Utilizing Network Emulation to Provide Cost Effective Large Scale System of Systems Test and Evaluation
|
|
- Eustacia Strickland
- 5 years ago
- Views:
Transcription
1 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Utilizing Network Emulation to Provide Cost Effective Large Scale System of Systems Test and Evaluation 20 Jan 17 CERDEC S&TCD MODESTA Team Data Collection, Analysis, Modeling and Simulation Branch System Engineering, Architectures, Modeling and Simulation Division 1
2 Challenges to SoS Engineering, Integration, and Testing CO CO CP CO CDR Mounted Systems: Communications (4) Computers (6) Electronic Warfare (2) Weapons Optics PLT PLT LDR PLT SGT Dismounted Systems: Communications (2) Handheld Computers (1) Weapons As each system contains multiple sub-systems, including Comms, Computers, and EW, the task of engineering, integration and testing can be very complex Integration of desperate systems Interleaving systems engineering tasks Many voluminous data sources and sinks Accomplishing the required testing and evaluation of the SoS can be very challenging Note: notional architecture and systems displayed 2
3 High Degree of Difficulty COMPLEXITY User Actions / Interaction Data Collection / Metrics System Under Test / Evaluation Network Architecture Traffic Profiles Operational Scenarios Expertise needed in the areas of + Tactical Radios Networks Applications Integration of complex data from multiple sources Complex tools, each needing their own subject matter experts Unique configuration requirements Non-trivial maintenance and operation For each experiment, a complex working group dynamic must be in place: Force Structure / Unit Roles Environment / Terrain RESOURCES 3
4 SoS Evaluation Trade Space SDR, Multifunction Waveforms, Embedded Security, QoS Mechanisms, Complex Routing Algorithms Large Tactical Networks, Soldier to Brigade, Thousands of Nodes, Enterprise to Tactical, Many to Many Interfaces Behavioral Discreet Event Simulation: -Highly abstracted system models -Models attempt to capture notional behavior -Detailed models require excessive time/cost -Notional traffic -Higher fidelity des models typically don t scale well -Difficult to interface with live systems Shared Code Model / Real-time Emulation -Actual code take from live systems -Cross-compiled into lightweight VMs -True ethernet frame/ip packet processing -Locked to real-time execution -Highly scalable on commodity hardware Live Testing -Interfaces with system at IP layer -Live systems provide true performance characteristics -Lives systems allow full interaction with other systems -High costs of personnel, ranges, resources -Challenging data collection -Typically all-manual configuration The desired SoS Evaluation is high fidelity and scalable. Traditionally takes a considerable amount of time and money. Time to setup the simulations (develop/configure inputs) and execute scenarios Traditionally, high fidelity models tend to run slower than real-time. 4
5 Experimentation Fidelity Simulation provides high scalability and moderate costs while typically sacrificing realism due to a high level of abstraction Live Testing provides true performance and usability characteristics, but does not scale well and can be very costly Real-time Emulation provides a middle ground where system software (waveform, router, and application shared code) is executed in virtual machines to allow for scalability and high fidelity Scalability Simulation Emulation Test (Live) Realism Realism Scalability Abstraction Cost Simulation Low / Med High High Low Emulation Med / High High Med Low Test (Live) High Low Low High 5
6 System of Systems Emulation: MODESTA The Modeling, Emulation, Simulation, Tool for Analysis (MODESTA) is a CERDEC developed government purpose rights framework for conducting systems of systems network analysis. Allows for disparate models, such as the shared code emulation models ported into EMANE and the behavior models developed in JNE, to be deployed in large scale for realistic network effects analysis. High Fidelity Representation of Multiple Layers Including Physical Connectivity, Network, Transport, and Application Integrates live hardware when available (e.g. HMS, WIN-T, MNVR systems). Allows stimulation of network with live C4ISR systems (e.g. JBC-P, CPOF) and/or generated traffic. Provides the ability to deploy low fidelity surrogate networks when high fidelity is not available or unnecessary. MODESTA allows high fidelity analysis within realistic timeframes Reduces data import times up to 50% through advanced data parsers Reduces model configuration up to 50% by automatically configuring models based on imported BOIs and standard waveform parameters across disparate emulation environments Provides an ability to quickly iterate through different courses of actions/network configurations MODESTA provides capability to construct large scale, high fidelity scenarios to provide detailed and scalable analysis. 6
7 Network Emulation Testbed Tactical Networks Links MAC PHY MAC PHY The Extendable Mobile Ad-hoc Network Emulator (EMANE) models the radio and SATCOM networks EMANE s PHY/MAC model Models path loss with antenna pointing Allocates timeslots to emitters Connects to preferred neighbors first Varies data rate and latency per neighbor EMANE s Comm Effects model imposes fixed data rate/delay for satellite EMANE exposes virtual L2 Tap network interfaces that behave as the Ethernet port on an radio or SATCOM modem 7
8 Network Emulation Testbed Linux Containers Linux containers Process groups isolated from the rest of the system to some degree (lightweight virtualization) Takes a different approach than system virtualization (VMWare) MAC PHY * MAC PHY A container (optionally) uses a network namespace an isolated network stack containing its own interfaces, routing table, neighbor table, netfilter rules, etc Containers in the emulation allow multiple ciphertext and plaintext routers to co-exist in the same operating system instance * Lightweight Virtual Linux Container 8
9 Tactical Network Emulation Deployment on HPC Compute Nodes To achieve Brigade level scalability of live/virtual tactical nodes: Define Scenario Allocate DoD Supercomputer Resources at Army Research Lab partner Configure Hardware and Software on the Fly Execute Test in Real Time Reduce, Analyze Collected Data Tear Down and Sanitize Resources Making Available for Next Queued Test Allocate Resources Configure Software Reduce & Analyze Data Define Test / Scenario Configure Hardware Execute Test Sanitize Resources 9
10 MODESTA Experimentation Workflow MAC layer stats C4 Data Model IP Layer stats Harvest & Reduction Execution, Data Collection & Visualization Consolidate collected data Transfer to ARL HPC Execute correlative analysis scripts Deploy each emulated switches, radios, routers, traffic generators & collectors Monitor hardware real-time utilizing all available hardware and load balancing Sync execution of traffic, movement, pathloss Display real-time stats on specific nodes and multiple OSI layers Traffic Import ATM traffic Must be mapped to NBOI objectids Pre-processing required to assign IPs, MC membership, etc Analysis Reqs Force Structure, Equipment & Networks Positions, Movement & Pathloss Import NBOI xls Manually modify nets, roles, equipment Select network emulation tools Cutsheet import or auto-assign IPs Import pre-run OneSAF positions export (mapped to NBOI objectids) Select pathloss calculation method (eg Tirem) & pre-calculate pathloss utilizing all available hardware 10
11 MODESTA Enables SoS Rapid Experimentation in a Controlled, Repeatable Lab Environment Emulation Provides Scalable, Shared Code, Real-time Execution Allows Low Risk Test-Tweak- Test Cycle Utilizes High Speed Data Reduction and Correlation Process Capability is Being Utilized for PEO C3T, ASA(ALT) SOSE&I, etc Summary Takeaway and COA Refinement MODESTA Enabled Rapid Experimentatio n Cycle Experimentation Planning and COA Development Data Reduction and Analysis High Fidelity Real- Time Emulation 11
12 Backup 12
SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model
SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications
More informationJTRS Network Emulator (JNE): Overview and Use Cases
JTRS Network Emulator (JNE): Overview and Use Cases Presentation at JSTeF March 14-17, 2011 Sheetal Doshi, Ph.D. Project Lead, JTRS Network Emulator Scalable Network Technologies, Los Angeles CA Email:
More informationProcessing and Analysis of Large Data Sets Using High Performance Computing: Beyond Experimental Data
10 Int'l Conf. on Advances in Big Data Analytics ABDA'16 Processing and Analysis of Large Data Sets Using High Performance Computing: Beyond Experimental Data Brian Panneton 1, Brian Henz 2, Pritesh Patel
More informationMake Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET
DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity
More informationCERDEC C4ISR/EW Hardware/Software Convergence
APPROVED FOR PUBLIC RELEASE DISTRIBUTION STATEMENT A. Approved for public release, distribution is unlimited. CERDEC C4ISR/EW Hardware/Software Convergence 14 SEP 16 Jason Dirner Intel Technology and Architecture
More information15,000+ Networks, 5 Million+ Users:
15,000+ Networks, 5 Million+ Users: T&E Net Centric Challenges March 1, 2010 John Illgen Sector Director, Modeling & Simulation Topics 2 Why, How, What, Result Simulation and T&E Example Where have we
More informationMarine Corps Tactical System Support Activity
Marine Corps Tactical System Support Activity Information Brief Marine Corps Enterprise Network (MCEN) Planning Yard February 2019 Purpose: Provide Overview of the MCEN Planning Yard MCEN Planning Yard
More informationTitle. EMANE Developer Training 0.7.1
Title EMANE Developer Training 0.7.1 1 Extendable Mobile Ad-hoc Emulator Supports emulation of simple as well as complex network architectures Supports emulation of multichannel gateways Supports model
More informationSecuring the End Node in a Cloud World
Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and
More informationLoad Dynamix Enterprise 5.2
DATASHEET Load Dynamix Enterprise 5.2 Storage performance analytics for comprehensive workload insight Load DynamiX Enterprise software is the industry s only automated workload acquisition, workload analysis,
More informationMove Performance Testing to the Next Level with HP Performance Center September 11, Copyright 2013 Vivit Worldwide
Move Performance Testing to the Next Level with HP Performance Center September 11, 2013 Copyright 2013 Vivit Worldwide Brought to you by Copyright 2013 Vivit Worldwide Hosted by Megan Shelton Vivit Performance
More informationLANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.
LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationto-end System Test Architecture
End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems
More informationVirtualization of the MS Exchange Server Environment
MS Exchange Server Acceleration Maximizing Users in a Virtualized Environment with Flash-Powered Consolidation Allon Cohen, PhD OCZ Technology Group Introduction Microsoft (MS) Exchange Server is one of
More informationTri-service Convergence: C4ISR/EW Modular Open Suite of Standards (CMOSS)
Tri-service Convergence: C4ISR/EW Modular Open Suite of Standards (CMOSS) Embedded Tech Trends 23 January 2018 Ben Peddicord Chief, Intel Technology and Architecture Branch CERDEC I2WD Problem Statement
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationCisco Unified Computing System Delivering on Cisco's Unified Computing Vision
Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationBW Protection. 2002, Cisco Systems, Inc. All rights reserved.
BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals
More informationBenefits of deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic storage
Benefits of deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic storage Faster, more efficient data replication and backup between office locations Introduction Data backup and replication processes
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationUAVs as Communications Routing Nodes in Network-Centric Warfare
UAVs as Communications Routing Nodes in Network-Centric Warfare AUVSI s Unmanned Systems 2003 Symposium & Exhibition July 15-17, 17, 2003 Baltimore Convention Center Peter Rigstad L-3 3 Communications
More informationIntegrate MATLAB Analytics into Enterprise Applications
Integrate Analytics into Enterprise Applications Aurélie Urbain MathWorks Consulting Services 2015 The MathWorks, Inc. 1 Data Analytics Workflow Data Acquisition Data Analytics Analytics Integration Business
More informationThe KMAX Network Emulator
The KMAX Network Emulator Real world networks have long distance links, satellites, congested routers, firewall inspection, packet interception, hardware failures, and other outages. But the networks in
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationIMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007
IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS Presented at MILCOM 27 October 29, 27 ABSTRACT Mobile Ad Hoc Networking (MANET) is a key technology enabler in the tactical
More informationThe Next-Gen ISR Conference brought to you by:
The Next-Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation Solving Tomorrow s ISR Problems: Getting the Right Information to the Right People
More informationvsan Mixed Workloads First Published On: Last Updated On:
First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity
More informationVNF Benchmarking. Customer Profile. The Move to Virtualization. The Challenges. Case Study
Case Study VNF Benchmarking Customer Profile Customer: Large Network Equipment Manufacturer Industry: Networking Equipment Employees: 180,000 (2016) The Challenges How to test the performance of VNFs?
More informationEnabling Rapid Innovation in the Network Using SONiC and P4. Ramkumar Krishnamoorthy (Barefoot) Guohan Lu, Lihua Yuan (Microsoft)
Enabling Rapid Innovation in the Network Using SONiC and P4 Ramkumar Krishnamoorthy (Barefoot) Guohan Lu, Lihua Yuan (Microsoft) Agenda SONiC SONiC-P4-SWITCH SONiC-P4-SWITCH for Azure SONiC and the Open
More informationThe Business Case for a Web Content Management System. Published: July 2001
The Business Case for a Web Content Management System Published: July 2001 Contents Executive Summary... 1 The Business Case for Web Content Management... 2 The Business Benefits of Web Content Management...
More informationVARIABILITY IN OPERATING SYSTEMS
VARIABILITY IN OPERATING SYSTEMS Brian Kocoloski Assistant Professor in CSE Dept. October 8, 2018 1 CLOUD COMPUTING Current estimate is that 94% of all computation will be performed in the cloud by 2021
More informationWhy Real Testing Requires Emulation, Not Just Simulation for Layer 4-7
White Paper Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 Testing for the real world is about emulating the entire network, not just individual switches and routers. This includes
More informationGOVERNMENTCOMMS. Follow us on. /thurayatelecom
GOVERNMENTCOMMS GOVERNMENTCOMMS www.thuraya.com Follow us on /thurayatelecom GOVERNMENTCOMMS Rapid deployment. We re there with you. Key to Thuraya Solutions GovernmentComms Secure, assured, reliable,
More informationEmulating Web Services-Based Systems Hosted in Ad Hoc Wireless Networks
Emulating Web Services-Based Systems Hosted in Ad Hoc Wireless Networks Petr Novotny and Alexander L. Wolf Imperial College London London, UK Imperial College London Department of Computing Technical Report
More informationIPv6 Transition JITC Oct 8-9, 2002 FT Huachuca, AZ
IPv6 Transition JITC Oct 8-9, 2002 FT Huachuca, AZ Jim Bound HP Staff Fellow Chair IPv6 Forum Technical Directorate Page 1 Discussion Topics ERM Masters 2002 Points of Transition Transition Solutions Deployment
More informationUbiquiti UniFi AC Dual-Radio Access Point with 1300Mbps / 600ft range / 24V Passive PoE
Innovative Antenna Design Designed for Optimal RF Performance Scalable Enterprise Wi-Fi Management Overview UQ-UAP-AC-LR 1/5 Scalable Enterprise Wi-Fi Management UniFi is the revolutionary Wi-Fi system
More informationProject Title: Open Virtualized WiMAX Base Station Node for GENI Wide-Area Wireless Deployments
GENI Project Quarterly Progress Report, Project Title: Open Virtualized WiMAX Base Station Node for GENI Wide-Area Wireless Deployments Principal Investigators: Dipankar Raychaudhuri, WINLAB, Rutgers University
More informationTCO Comparison for ECI Telecom s MPLS-TP Based Native Packet Transport Solution for a Mobile Backhaul Network. Executive Summary.
TCO Comparison for ECI Telecom s MPLS-TP Based Native Packet Transport Solution for a Mobile Backhaul Network Executive Summary Metro transport networks are undergoing a gradual transition from circuit-based
More informationAdvancing the Army Geospatial Enterprise (AGE) through the AGE Node
Advancing the Army Geospatial Enterprise (AGE) through the AGE Node Presented by: Daniel Visone, Directorate Chief, Systems & Acquisition Support Directorate 22July2015 US Army Corps of Engineers BUILDING
More informationWZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018
White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com
More informationAMRDEC CYBER Capabilities
Presented to: HAMA AMRDEC CYBER Capabilities Distribution Statement A: Approved for public release: distribution unlimited 08 July 16 Presented by: Julie Locker AMRDEC Cyber Lead U.S. Army Aviation and
More informationAn End-to-End Modeling and Simulation Testbed (EMAST) to Support Detailed Quantitative Evaluations of GIG Transport Services
Approved for Public Release; Distribution Unlimited. #05-0270 An End-to-End Modeling and Simulation Testbed (EMAST) to Support Detailed Quantitative Evaluations of GIG Transport Services G. Comparetto
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationDatasheet AC Dual-Radio Access Points. Models: UAP-AC-IW, UAP-AC-IW-PRO, UAP-AC-LITE, UAP-AC-LR, UAP-AC-PRO, UAP-AC-EDU
802.11AC Dual-Radio Access Points Models: UAP-AC-IW, UAP-AC-IW-PRO, UAP-AC-LITE, UAP-AC-LR, UAP-AC-PRO, UAP-AC-EDU Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds
More information1 sur 5 01/08/2005 14:09 Presentations, Labs, and Case Studies Papers (Sorted By) Authors Session Code Session Name Title Some OPNETWORK labs require the use of OPNET software that has not yet been made
More informationExam Questions
Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in
More informationAchieving the Science DMZ
Achieving the Science DMZ Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2012 Baton Rouge, LA January 22, 2012 Outline of the Day Motivation Services Overview Science DMZ
More informationUNCLASSIFIED UNCLASSIFIED
: February 6 Exhibit R, RDT&E Budget Item Justification: PB : Research,, Test & Evaluation, / BA 5: System & Demonstration (SDD) COST ($ in Millions) FY 5 FY 6 R Program Element (Number/Name) PE 65A /
More informationPCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs
PCS Cloud Solutions Create highly-available, infinitely-scalable applications and APIs Develop, package, and deploy powerful applications and services to the cloud with Cloud Services and the click of
More informationNetwork Configuration Example
Network Configuration Example Configuring Private VLANs on a QFX Switch Using Extended Functionality Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000
More informationTen Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper
Ten Things to Know Before Deploying Active Directory written by Dmitry Sotnikov White Paper Abstract Active Directory migration raises many questions about the design of your new directory. As you attempt
More informationENABLING IMPLEMENTATION AND DEPLOYMENT UTILIZING VICTORY TOOLS
2018 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM VEHICLE ELECTRONICS AND ARCHITECTURE (VEA) AND GROUND SYSTEMS CYBER ENGINEERING (GSCE) TECHNICAL SESSION AUGUST 7-9, 2018 - NOVI, MICHIGAN
More informationCisco WAP131 Wireless-N Dual Radio Access Point with PoE
Data Sheet Cisco WAP131 Wireless-N Dual Radio Access Point with PoE Improved Coverage, Easy to Deploy, Secure Business-Class Wireless-N Connectivity Highlights Provides cost-effective 802.11n connectivity
More informationVirtualization Overview. Joel Jaeggli AFNOG SS-E 2013
Virtualization Overview Joel Jaeggli AFNOG SS-E 2013 1 What are we using this Year? Mac-mini servers Intel core i7 quad core 8 hyperthreads 16GB of ram 2 x 256GB SATA SSD A pretty hefty server Less than
More informationIntegrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N)
Test & Evaluation/Science & Technology Program C4I & Software Intensive Systems Test (C4T) Test Technology Area Integrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N) International
More informationHPCMP Requirements for Metadata and Archiving at Scale
CMP Requirements for Metadata and Archiving at Scale Amanda Tumminello, Navy DSRC April 2019 DoD High Performance Computing Modernization Program ; distribution is unlimited CMP Ecosystem Results Acquisition
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationTACTICAL NETWORKING EXPERIMENTS AT THE CWIX
TACTICAL NETWORKING EXPERIMENTS AT THE CWIX WInnComm-Europe Oulu, May 17 th 2017 Christoph Barz christoph.barz@fkie.fraunhofer.de, Fraunhofer CWIX 2016 FLIP Advanced Waveform Prototyping using SDR CWIX
More informationBAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004
BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004 Today s Objectives Introduce the problem context and interdependencies. Discuss BAE SYSTEMS Position Review example
More informationQuickSpecs. HP Z 10GbE Dual Port Module. Models
Overview Models Part Number: 1Ql49AA Introduction The is a 10GBASE-T adapter utilizing the Intel X722 MAC and X557-AT2 PHY pairing to deliver full line-rate performance, utilizing CAT 6A UTP cabling (or
More informationSvSAN Data Sheet - StorMagic
SvSAN Data Sheet - StorMagic A Virtual SAN for distributed multi-site environments StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical applications
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationDeployment Explained: DREN IPv6 Pilot
1 Department of Defense High Performance Computing Modernization Program Defense Research and Engineering Network Approved for public release; distribution is unlimited. Next Generation Internet: How IPv6
More informationCyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies
Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the
More informationContext: ExScal (
Context: ExScal (http://www.cse.ohio-state.edu/exscal) Field project to study scalability of middleware and applications in sensor networks Deployed in an area of ~1,300m 300m (Dec. 2004) 2-tier architecture
More informationJoel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1
Joel Obstfeld Director of Engineering SP CTO team November 2012 2012 Cisco and/or its affiliates. All rights reserved. 1 Controller architecture that efficiently computes & fits applica9on instances onto
More informationCyber, Command, Control, Communications, and Computers Assessments Division (C5AD)
Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD) 1 C5AD Presentation (Approved for Public Release: 20150219) ITEA 26 March 2019 Greg Curth J6/DDC5I/C5AD/ENG Cyber Capability
More informationARISTA: Improving Application Performance While Reducing Complexity
ARISTA: Improving Application Performance While Reducing Complexity October 2008 1.0 Problem Statement #1... 1 1.1 Problem Statement #2... 1 1.2 Previous Options: More Servers and I/O Adapters... 1 1.3
More informationEnterprise Monitoring (EM) for the Defense Meteorological Satellite Program (DMSP) Ground System (GS)
Enterprise Monitoring (EM) for the Defense Meteorological Satellite Program (DMSP) Ground System (GS) Mike Drumheller, Systems Engineer Don Anderson, Integration Engineer January 25, 2019 Copyright 2019
More informationAir Force Test Center
Air Force Test Center Avionics Cyber Range (ACR) Mark Erickson 46 TS/OGE 26 January 2017 DISTRIBUTION STATEMENT A: Approved for public release: distribution is unlimited. 96TW-2017-0005 1 What is the Avionics
More informationIntegrating MATLAB Analytics into Business-Critical Applications Marta Wilczkowiak Senior Applications Engineer MathWorks
Integrating MATLAB Analytics into Business-Critical Applications Marta Wilczkowiak Senior Applications Engineer MathWorks 2015 The MathWorks, Inc. 1 Problem statement Democratization: Is it possible to
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More information1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study
Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.
More informationLecture 5: February 3
CMPSCI 677 Operating Systems Spring 2014 Lecture 5: February 3 Lecturer: Prashant Shenoy Scribe: Aditya Sundarrajan 5.1 Virtualization Virtualization is a technique that extends or replaces an existing
More informationEliminate the Complexity of Multiple Infrastructure Silos
SOLUTION OVERVIEW Eliminate the Complexity of Multiple Infrastructure Silos A common approach to building out compute and storage infrastructure for varying workloads has been dedicated resources based
More informationIntegrate MATLAB Analytics into Enterprise Applications
Integrate Analytics into Enterprise Applications Lyamine Hedjazi 2015 The MathWorks, Inc. 1 Data Analytics Workflow Preprocessing Data Business Systems Build Algorithms Smart Connected Systems Take Decisions
More informationComplex Network Modeling with an Emulab HPC
Complex Network Modeling with an Emulab HPC Virginia Watson Ross High Performance Systems Branch AFRL/RITB Rome, NY, USA Virginia.Ross@rl.af.mil David L. Hench Information Transmission Branch AFRL/RITE
More informationBrocade and Procera. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE
Brocade and Procera Detailed Insights for OTT Application Traffic Brocade Packet Broker together with Procera s PacketLogic TM Deep Packet Inspection (DPI) engine is targeted towards mobile service provider
More informationNATO-IST-124 Experimentation Instructions
ARL-TN-0799 NOV 2016 US Army Research Laboratory NATO-IST-124 Experimentation Instructions by Kelvin M Marcus NOTICES Disclaimers The findings in this report are not to be construed as an official Department
More informationENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM
JOINT SOLUTION BRIEF ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM DIAMANTI PLATFORM AT A GLANCE Modern load balancers which deploy as
More informationNetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst
ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationProgrammable Wireless Networking Details and Logistics
Programmable Wireless Networking Details and Logistics Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation NSF Programmable
More informationTASMUS.
TASMUS www.aselsan.com.tr TACTICAL AREA COMMUNICATIONS SYSTEM TASMUS Tactical Area Communications System TASMUS, Tactical Area Communications System, is a network centric communication infrastructure that
More informationFIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationVisual TruView Unified Network and Application Performance Management Focused on the Experience of the End User
Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User BUSINESS CHALLENGE Problems can occur anywhere from the physical layer to wireless, across
More informationPlanning and Preparation. VMware Validated Design 4.0 VMware Validated Design for Remote Office Branch Office 4.0
VMware Validated Design 4.0 VMware Validated Design for Remote Office Branch Office 4.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you
More informationSCRIPT: An Architecture for IPFIX Data Distribution
SCRIPT Public Workshop January 20, 2010, Zurich, Switzerland SCRIPT: An Architecture for IPFIX Data Distribution Peter Racz Communication Systems Group CSG Department of Informatics IFI University of Zürich
More informationA scalable architecture for emulating dynamic resource allocation in wireless networks
A scalable architecture for emulating dynamic resource allocation in wireless networks The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
More informationSTEELCENTRAL NETPLANNER
STEELCENTRAL NETPLANNER PREDICTIVE MULTI-LAYER NETWORK PLANNING BUSINESS CHALLENGE Growth and Upgrades» Which links will I need to upgrade in 3 months?» How will my new corporate applications affect utilization
More informationBattle Command Management Services (BCMS) Overview DoD M&S Conference 10 March 2008
U.S. Army Research, Development and Engineering Command Battle Command Management Services (BCMS) Overview DoD M&S Conference 10 March 2008 Problem Space Overview The real world Army is organized into
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationA Digium Solutions Guide. Switchvox On-Premise Options: Is it Time to Virtualize?
A Digium Solutions Guide Switchvox On-Premise Options: Is it Time to Virtualize? Businesses of all sizes can now realize the advantages of a fully-featured UC solution, whether it be virtualized, cloud/hosted
More information