edusafe Network Func2on Virtualiza2on lite Lightning
|
|
- Heather Day
- 5 years ago
- Views:
Transcription
1 edusafe Network Func2on Virtualiza2on lite Lightning Brian Bach Mortensen, NORDUnet
2 Challenges TradiAonally a lot of focus have been on catering large science users with Big Pipes Core network funcaons like: BoD Flexible bandwidth guaranteed pipes MD- VPN Flexible HW VPNs However, one of our most problemaac areas for years: Last- mile access Typically at regional or university network Very hard to connect users to above services Requires a lot of the user We need a flexible way to connect these users to our core services and beyond ObjecAves Challenges Achievements Conclusions Q&A 2
3 Mi2ga2on of the last mile problem To enable easier access to our services: The team focused on creaang of a SW- based VPN service Codename: edusafe The service can create a VPN tunnel between end users at universiaes and service instances It can connect to BoD and MD- VPN service instance In a simplisac form it has been used to extend MD- VPN beyond our core networks (to another conanent) And it is piloang 1 generaaon NFV ObjecAves Challenges Achievements Conclusions Q&A 3
4 Mi2ga2on of the last mile problem To enable users easier access edusafe has now been turned into a piloang service CreaAng completely SW based L2/L3 VPNs Providing privacy on unsafe networks (public wifi) Much wider potenaal impact on users Is there anyone who doesn t like privacy? Lower bandwidth than BoD and MD- VPN, but technology advances à Scaling in the cloud environment is (relaavely) easy Candidates that have been tested (OpenSource): SodEther OpenVPN ObjecAves Challenges Achievements Conclusions Q&A 4
5 Achievements Task 1: A Proof- of- concept: edusafe Other network challenges: How can I securely share my hard drive remotely? How do I secure my traffic on public networks? Can I do this in a simple way? 5
6 Scenario 1: Privacy and untrusted networks 6
7 Scenario 1: Privacy and untrusted networks Tunneling to a trusted gateway 7
8 Scenario 1: Privacy and untrusted networks Tunneling to trusted gateways 8
9 Scenario 2: Ad hoc networking edusafe with mulaple users 9
10 Scenario 3: Access to other connec2vity services edusafe and MD- VPN 10
11 Achievements Task 1: A Proof- of- concept: edusafe edusafe is: An edugain- enabled web portal To easily create/join VPNs With or without access to the public Internet Sodware- based VPNs: Complements MD- VPN, CoCo, etc. Scenario 3: extension of hardware- based connecavity services 11
12 edusafe development Currently Beta Version with VMs across Europe and USA CollaboraAon and exchange of ideas with NRENs: eduvpn (SURFnet) Discussion with AArnet Ongoing work for scaling Focus on Scenario 1 in coming months 12
13 Further work and collabora2on Network FuncAon VirtualizaAon Is going to take over a lot of funcaons from tradiaonal HW based devices Placing the network funcaons in a datacenter makes it possible to scale up and down based on demand Serve 99,9% of the NREN users Rather that 0,01% with big pipes (although a corner stone that should not be neglected) ISP and Incumbents are heavy looking in this way For the sake of revenue/profit Plenty of equpment vendors are looking for partners to fill their AppStore with SW StandardizaAon is also taking place hop:// clusters/technologies/nfv No doubt that this is going to be a big business 13
14 Thank you and any ques2ons?
eduvpn François Kooman
eduvpn François Kooman @fkooman Enschede, 2018-02-09 Me Software Developer (PHP, C) Freelancer traveling around Europe Used to work for SURFnet Now: lead developer eduvpn / Let s Connect!
More informationMulti Domain Service Architecture for Heterogonous Networks A view from GÉANT 3 - SA2: Task 1
Multi Domain Service Architecture for Heterogonous Networks A view from GÉANT 3 - SA2: Task 1 Brian Bach Mortensen, NORDUnet 2nd TERENA E2E Workshop on Provisioning E2E services & On-demand Infrastructure
More informationGÉANT : e-infrastructure connectivity for the data deluge
GÉANT : e-infrastructure connectivity for the data deluge Richard Hughes-Jones, Maria Minaricova & Vincenzo Capone DANTE BioMedBridges Workshop, Hinxton, 15-16 May 2014 What is GÉANT? High-bandwidth, high-performance
More informationCommunity Connection Service for escience. Ronald van der Pol, SURFnet TNC May 2014
Community Connection Service for escience Ronald van der Pol, SURFnet TNC 2014 20 May 2014 Project Overview! GN3plus Open Call Project (CoCo)! October 2013 March 2015 (18 months)! Partners: SURFnet (NL)
More informationAll-in one security for large and medium-sized businesses.
All-in one security for large and medium-sized businesses www.entensys.com sales@entensys.com Overview UserGate UTM provides firewall, intrusion detection, anti-malware, spam and content filtering, and
More informationCustomer Demand Drives the Economics of Disruption. Bruno Jacobfeuerborn CTO, Deutsche Telekom
Customer Demand Drives the Economics of Disruption Bruno Jacobfeuerborn CTO, Deutsche Telekom 5G economical challenge European Telco Industry currently returns below its cost of capital. Modernised Integrated
More informationIPv6 Address Planning and Strategy. A3ab A. Siddiqui Cyber Internet Services (Pvt) Ltd
IPv6 Address Planning and Strategy A3ab A. Siddiqui Cyber Internet Services (Pvt) Ltd a3abs@cyber.net.pk IntroducAon Too much address space how to subnet? How much is enough to future proof? It s difficult
More informationTowards Converged SmartNIC Architecture for Bare Metal & Public Clouds. Layong (Larry) Luo, Tencent TEG August 8, 2018
Towards Converged Smart Architecture for Bare Metal & Public Clouds Layong (Larry) Luo, Tencent TEG August 8, 2018 Agenda 1 Smart in Bare Metal Cloud 2 Smart in Public Cloud 3 Converged Smart Architecture
More informationAccessing CharityMaster data from another location
Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto
More informationHow to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway
How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway To connect your on-premise Barracuda NG Firewall to the static VPN gateway service in the Windows Azure cloud create a IPsec tunnel
More informationSCALABLE VEHICULAR AD-HOC NETWORKS DISTRIBUTED SOFTWARE-DEFINED NETWORKING
SCALABLE VEHICULAR AD-HOC NETWORKS DISTRIBUTED SOFTWARE-DEFINED NETWORKING AHMED SAYED-HASSAN AGENDA Current networking solutions for V2X Problem definition Motivations for a scalabe networking solution
More informationVerifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services)
1 Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services) Vyas Sekar vnfo joint with Seyed Fayazbakhsh, Mike Reiter VRA joint with Chen Chen, Petros Mania9s,
More information1. Click on "IaaS" to advance to the Windows Azure Scenario. 2. Click to configure the "CloudNet" Virtual Network
Introduction to the Virtual Network Lab Scenario Steps Description 1. Click on "IaaS" to advance to the Windows Azure Scenario Windows Azure Infrastructure Services ( IaaS ) provides us with the capability
More informationMedia-Ready Network Transcript
Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the
More informationHardware Accelera+on in an SDN/NFV World: MRV POC with Charter Communica+ons
Hardware Accelera+on in an SDN/NFV World: MRV POC with Charter Communica+ons AusNOG 2016 Lightning Talk John Jones (jjones@mrv.com) Sept 2, 2016 Overview MRV NFV POC with Charter in Denver, Colorado. We
More informationSD-WAN. The CIO s guide to. Why it s time for a new kind of network
The CIO s guide to SD-WAN Why it s time for a new kind of network More applications, more complexity, more problems, more opportunities. We re doing business in a bold new world. Technology, data and digitalization
More informationOPENVPN CLIENT: AUTORUN AND AUTOCONNECT. https://www.bestvpn.com/blog/11276/get-openvpn-autorun-autoconnect/
OPENVPN CLIENT: AUTORUN AND AUTOCONNECT https://www.bestvpn.com/blog/11276/get-openvpn-autorun-autoconnect/ At BestVPN we always recommend using OpenVPN, as by far it is always the most secure tunnelling
More informationHow Smart Networks are changing the Corporate WAN
How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet
More informationSD-WAN Tutorial: Service Components, Functionality, MEF Reference Architecture and Use Cases
Tutorial: Service Components, Functionality, MEF Reference Architecture and Use Cases Ralph Santitoro, Distinguished Fellow and Director, MEF Head of SDN/NFV Solutions Practice, Fujitsu Contents Concept:
More informationDeploying Standards-based, Multi-domain, Bandwidth-on-Demand
Nordic Infrastructure for Research & Education Deploying Standards-based, Multi-domain, Bandwidth-on-Demand Lars Fischer 28 th NORDUnet Conference Uppsala, 23 September 2014 The State of BoD Hybrid networking
More informationAusAn TACC. OpenMP. TACC OpenMP Team
UT AusAn TACC OpenMP Thread Affinity TACC OpenMP Team milfeld/lars/agomez@tacc.utexas.edu Learning ObjecAve Understand why you should care about affinity Basic concepts OMP_PLACES OMP_PROC_BIND Standard
More informationMCR Google Cloud Partner Interconnect
MCR Google Cloud Partner Interconnect 1 MCR Google Cloud Partner Interconnect MCR Connections to Google Cloud Platform using GCI Partner Google s private interconnection service is called Google Cloud
More informationDeliverable D8.4 Certificate Transparency Log v2.0 Production Service
16-11-2017 Certificate Transparency Log v2.0 Production Contractual Date: 31-10-2017 Actual Date: 16-11-2017 Grant Agreement No.: 731122 Work Package/Activity: 8/JRA2 Task Item: Task 6 Nature of Deliverable:
More informationTHE COMPLETE FIELD GUIDE TO THE WAN
THE COMPLETE FIELD GUIDE TO THE WAN People interested in setting up a wide-area network (WAN) often have very specific reasons for wanting to do so. WANs are specialized technological tools that deliver
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationHow to Configure a Route-Based VPN Between Azure and a Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure a Route-Based VPN Between Azure and a Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents INTRODUCTION 2 DEPLOYMENT SCENARIO 2 CONFIGURATION OVERVIEW 3 FIREWALL CONFIGURATION OVERVIEW
More informationGluon: An Enabler for NFV
Gluon: An Enabler for NFV Bin Hu PMTS, AT&T Ian Wells Principal Engineer, Cisco Ildikó Váncsa OpenStack Coordinator, Ericsson Alternatives for Improving Openstack Networking to Address NFV Needs Controller
More informationDEUTSCHE TELEKOM TERASTREAM: A NETWORK FUNCTIONS VIRTUALIZATION (NFV) USING OPENSTACK
DEUTSCHE TELEKOM TERASTREAM: A NETWORK FUNCTIONS VIRTUALIZATION (NFV) USING OPENSTACK IPv4-over-IPv6 Softwire is the first example of a high-volume, data-plane-oriented network function that was virtualized."
More informationExample Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT)
Example Azure Implementation for Government Agencies Indirect tax-filing system By Alok Jain Azure Customer Advisory Team (AzureCAT) June 2018 Example Azure Implementation for Government Agencies Contents
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationGÉANT L3VPN Service Description. Multi-point, VPN services for NRENs
GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)
More informationJuniper JN DX Specialist (JNCIS-DX) Download Full Version :
Juniper JN0-730 DX Specialist (JNCIS-DX) Download Full Version : https://killexams.com/pass4sure/exam-detail/jn0-730 Answer: A, D QUESTION: 258 In the exhibit, you configure NAT-src to translate traffic
More informationEmpower your teams with more video meeting options.
v-concert Cloud Based Video Services ENTERPRISE VIDEOCONFERENCING WITHOUT THE BIG INVESTMENT Empower your teams with more video meeting options. v-concert is a cloud-based suite of video collaboration
More informationSDN for Multi-Layer IP & Optical Networks
SDN for Multi-Layer IP & Optical Networks Sterling d Perrin Senior Analyst, Heavy Reading Agenda Definitions for SDN and NFV SDN Drivers and Barriers SDN Use Cases and Applications General Uses Specific
More informationEnterprise IPv6, Affecting Positive Change
Enterprise IPv6, Affecting Positive Change Rich Lewis IPv6 Product Manager, Oracle Global IT TXv6TF, March 2014 I am not an Oracle spokesperson, the views and opinions expressed in this presentation are
More informationTakes 3-6 Months to Deploy. MPLS connections take 3-6 months to be up and running in some remote locations. Incurs Significantly High Costs
SOLUTION BRIEF Aryaka Global SD-WAN The Ultimate MPLS Replacement Not built for Cloud/SaaS applications MPLS provides almost negligible access and connectivity to Cloud/SaaS based applications. Direct
More informationAdvancing European R&E through collaboration
Advancing European R&E through collaboration CESNET Conference Erik Huizer, GÉANT, 11 th December 2017 To support collaboration and development amongst researchers, the dissemination of information & knowledge,
More informationLessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO
Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption
More information4 Soft Switch Solutions with
Panamax Delivers Customised Class 4 Soft Switch Solutions with LNP lookup support and TDM gateway features To Salnet Summary Salnet is a telecommunication company based in El Salvador. The company contacted
More informationSDN Software-Defined Networking
SDN Software-Defined Networking The big picture: Rationale, comparison with current model, pitfalls Morten Engelsåstrø Chief NMS Architect Fixed Networks Telenor Norway High-level definitions Software-Defined
More informationManaging Wi-Fi With CloudCheck
Managing Wi-Fi With CloudCheck ASSIA Software Solutions Reliably Fast Broadband & Wi-Fi for the Home 1 June 6 2018 ASSIA Overview Market Leader in Diagnostics and Optimization Software DSL & Optical Broadband
More informationThe adoption of cloud services
Andres Steijaert andres.steijaert@surfnet.nl The adoption of cloud services ASPIRE STAKEHOLDER WORKSHOP Brussels Thursday 13 September 2012 www.terena.org/aspire The adoption of cloud services How can
More informationGet Your Head in the Cloud: Understanding Cloud, SaaS and Hosted. Session Q&A
Get Your Head in the Cloud: Understanding Cloud, SaaS and Hosted Session Q&A 1. We are with Ace and have Ace discs that we install and update. Will that automatically be updated or will we still need to
More informationQuantum, network services for Openstack. Salvatore Orlando Openstack Quantum core developer
Quantum, network services for Openstack Salvatore Orlando sorlando@nicira.com Openstack Quantum core developer Twitter- @taturiello Caveats Quantum is in its teenage years: there are lots of things that
More informationNFV ACCELERATION INTRODUCTION. Presenter Ning Zong
NFV ACCELERATION INTRODUCTION Presenter Ning Zong (zongning@huawei.com) 1 Some History - Why Acceleration is Beneficial to NFV PoC#21 - Network Intensive and Compute Intensive Hardware Acceleration ETSI
More informationFederated Identities and Services: the CHAIN-REDS vision
Co-ordination & Harmonisation of Advanced e-infrastructures for Research and Education Data Sharing Federated Identities and Services: the CHAIN-REDS vision Federico Ruggieri, GARR/INFN Joint CHAIN-REDS/ELCIRA
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and
More informationResults from the EARNEST Technical Study
EARNEST Workshop, Amsterdam, 8 May 2007 Results from the EARNEST Technical Study Licia Florio, TERENA florio@terena.org Agenda Technical study Lower layers preliminary results Middleware preliminary results
More informationDisaster Recovery How to NOT do it. Derek Martin Senior TSP Azure
Disaster Recovery How to NOT do it Derek Martin Senior TSP Azure Infastructure @thebookofdoodle 1 A Bit About Me Derek Martin Senior TSP Azure Infrastructure @thebookofdoodle @doodlemania on Peepeth www.derekmartin.org
More informationOpenVPN protocol. Restrictions in Conel routers. Modified on: Thu, 14 Aug, 2014 at 2:29 AM
1/2/2016 OpenVPN protocol : Support Portal OpenVPN protocol Modified on: Thu, 14 Aug, 2014 at 2:29 AM OpenVPN (Open Virtual Private Network) is a means of interconnection of several computers through an
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features
More informationHow to Configure VNET peering with the F-Series Firewall
How to Configure VNET peering with the F-Series Firewall If you have multiple virtual networks in the same Azure region, you can connect them with a high bandwidth, low-latency connection via virtual network
More informationHow to Configure Azure Route Tables (UDR) using Azure Portal and ARM
How to Configure Azure Route Tables (UDR) using Azure Portal and ARM Azure Route Tables, or User Defined Routing, allow you to create network routes so that your F-Series Firewall VM can handle the traffic
More informationWHITEPAPER. How to secure your Post-perimeter world
How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward
More informationConnect. Communicate. Collaborate. GN2 JRA5 update. Jürgen Rauschenbach (DFN), JRA5 team 04/02/08 Marseille. JRA5 Team
GN2 JRA5 update Jürgen Rauschenbach (DFN), JRA5 team 04/02/08 Marseille eduroam Working on the eduroam database and a new dissemination look (maps) RadSec release 1.0 Beta is out - reasonable stable and
More informationAfrica Peering and Interconnec0on Forum Panel discussion on the Content equa1on of NRENs August 11 12, 2010
Africa Peering and Interconnec0on Forum Panel discussion on the Content equa1on of NRENs August 11 12, 2010 Meoli Kashorda, PhD, MIEEE Execu0ve Director, KENET and Professor of informa0on Systems, USIU
More informationOverlay Engine. VNS3 Plugins Guide 2018
Overlay Engine VNS3 Plugins Guide 2018 Table of Contents Introduction 3 Overlay Engine Detail 7 Running the Overlay Engine Plugin 12 Overlay Engine Best Practices 20 Restrictions/Limitations 22 Resources
More informationVNS3 Configuration. Quick Launch for first time VNS3 users in Azure
VNS3 Configuration Quick Launch for first time VNS3 users in Azure Table of Contents Setup 3 Notes 9 Create a Static IP 12 Create a Network Security Group 14 Launch VNS3 from Marketplace 19 VNS3 Unencrypted
More informationEnabling IPv6 at Comparis.CH. A Case Study Gert Döring, Riyadh, May
Enabling IPv6 at Comparis.CH A Case Study Gert Döring, Riyadh, May 7 2015 Agenda Project scope and Introduction Phase I assessment, planning and budgeting Phase II training and testing Phase III IPv6-enablement
More informationApp Gateway Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical
More informationRethinking Cellular Architecture and Protocols for IoT Communica9on
Rethinking Cellular Architecture and Protocols for IoT Communica9on K. K. Ramakrishnan Dept. of Computer Science and Engg. University of California, Riverside (collaboraaon with students at UCR, Prof.
More informationThe new perfsonar: a global tool for global network monitoring
The new perfsonar: a global tool for global network monitoring Domenico Vicinanza (on behalf of the perfsonar Project) http://www.perfsonar.net GÉANT Product Management Team GÉANT Global Connec/vity -
More informationEmpowering Peer-to-peer Services. Luca Deri
Empowering Peer-to-peer Services Luca Deri Vision The internet should be a transparent IP-based transport for users, not a geographical/isp constrain. Users should control/create their
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationSuse Cloud, Openstack and Virtualisation for the Enterprise. Datalounges
Suse Cloud, Openstack and Virtualisation for the Enterprise Datalounges Oy @datalounges http://www.datalounges.com Agenda Introduction and Datalounges background Todays market: shark eat shark Openstack
More informationInstallation procedure for Connect Tunnel client: Windows operating systems
Installation procedure for Connect Tunnel client: Windows operating systems 1. Access the IBM Gateway Dublin, Ohio network client download site at: http://wtte-gateway1.pok.ibm.com/we_downloads.htm 2.
More informationSDN Commercial Deployments: Emerging Business Cases
SDN Commercial Deployments: Emerging Business Cases An IHS Markit Technology Webinar 2016 IHS Markit. All Rights Reserved. #SDN 2 Today s Speakers SDN Commercial Deployments: Emerging Business Cases #SDN
More informationbelieve in more SDN for Datacenter A Simple Approach
believe in more SDN for Datacenter A Simple Approach 1 Agenda ACI Overview Fabric Policy Constructs Hypervisor Support A migra>on scenario One management umbrella: UCS Director Q&A 2 Applica,on Language
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationSOFTWARE-DEFINED WAN (SD-WAN)
SOFTWARE-DEFINED WAN (SD-WAN) Device Bootstrapping User Guide This SD-WAN Bootstrapping Guide will take you through the necessary steps to connect your device to the network. There are two important actions
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationTen things hyperconvergence can do for you
Ten things hyperconvergence can do for you Francis O Haire Director, Technology & Strategy DataSolutions Evolution of Enterprise Infrastructure 1990s Today Virtualization Server Server Server Server Scale-Out
More informationInternet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski
Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT
More informationColt Novitas: Bringing SDN & NFV in Production. Javier Benitez, Strategy & Architecture,
Colt Novitas: Bringing SDN & NFV in Production Javier Benitez, Strategy & Architecture, Javier.benitez@colt.net 09 May 2016 ESNOG GORE 17, Barc elona 2016 1 Colt at a glance 187k+ LDN, metro fibre and
More informationEFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE
EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can
More informationQoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective.
TIM BRASIL Rio de Janeiro, 29 de Novembro de 2017 QoS/QoE in future IoT/5G Networks: A Telco transformation infrastructure perspective. AGENDA THE CONTEXT: UNDERSTANDING THE SCENARIOS TECHNOLOGIES, ARCHITECTURES
More informationDevices outside the Enterprise perimeter. Alex Perry, Google, Venice CA
Devices outside the Enterprise perimeter Alex Perry, Google, Venice CA Outline Device diversity among users Many services and perimeters Usage across many perimeters The Beyond Corp architecture Administration
More informationConfiguring Aviatrix Encryption
Configuring Aviatrix Encryption For AWS Direct Connect Azure Express Route Google Cloud Interconnect Last updated: October 9, 2016 Aviatrix Systems, Inc. 4555 Great America Pkwy Santa Clara CA 95054 USA
More informationService Provider Security Architecture
Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven
More informationBeyond Blind Defense: Gaining Insights from Proactive App Sec
Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks
More informationNetwork Mul,tenancy in Xen- based Clouds. Chiradeep Vi;al CloudStack Commi;er Citrix Sep
Network Mul,tenancy in Xen- based Clouds Chiradeep Vi;al CloudStack Commi;er Citrix Systems @chiradeep Sep 18 2013 Agenda Introduc,on to CloudStack Mul,- tenant IAAS Network Virtualiza,on / SDN L3 isola,on
More informationHow to find your IP address information
How to set up a VPN server on Windows 10 Source: https://pureinfotech.com/setup-vpn-server-windows-10/ Here are the step-by-step instructions to set up a VPN server using the built-in Incoming Connection
More informationDigi Connect Family Application Guide How to Create a VPN between Digi and Juniper Netscreen
Digi Connect Family Application Guide How to Create a VPN between Digi and Juniper Netscreen Scenario Digi Connect family VPN router (for example ConnectPort WAN or Digi Connect WAN IA) is used for remote
More informationYahoo! JAPAN s Infrastructure. Kazuhide Fujimi Server Infrastructure Architect Yahoo Japan Corporation
Server & Storage Adoption of OCP Solutions in Yahoo! JAPAN s Infrastructure Kazuhide Fujimi Server Infrastructure Architect Yahoo Japan Corporation Agenda About Yahoo! JAPAN Server Infra. Overview Adoption
More informationHow to Re-evaluateYour MPLS Service Provider
How to Re-evaluateYour MPLS Service Provider Data Traffic MPLS Do you run an MPLS network to some or all of your branches? If so, you are likely wasting MPLS capacity backhauling Internet traffic. For
More informationNetwork Disaggregation
Network Disaggregation Mian Usman Network Architect Internet2 Global Summit 2018 1 GÉANT Network The GÉANT network interconnects research, education and innovation communities worldwide, with secure, high-capacity
More informationLook who s talking. Mitel MiCloud Advance. The phone system that helps you get to know your customers.
Look who s talking Mitel MiCloud Advance. The phone system that helps you get to know your customers. Introducing a more intelligent phone system With a Mitel MiCloud Advance phone system, you ll have
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationTEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS
E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand
More informationDesigning the Multi Domain Service Architecture for Network Connectivity Services in the GÉANT3 project
Designing the Multi Domain Service Architecture for Network Connectivity Services in the GÉANT3 project Brian Bach Mortensen, NORDUnet Terena Networking Conference Vilnius 2010 Outline GÉANT Service area
More informationAnanta: Cloud Scale Load Balancing. Nitish Paradkar, Zaina Hamid. EECS 589 Paper Review
Ananta: Cloud Scale Load Balancing Nitish Paradkar, Zaina Hamid EECS 589 Paper Review 1 Full Reference Patel, P. et al., " Ananta: Cloud Scale Load Balancing," Proc. of ACM SIGCOMM '13, 43(4):207-218,
More informationCLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS
CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS A STRONG PARTNER OUR PORTFOLIO COMPANY Expand your own portfolio with an IT security expert that has redefined DDoS protection from the cloud. Link11 is
More informationSeminar/Workshop on New Technologies in Satellite and Ground Network
in Satellite and Ground Network SITA Daniel Coslovsky Business Development Director Mauro Diniz Senior Solution Designer Agenda Part I Who we are New Trends & Challenges in ground communications networks
More informationSD-WANs and Lifecycle Service Orchestra8on (LSO) Pascal Menezes CTO, MEF
s and Lifecycle Service Orchestra8on (LSO) Pascal Menezes CTO, MEF Content About MEF, LSO and Vision MEF s Defini>on of MEF s Use Cases MEF s Vision of the Evolu>on of Summary MEF Created the $80B* Carrier
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationSolution. Imagine... a New World of Authentication.
A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure
More informationNow SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationOracle Cloud. Using Oracle Network Cloud Service - FastConnect Standard Edition E
Oracle Cloud Using Oracle Network Cloud Service - FastConnect Standard Edition E74464-05 April 2017 Oracle Cloud Using Oracle Network Cloud Service - FastConnect Standard Edition, E74464-05 Copyright 2016,
More information