CIM / DEN Value Proposition Integration of end systems, networks, and users into one coherent model Common model enables centralized repository for common information Common representation of information enables different applications to share and reuse data Device-dependent repositories are costly and don t scale Enables Binding people to services Policy-based management requires a network-wide model rather than a device specific one 35
36 Agenda What is Network Management? Current Architecture(s) New Architectures Examples - WBEM - DEN Concluding Remarks 36
37 WBEM Example #1 CW2000 Management Intranet Heterogeneous Management Servers Inventory CIM/XML CIM/XML Device ID AssetView 37
38 Cisco s Management Intranet Ecosystem Partnerships Partnerships 38
39 Example #2 - Using XML to Exchange Data Service Service Management Management Q1 00 CiscoWorks 2000 Service Level Management Suite Measure & report on performance & availability for VPNs, VoIP, QoS, etc. Extensible application with open data access 39
40 Service Level Manager End to End Scenario Service Service Management Management Q1 00 Head Office VPN-Gwy-SFO Router-Chicago Lan Users Router-NewYork Wwwin-HR NAS ISP Branch Office Dial-User Mass RTP Irvine SC# Verified by Sorce Destination How tested SLAM SLA Type Comments 1 Inverse LAN-Users to wwwin-hr HTTP End to end test 2 Cisco Router-NewYork - VPN-Gwy-SFO PING ICMP 3 Cisco VPN-Gwy-SFO - wwwin-hr Http HTTP 4 Inverse Dial-User - wwwin-hr RAS Connectivity 5 Cisco VPN-Gwy-SFO - RTP, Irvine, Mass Jitter VoIP 40
41 Reporting End to End Service Levels Service Service Management Management Q1 00 Edge to Edge Edge to Service 41
42 Agenda What is Network Management? Current Architecture(s) New Architectures Examples - WBEM - DEN Concluding Remarks 42
43 DEN Example #1 CiscoAssure User Policies Users identified by - login ID (NT/NDS) - IP/MAC address - DNS name Sample policies include - Admission control (VLAN membership, Firewalling) - Network Connectivity - Service Availability - Preferential treatment (QoS) 43
44 User Policies Available Today - Done Without DEN HR HR21 LOGIN VLAN ( /24) HR Sales Sales20 Sales 1. Get DHCP on LOGIN VLAN 2. Login to NT/NDS 3. URT.BAT downloaded/executed login info sent to URT server URT server configures switch for appropriate VLAN client release/renew IP DHCP URT CW2000 NT/NDS Domain Sales VLAN ( /24) Controller HR VLAN ( /24) 44
45 User Policies w/ DEN USER assigned to OU/Group Directory & Domain Controller Client PC USER logs in to Msoft or NDS domain controller Application Server URT maps User or OU/Group to USER Class URT Server USER Class mapped to IP Pool CNR DHCP Server Slow Link QPM sets QoS policy by USER class Router directs USER session to QPM specified queue QPM Server 45
46 Cisco Qos Policy Manager Directory Support QPM will support major enterprise Directory Services via LDAPv3 Initially certify with: Active Directory iplanet Directory Service then later certify with: NDS SecureWay Directory Service IETF policy standards and DMTF CIM and DEN compliant Based on IETF drafts for Core and QoS policy schema and information model 46
47 QoS Policy Manager Directory Enabled Networking Summer 2000 Functionality Enable user-based policies by reading from directory the user group to address bindings made by Cisco DHCP (CNR) Share policy by exporting QoS policies to directory eg HP WebQoS reads QPM policy to enforce similar QoS on server Future directions Read user or application profiles including QoS requirements 47
48 COPS is key for dynamic, scalable policy provisioning Common Open Policy Service Protocol for policy decision point (PDP) to policy enforcement point (PEP) communication Provides negotiation & capabilities discovery, dynamic policies Roles (labels) are assigned to network interfaces COPS-RSVP for policing signaled QoS IETF RFC standard enables device to query policy server for policy decision upon receiving RSVP request from host for QoS COPS-PR for Provisioning draft stage promise of multi-vendor interoperability standardized protocol standard PIB for representing policies to devices 48
49 DEN Example #2 CNS/AD (for SPs) Fault Management Network Devices Performance and Planning Desktop, Net and Server Net Device and App Server Managed Entities Network Services Service Definition and User Subscription L2/L3 Provisioning LDAP, Event Based User and Enterprise Profile Info Configure Segments of the Network Network Configuration Accounting Billing Manage Segments of the Network FCAPS Usage Based Authentication, Credentials VPN, TagVPN, Data Encryption Integrated User Network User and Network Security Security Security Network Management Network Resources 49
50 Enterprise A CNS/AD (UNIX) Cisco Networking Services for Active Directory CNS/AD (NT) Implementation Example AD CNS/AD (UNIX) Service Provider CNS/AD (UNIX) CNS/AD (UNIX) CNS/AD Mobile User Customer DB Integrated directories: Within enterprise Enterprise and ISP Trusted relationship between directories CNS/AD (NT) AD Provisioning Server CNS/AD (NT) Policy Server Enterprise B 50
51 Cisco Networking Services for Active Directory (CNS/AD) CNS/AD provides: A secure, scalable, and distributed event-based infrastructure for device signaling A dynamic, replicable repository for maintaining a variety of user and network data A standard set of APIs for applications to be easily written and extended For the rapid definition and provisioning of network services For the association of users, applications, and network services An integrated set of authentication services 51
52 CNS/AD Foundation Classes and Objects CNS/AD schema is built upon the active directory schema and the DEN foundation classes and objects. Cisco Networking Services for Active Directory (For Example: Cisco Devices, Cisco IOS Services, CNS Services, IP Address Management, Physical and Logical Topologies) Directory Enabled Networks (For Example: Network Device, Network Protocol, Network Media, Network Service, Profile, and Policy) Active Directory NOS Objects (For Example: User, Computer, Printer, Application, Group Policy Object) Active Directory Domain Configuration and Management (For Example: Site, Replication, Schema, Global Catalogue) 52
53 Agenda What is Network Management? Current Architecture(s) New Architectures Examples Concluding Remarks 53
54 Network Management Looking Forward Unifying Model LDAPv3 based Directory Management Intranet BMC Patrol Cisco App #1 NMS App #n XML/CIM Microsoft Standardsbased protocols Intelligent System SNMP, RMON, Telnet, ICMP, HTTP, COPS, DMI Management Instrumentation & Control Mechanisms High Performance, Robust Network Infrastructure 54
55 Cheat Sheet CIM schemas = extensible MIBs + relationships XML defines data like HTML defines page layout Directory is a distributed, unifying data store LDAPv3 defines the access mechanism to the Directory WBEM s focus is management interoperability from desktop thru network to server/appl. DEN adds models for network devices & svcs COPS - key to dynamic, scalable policy provisioning 55
56 SNMP+ LAN Managers Web-based Management Revolution Enterprise Frameworks HP, Tivoli, CA WBEM Initiative Early Web UIs DEN Initiative CiscoWorks2000 Cisco Management Connection QoS Policy Manager 2.0 Cisco Network Registrar WBEM/DEN ratified Ubiquitous enterprise Directory Services Windows 2000 (WMI, Active Directory) CIM Work Continues /1 56
57 CIM Roadmap CIM 2.0 Past Future CIM 2.1 CIM 2.2 CIM 2.3 Core System Device Physical Network User Policy Final DEN Draft Final DEN Draft Submitted to DMTF Additional First CIMfi LDAP CIMfi LDAP Mappings Mappings (Network, etc.) (Physical) Update to DEN Specification 57
58 Credits Content from the following WEB sites was used to build this presentation: 58
59 Please Complete Your Evaluation Form: Managing Networks, Users & Applications in the New Millennium 59
60 Make your plans to attend Cisco Networkers 2000! Las Vegas, NV - June Orlando, FL - July
WBEM Web-based Enterprise Management
1 WBEM Web-based Enterprise Management Outline What is Enterprise Management? What are the drivers in Enterprise Mgt.? Distributed Management Technology Forum (DMTF) Web Based Enterprise Management (WBEM)
More informationLocation (CORE) Name : string {key} PhysicalPosition : string {key} Address : string. PhysicalElement (CORE)
Title : Physical Specification V2.44.1 Filename : CIM_Physical.vsd Author : DMTF CIM Core Schema WG Date : 18 May 2015 Page 1: Overvie Page 2: Physical Packages, Storage Packages, Connectors & Links Page
More informationManagement Intranet: Integrating Web-based Network Management Applications
Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125
More informationLocation (CORE) Name : string {key} PhysicalPosition : string {key} Address : string PhysicalElement (CORE)
Title : Physical Specification 2.8 (UML) Filename : CIM_Physical28.vsd Author : DMTF SysDev-g Date : 01/26/2004 Page 1: Overvie Page 2: Physical Packages, Storage Packages, Connectors & Links Page 3: Physical
More informationRealizing the Promise of SANs
Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry
More informationLecture 19: Web Based Management
Lecture 19: Web Based Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 19-1 Using the Web for Management Web browser UI connects with the management
More informationNetwork Management Functions - Fault. Network Management
Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures
More informationDirectory Enabled Networks
Directory Enabled Networks May 17,2000 Kerem ERZURUMLU Department of Computer Science and Engineering Hacettepe University Abstract DEN, Directory Enabled Networks, are networks where users and applications
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationCIM Common Information Model
CIM Common Information Model Web-based Enterprise Management Matthias Hölzer-Klüpfel 2004-08-22, akademy, Ludwigsburg Overview What's the problem? Distributed Management Task Force Common
More informationWBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning
WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning Jong-Cheol Seo 1, Hyung-Soo Kim 2, Dong-Sik Yun 2, Young-Tak Kim 1, 1 Dept. of Information and
More informationCS Efficient Network Management. Class 14 *
CS236635 Efficient Network Management Class 14 * Danny Raz * Special thanks to Prof. Morris Sloman, Imperial College London, UK 1 Minhalot Ex2: will be returned today Projects : first report DONE Project
More informationOverview of the Pegasus CIM/WBEM Implementation
Overview of the Pegasus CIM/WBEM Implementation July 24 th 2002 Karl Schopmeyer Chair Open Group Entermprise Mgt. Forum k.schopmeyer@opengroup.org Version 1.1, 18 July 2002 7/25/2002 1 Agenda CIM/WBEM
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationOverview. About the Common Information Model. Send documentation comments to CHAPTER
CHAPTER 1 The Cisco MDS 9000 Family of multilayer directors and fabric switches provide an industry standard application programming interface (API) using the Storage Management Initiative Specification
More informationA Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3
A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 Choong Seon Hong and Joon Heo School of Electronics and Information, Kyung Hee University 1 Seocheon,
More informationDirectory-Enabled Networking
52 CHAPTER Chapter Goals Provide a brief introduction to object-oriented information modeling. Provide a brief introduction to directories. Provide a brief overview of DEN. Show how DEN will be used in
More informationDMTF Management Initiatives for Academics
DMTF Management Initiatives for Academics Jeff Hilland VP of Technology, DMTF 1 Agenda DMTF Management Initiatives SMASH DASH CDM Additional DMTF Standardization Protocols, Profiles, Generic Operations,
More informationOptimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More informationIMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS
IMPLEMENTATION ISSUES OF POLICY BASED NETWORK MANAGEMENT SYSTEMS E.Grampín 1, J.Rubio 1, N.Vardalachos 2, A.Galis 2, J.Serrat 1 1 Universitat Politècnica Catalunya, Dept Teoria Senyal i Comunicacions,
More informationIntroducing the VoiceXML Server
Introducing the VoiceXML Server David Asher Product Manager, Platform Solutions, NMS July 2005 Webinar Agenda Markets and introduction What is VoiceXML? System configurations Product description and features
More informationIntroduction to Broadband Access Center Topics
CHAPTER 1 The Cisco Broadband Access Center software for Broadband Aggregation supports the mass-market deployment of broadband services by providing a provisioning system to replace labor-intensive and
More informationSACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema
SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationGLOSSARY. See ACL. access control list.
GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationCisco Wide Area Application Services: Secure, Scalable, and Simple Central Management
Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly
More informationEnabling the Autonomic Data Center with a Smart Bare-Metal Server Platform
Enabling the Autonomic Data Center with a Smart Bare-Metal Server Platform Arzhan Kinzhalin, Rodolfo Kohn, Ricardo Morin, David Lombard 6 th International Conference on Autonomic Computing Barcelona, Spain
More informationCisco TelePresence Video Communication Server
Data Sheet Cisco TelePresence Video Communication Server Cisco TelePresence Video Communication Server: Advanced Applications and Session Management Product Overview Figure 1. Cisco TelePresence Video
More informationDistribution of Client Security Policies
Distribution of Client Security Policies Made for Nokia Internet Communications Eero Kukko Supervisor: Professor Raimo Kantola Instructor: Dr. Heikki Riittinen 1 Networking Laboratory Helsinki University
More informationFundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services
More informationSmarter Business Agility with WebSphere DataPower Appliances Introduction
Mike Masterson Worldwide Executive WebSphere Appliances 14 October 2010 Smarter Business Agility with WebSphere DataPower Appliances Introduction Smarter Business Agility with WebSphere DataPower Appliances
More informationManaging Your Enterprise from Microsoft Windows
Managing Your Enterprise from Microsoft Windows Jon Haworth Senior Consultant Solution Services HP OpenView jonathon_haworth@hp.com Tel: +44 1344 365439 Agenda! Overview of ManageX and OVO/W. Architecture
More informationIntroduction to Systems and Network Management
Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course
More informationCIM 101. Andrea Westerinen & Julie Schott & December 3, 2002
CIM 101 Andrea Westerinen & Julie Schott andreaw@cisco.com & jschott@cisco.com December 3, 2002 1 Agenda Information Modeling Management Environment DMTF Terminology CIM Advantages DMTF Models and Process
More informationInternet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation
Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are
More informationSecurity Assertions Markup Language (SAML)
Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity
More informationBoost your Portal productivity with Monitoring Studio Express. Bertrand Martin Sentry Software
Boost your Portal productivity with Monitoring Studio Express Bertrand Martin Sentry Software November 26, 2007 2 Typical BMC Portal Environment Solutions BPM for Hardware BPM for Servers BPM for Log Management
More informationThe Road to Centralized Management
Business without interruption. The Road to Centralized Management Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationUSING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION
USING LDAP FOR NETWORK TOPOLOGY AND SERVICE MANAGEMENT APPLICATIONS INTEGRATION B.F. Marques*, J.A. Oliveira*, P.M. Coelho*, R.F. Oliveira *{bmarq,jaoliveira,pcoelho}@estv.ipv.pt, Electrical and Computer
More informationFundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites
Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationBMC Remedyforce Discovery and Client Management. Frequently asked questions
BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce
More informationCisco Wide Area Bonjour Solution Overview
, page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical
More informationThe Knowledge Enterprise & Digital Libraries. Manuel Jaffrin EMEA Senior Architect Education & Research Sun Microsystems
The Knowledge Enterprise & Digital Libraries Manuel Jaffrin EMEA Senior Architect Education & Research Sun Microsystems Agenda Sun and the Education community Evolution of the traditional campus Trends
More informationCisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.
Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4
More informationThe Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO
The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationDiscovery in the WBEM Architecture (Infrastructure Discovery)
Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem
More informationSIP as an Enabling Technology
SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationSecure VPNs for Enterprise Networks
Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using
More informationIPv6 Network Management
IPv6 Network Management Ralph Droms, Cisco Systems North American IPv6 Summit July, 2004 1 Cisco IPv6 Calendar IPv6 Integration & Co-Existence October 1996 Cisco IOS IPv6 Technology Preview software deployed
More informationCisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet
Cisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet CONTENT Overview... 2 Appearance... 2 Key Features and Benefits... 3 Product Specifications... 6 Basic Ordering Information... 11
More informationOverview of the ML-Series Card
CHAPTER 1 This chapter provides an overview of the ML-100T-8 card for Cisco ONS 15310-CL and the Cisco ONS 15310-MA. It lists Ethernet and SONET capabilities and Cisco IOS and Cisco Transport Controller
More informationSecure Access. Novell. Overview and Installation QUICK START
Novell Secure Access 1.5 QUICK START www.novell.com Overview and Installation Novell Secure Access is an integrated suite of access and security products that simplify, secure, accelerate, and extend identity
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationBeta Material. This is subject to change
System Center Configuration Manager v.next Overview This content could change Due to the content in this slide deck being related to future product development, the Microsoft System Center product group
More informationIBM TotalStorage SAN Switch F32
Intelligent fabric switch with enterprise performance for midrange and large storage networks IBM TotalStorage SAN Switch F32 High port density packaging helps save rack space Highlights Can be used as
More informationOnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2.1 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationPre-Installation Checklist v5.0
Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management
More informationWhatsConfigured v3.1 User Guide
WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the
More informationXerox Device Data Collector 1.1 Security and Evaluation Guide
Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation
More informationConfiguring and Troubleshooting a Windows Server 2008 Network Infrastructure
Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course 6421B; 5 Days, Instructor-led Course Description: This five-day instructor-led course provides students with the knowledge
More informationCisco Exam Questions & Answers
Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express
More informationDeploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework
White Paper Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework August 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationInventory Reports. Detailed Device Report CHAPTER
CHAPTER 2 include the following device reports. Detailed Device Report Device Attributes Reports Generating a 24-Hour Inventory Change Report Hardware Reports Management Status Reports Software Reports
More informationConfiguring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure
Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure Course No. 6421B 5 Days Instructor-led, Hands-on Introduction This five-day instructor-led co urse provides students with the
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationPowering Transformation With Cisco
Shape Your Business For the Future: Powering Transformation With Cisco Cisco Prime for Service Provider: Optimize Your Agility, Lower Your Costs Kenneth CHAN Consulting Systems Engineer Global Service
More informationBasic Concepts. Network Management. Spring Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
Basic Concepts Network Management Spring 2018 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology This presentation is based on the slides listed in references. Outline Introduction:
More informationCisco TelePresence Exchange System
Data Sheet Cisco TelePresence Exchange System Product Overview The Cisco TelePresence Exchange System is an integrated telepresence and video service-creation platform that can help service providers and
More informationDevNet Technical Breakout: Introduction to ACI Programming and APIs.
DevNet Technical Breakout: Introduction to ACI Programming and APIs. Michael Cohen Agenda Introduction to ACI ACI Policy ACI APIs REST API Python API L4-7 Scripting Opflex 3 Application Centric Infrastructure
More informationNetwork Design and Management. Nixu Ltd.
Network Design and Management Nixu Ltd. Contents Network Design and Management The FCAPS Model High Availability solutions SNMP protocol Nixu Ltd. 2/31 Network Design and Management Network Design and
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationVoIP / RoIP for Technicians
Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going
More informationPassReview. PassReview - IT Certification Exams Pass Review
PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid
More informationSBC Site Survey Questionnaire Forms
SBC Site Survey Questionnaire Forms For Design and Deployment of AudioCodes Mediant SBC Product Line This document is intended for the persons responsible for the design and deployment of AudioCodes SBC
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationCisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com
Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing
More informationCisco Virtual Networking Solution for OpenStack
Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides
More informationMobile IP QoS Using Flow in BcN. Contents
Mobile IP Using Flow in BcN 2007. 2. 8 MC CTO 최준환 Cjw8724@mobilecvg.com Contents 1 Mobile IP Requirements 2 xgmip 3 Mobile solution 2 Conclusion 1/ 전체페이지번호 1 Mobile IP Requirements 2 xgmip 3 Mobile solution
More informationManaging Your IP Telephony Environment
Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining
More informationCisco Service Control Overview
CHAPTER 1 This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco service control concept and capabilities. It also briefly describes the hardware capabilities
More informationImplementing Cisco Quality of Service 2.5 (QOS)
Implementing Cisco Quality of Service 2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as
More informationMemory Instance Provider
Memory Instance Provider Provider overview Description Memory Instance Provider provides information about system s physical memory. The Memory Instance Provider is a Web-Based Enterprise Management (WBEM)
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationCOMP211 Chapter 5 Network Layer: The Control Plane
COMP211 Chapter 5 Network Layer: The Control Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationFabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc
Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Agenda Why Secure a SAN? SAN Security Threats Weaknesses Fabric Security Controls Security
More informationIdentity Management Technology
Identity Management Technology Version 1.0 Dr. Horst Walther, Software Integration GmbH, 2004-10-20 Lefkosia / Cyprus Technology Evolution how did we get here? Directory services Metadirectory services
More informationDesigning Windows Server 2008 Network and Applications Infrastructure
Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of
More informationOrchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud
Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agnoura Road Suite 102 Agoura Hills, CA USA White Paper
Nomadix Service Engine Integration into Public Access Devices Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agnoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com 230-1024-001 Sheet
More informationCisco 9E0-300 Questions $ Answers
Cisco 9E0-300 Questions $ Answers Number: 9E0-300 Passing Score: 800 Time Limit: 120 min File Version: 22.2 http://www.gratisexam.com/ Cisco 9E0-300 Questions $ Answers Exam Name: Network Management Exam
More informationArchitecting the Right SOA Infrastructure
Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA
More information