IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel

Size: px
Start display at page:

Download "IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel"

Transcription

1 John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel

2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 2

3 Abstract This session will explain the various parts of Network encapsulations of PDUs Session Relationship to SCSI and TCP/IP Connections flow from Initiator to Target Error Recovery, Discovery and Security It will also explain Companion Processes Boot SLP isns And the session will describe Environments From the small office, to the High End Enterprise This session is appropriate for end user and developers of technologies 3

4 Terms - Internet SCSI NAS - Network Attached Storage Supports CIFS (Common Internet File System) protocols Supports NFS (Network File System) protocols FAN File Area Networks Utilize IP Networks and NAS protocols - Host Bus Adapter TOE - TCP/IP Offload Engine FC - Fibre Channel SAN - Storage Area Network Supports Block Storage Protocols (FC and ) isan A Storage Area Network made up of connections PDU - Protocol Data Unit 4

5 Agenda Introduction Features Error handling, Boot, Discovery usage models Security Q & A 5

6 Agenda Introduction Features Error Handling, Boot, Discovery usage models Security Q & A 6

7 Small Computer System Interconnect (SCSI) Scanners Legacy SCSI BUS (Being replaced by Serial-SCSI for single system storage connections) Printers Tapes Desktop / Server Computer ATA Disk SCSI Disks Note: ATA and SCSI drives with Serial attachments are called SATA and SAS There are 2 main hard drive interface classes available today: ATA (used mostly in desktop and laptop systems) Includes SATA which is becoming a larger presence in server class systems/arrays SCSI (used in server-class systems) includes PSCSI, FC & SAS 7

8 Systems with SCSI over Networks Application File System Application File System Application File System Fibre Channel or Storage Area Network (SAN) With Block I/O Both Fibre Channel and can makeup a SAN Replaces shared bus with switched fabric 8

9 is: Internet SCSI: internet Small Computer System Interconnect is a SCSI transport protocol for mapping of block-oriented storage data over TCP/IP networks The protocol enables universal access to storage devices and Storage Area Networks (SANs) over standard TCP/IP networks On Ethernet LANs: Copper & Optical On ATM WANs On SONET WANs Wireless Etc. 9

10 Data Encapsulation Into Network Packets Ethernet Header IP TCP SCSI Cmds Optional DATA CRC Protocol Data Unit (PDU): Provides ordering and control information. Contains control info, with optional SCSI Commands &/or Data Provides Reliable data transport and delivery (TCP Windows, ACKs, ordering, etc.) Also demux within node (port numbers) Provides IP routing capability so that packet can find its way through the network Provides physical network capability (Cat 5, MAC, etc.) 10

11 Mapping Control Header (with optional SCSI Command) PDU Optional Header CRC Optional Data Optional Data CRC PDU PDU PDU PDU Header & SCSI Command Header Data Header with SCSI Cmd Data Header with Only Control Info IP packet IP packet IP packet IP packet IP packet IP packet IP packet IP packet PDU alignment with packets varies 11

12 - Layered Model Application Layer Application I/O Request Logical Unit SCSI Interface SCSI Layer SCSI Class Driver (SCSI Initiator) SCSI Application Protocol SCSI Device (SCSI Target) SCSI CDB Protocol Layer TCP/IP Protocol Services TCP/IP TCP/IP TCP/IP Interface Transport Interface TCP/IP Protocol session Protocol Services TCP/IP TCP/IP TCP/IP PDU TCP segments in IP Datagrams Ethernet Data link + Physical Ethernet Data link + Physical Ethernet Frame Transparently encapsulates SCSI Command Descriptor Blocks (CDBs) 12

13 Application to LU Command Flow Application File System Disk ortape Driver (SCSI Class Driver) Device Driver Chip/ Device Driver SCSI Layer Target Function (CDB Passthrough) SCSI Device Driver LU#1 LU#2 LU#3 13

14 Multiple Connections Between Hosts and Storage Controllers Application Application File System Disk or Tape Driver (SCSI Class Driver) File System Disk or Tape Driver (SCSI Class Driver) WedgeDriver Device Driver Device Driver Device Driver one Session two Sessions 14

15 Integrity adds Cyclic Redundancy Check (CRC) CRC-32C - A 32 bit check word algorithm End to End Checking In addition to TCP/IP Checksums In addition to Ethernet Link level CRCs CRC check word is called a Digest Digests for Headers and Data Header Digest is optional to use (MUST implement) Insures correct operation and data placement Data Digest is optional to use (MUST implement) Insures data is unmodified through-out network path 15

16 Message Types Called Protocol Data Units (PDUs) Initiator to Target NOP-out SCSI Command Encapsulates a SCSI CDB SCSI Task Mgmt Cmd Login Command Text Command Including SendTargets Used in Discovery SCSI data-out Output Data for Writes Logout Command Target to Initiator NOP-in SCSI Response Can contain status SCSI Task Mgmt Rsp Login Response Text Response SCSI data-in Input Data from Reads Logout Response Ready to transfer R2T Async Event 16

17 Agenda Introduction Features Error Handling, Boot, Discovery usage models Security Q & A 17

18 Error Handling ErrorRecoveryLevel = 0 When detects errors it will bring down the Session (all TCP connections within the Session) and restart it will let the SCSI layer retry the operation ErrorRecoveryLevel = 1 Detected errors (Header or Data) causes PDUs to be discarded will retransmit discarded commands will retransmit discarded data ErrorRecoveryLevel = 2 Caused by loss of the TCP/IP connection Connection & Allegiance reestablishment Uses ErrorRecoveryLevel 1 to recover lost PDUs 18

19 Discovery via SendTargets Targets : :3260 SendTargets Targets : :3260 SendTargets Targets : :3260 SendTargets Set Discovery Target Addrs isan : :3260 Sessions between Initators and Targets Set IP Addrs and ACLs 19

20 Discovery via SLP SLP Directory Agent (DA) Multicast to find SLP DA & Get Addr of Storage Cntrls DHCP Get Addr of SLP DA from DHCP Get Addrs of Storage Cntrls from SLP DA via Unicast SA Advertises its existence to DA via Multicast Sessions between Initiators and Targets :3260 Set Addr of Storage Cntlrs + ACLs, and place Addr of SLP DA into DHCP :3260 SA gets DA Addr from DHCP then Advertises its existence to DA Note: Service Agent (SA) exist within Target Storage Ctlrs 20

21 Discovery via isns Gets location of isns from DHCP & Get Addr of Storage Cntrls from isns Gets location of isns from DHCP & Get Addr of Storage Cntrls from isns DHCP isns Server Str Ctlr gets isns Svr Addr from DHCP then sends its profile to isns Str Ctlr gets isns Svr Addr from DHCP then sends its profile to isns :3260 Set Addr of Storage Cntlrs + ACLs and place Addr of isns into DHCP :3260 Sessions between Initiators and Targets 21

22 Redirection After attempting to Login at specified location: The specified Target may signal a redirection Temporary redirection Permanent redirection Redirection used for: Corrections between Discovery DB updates Admin or automatic Hardware disablement for Service Because of HW problems For load balancing 22

23 Boot Static configuration information for Boot Admin sets authorized Target Node Name and Address, Optional LUN Default LUN is 0 Dynamic configuration via use of DHCP, SLP, isns DHCP can be used by Host to get an IP address DHCP can hold the Boot Service Option (Admin Set) May contain all that is needed to reach the Boot device May only contain Target Node Name, then use SLP/iSNS to resolve to address SLP, or isns can also be used to find the Boot location The Boot load process The Admin. or DHCP, SLP or isns can enable the access BootP/PXE is also possible as part of a SW two phase process HW can act as a normal SCSI for system BIOS use 23

24 Agenda Introduction Features Boot, Discovery, Error Handling usage models IP Security Q & A 24

25 Now lets look at the various environments where is appropriate 25

26 Combining of FC and Tape Library 2 Initiator 2 FC- Router registers FC devices WWN and Name alias. Both and FC identities are stored in the isns server isns Server Management Platform Tape Library 1 Management Platforms can view and manage both and FC devices by interacting with isns server Initiator 1 IP Network FC- Gateway FC Fabric FC JBOD: WWN = X FC JBOD: WWN=X, Name = abc FC Server: WWN=Y, FC Server: Name = xyz WWN = Y FC JBOD: WWN = X FC- Gateway FC Fabric FC Server: WWN = Z Other FC fabrics can be joined over common IP network. Other gateways can discover open mapping by querying isns 26

27 Small Office Interconnect Ethernet Print Server Switch Office Server NAS 27

28 IP Storage Combo -- NAS & Ethernet Print Server Switch NAS Office Server Dual Dialect Block and File I/O 28

29 & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip Midrange Environment Desktops and Laptops Servers Ethernet Switch & TOE Chip Cat.5 Ethernet Cables Ethernet Switch to FC Bridge FC NAS & TOE Dhip & TOE Chip Dual Dialect 29

30 High-End Environment Departmental Systems Satellite Location Satellite Location Departmental Systems Main Campus Departmental Systems CentralSystems Departmental Systems "At-Distance" Backup Center Satellite Location Satellite Location 30

31 & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip & TOE Dhip Campus Network Departmental Servers Desktops and Laptops Desktops and Laptops Departmental Servers Storage Ethernet Links Storage Central Server Systems Integrated Monitoring and management FC SAN to/from FC Routing Switch Links & TOE Dhip & TOE Dhip Campus Systems Disk and Tape Storage Controllers 31

32 Satellite and Central System/Storage FireWall & Switch Local Storage Satellite Locations Central Server Systems VPN FireWall VPN FireWall Satellite Servers Ethernet Switch Ethernet Switch FC SAN Ethernet to FC Router Local Storage Disk and Tape Storage Controllers 32

33 & TOE Dhip At-Distance Central Server Systems FC to IP over Ethernet Router FC SAN Ethernet IP FCIP/iFCP & FCIP/iFCP FireWall IP WAN FireWall Disk and Tape Storage Controllers Central Server Systems Enet to FC Switch Router Tape "At-Distance" Backup Center 33

34 & TOE Chip Web Server Installation Internet Links Ethernet Links NAS Web Server Systems Ethernet Switch SAN Dual Dialect & TOE Chip & TOE Chip FC SAN to/from FC Routing Switches & TOE Chip SATA Disk and Tape FC Storage Controllers 34

35 Peaceful Co-existence isan & NAS Note: File Area Network (FAN) utilizes IP Networks and NAS protocols NAS -Gateway Supports both and NAS (a Dual Dialect combination) RAID Ctlrs 35

36 Agenda Introduction Features Boot, Discovery, Error Handling usage models Security Q & A 36

37 Security Properties Connection Authentication: Who are you? Prove it! Mutual Authentication: Initiator to Target AND vice-versa Packet Integrity: Has this data been tampered with? Cryptographic Packet by Packet authentication & integrity check, not just checksum or CRC Anti-Replay to prevent regeneration attack Privacy: Encryption of the Data Authorization: What are you allowed to do? : Who can connect to which Target LUN masking & mapping handled by SCSI, not Security Features: Must be implemented but are Optional to use Subject to negotiation 37

38 Security Considerations Connection Authentication is way to determine trustworthiness via CHAP -- Challenge Handshake Authentication Protocol with strong secrets is required Can t use passwords Stronger than basic CHAP when specification is followed SRP -- Secure Remote Password Kerberos -- A Third Party Authentication protocol SPKM-1,SPKM-2 -- Simple Public Key Mechanism Connection Security may be used with or without IPsec s Packet Security: Packet Authentication Origin assurance Anti-Reply protection Privacy Encryption 38

39 Conclusions

40 is the Network Storage Alternative The performance on 1Gb Ethernet networks are Good Enough for many applications Host systems can use the cost effective software Initiators Host system can use the low overhead of HW for Initiators With link aggregation and Ethernet networks moving to 10Gb, most storage networking needs can be handled by is not just a Low-End protocol but will also apply to the High End environments. 40

41 References Both Books Published by Addison-Wesley Available in Book Stores and Amazon.com Volume purchases available The detail specification can be found at 41

42 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracknetworking@snia.org Many thanks to the following Group and individuals for their contributions to this tutorial. SNIA Education Committee Members of the SNIA IP Storage Forum David Black David Dale John Hufferd Peter Hunt Howard Goldstein Gary Orenstein Ahmad Zamer 42

43 Appendix 43

44 CHAP Authentication Protocol Based on shared secret, random challenge Uses a secure (one-way) hash, usually MD5 One-way hash: Computationally infeasible to invert Secret Challenge Secret Hash Response Host Hash Storage =? Can be outsourced to RADIUS server 44

45 with IPsec IKE (Internet Key Exchange) is performed to authenticate & obtain encryption key for IPSec Initiator Opens Socket connection to Target Pre-shared Key (or Certificate) Create encryption key Target Port is engaged Message Create encryption key IPsec protected TCP/IP connection Message Message is sent on Open Socket Message is delivered to Target's Listening Port 45

46 NAS v. (on the Storage Controller) 46

47 Spreading v. Centralizing the File System Overhead Block I/O (including ) spread the File System overhead across all the Clients NAS Clients move the File System overhead to the NAS server Block I/O (including ) Storage Controllers just store the I/O blocks where the Client File System requests (perhaps with Virtualizing LUN Mapping) NAS Servers centralizes the File System functions (and overhead) for all its clients into the NAS Server Plus the NAS Server still must map the resultant Blocks onto the Storage (perhaps with Virtualizing LUN Mapping) The non TCP/IP Server side overhead can be times higher in NAS Servers than Block I/O () Storage Controllers Therefore use NAS for File Sharing and for other IP Storage Requirements 47

EDUCATION IP Storage Protocols: iscsi

EDUCATION IP Storage Protocols: iscsi IP Storage Protocols: John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel Abstract IP Storage Protocols: This session will explain the various

More information

IP Storage Protocols: iscsi. John L Hufferd, Hufferd Enterprises

IP Storage Protocols: iscsi. John L Hufferd, Hufferd Enterprises John L Hufferd, Hufferd Enterprises SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material

More information

iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG

iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG hufferd@us.ibm.com What is iscsi? iscsi is a transport protocol for SCSI that operates on top of TCP through

More information

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers Introduction Storage: and FC Extension David L. Black, Ph.D. What is Storage? Storage access over / networks SCSI and Fibre Channel over / Why is Storage interesting? Reuse existing infrastructure and

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Traditional SAN environments allow block

Traditional SAN environments allow block Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance

More information

Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE. Gilles Chekroun Errol Roberts

Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE. Gilles Chekroun Errol Roberts Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE Gilles Chekroun Errol Roberts SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas SCSI Security Nuts and Bolts Ralph Weber, ENDL Texas SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations

More information

iscsi A Revolutionary IP based SAN

iscsi A Revolutionary IP based SAN Volume 2, Issue 3, June 2013 iscsi A Revolutionary IP based SAN Sandeep Gupta Abstract - The storage area network, or SAN, allows many servers to share data storage, while providing high-performance access

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture

NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture Robert A. (Bob) Lockhart - Chief Systems Architect rlockhart@neoscale.com Why Storage Security Now? Storage Drivers

More information

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the

More information

Fibre Channel vs. iscsi. January 31, 2018

Fibre Channel vs. iscsi. January 31, 2018 Fibre Channel vs. iscsi January 31, 2018 Today s Presenters Fred Knight NetApp John Kim SNIA ESF Chair Mellanox Alex McDonald SNIA ESF Vice Chair NetApp 2 SNIA-At-A-Glance 3 SNIA Legal Notice The material

More information

iscsi Unified Network Storage

iscsi Unified Network Storage iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,

More information

Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows

Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows Technical Brief: Titan & Alacritech iscsi Accelerator on Microsoft Windows Abstract In today s information age, enterprise business processing & information systems are growing at an incredibly fast pace

More information

PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE. A Thesis by. Ashish Maddi

PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE. A Thesis by. Ashish Maddi PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE A Thesis by Ashish Maddi Bachelor of Engineering, Mahatma Gandhi Institute of Technology, JNTU, India, 2006 Submitted to the Department of

More information

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software

More information

The Evolution of iscsi

The Evolution of iscsi The Evolution of iscsi Fred Knight, NetApp Andy Banta, SolidFire, Now part of NetApp @andybanta May 24 th, 2016 Today s Presenters Andy Banta Storage Janitor SolidFire/NetApp David Fair Chair, SNIA-ESF

More information

Agenda. 1. The need for Multi-Protocol Networks. 2. Users Attitudes and Perceptions of iscsi. 3. iscsi: What is it? 4.

Agenda. 1. The need for Multi-Protocol Networks. 2. Users Attitudes and Perceptions of iscsi. 3. iscsi: What is it? 4. iscsi Today and Tomorrow Gene Chesser Microsoft IOP Program Manager Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

S S SNIA Storage Networking Foundations

S S SNIA Storage Networking Foundations S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

COSC6376 Cloud Computing Lecture 17: Storage Systems

COSC6376 Cloud Computing Lecture 17: Storage Systems COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

review of the potential methods

review of the potential methods Mandatory iscsi Security review of the potential methods IPS Interim Meeting Nashua NH, May 01 2001 Ofer Biran Thanks to: IBM Research Lab in Haifa Bernard Aboba, David Black, Julian Satran, Steve Senum

More information

ECE Enterprise Storage Architecture. Fall 2016

ECE Enterprise Storage Architecture. Fall 2016 ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC

More information

Storage Protocol Analyzers: Not Just for R & D Anymore. Brandy Barton, Medusa Labs - Finisar

Storage Protocol Analyzers: Not Just for R & D Anymore. Brandy Barton, Medusa Labs - Finisar Storage Protocol Analyzers: Not Just for R & D Anymore Brandy Barton, Medusa Labs - Finisar SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft Server and Storage Consolidation with iscsi Arrays David Dale, NetApp Suzanne Morgan, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and

More information

iscsi : A loss-less Ethernet fabric with DCB Jason Blosil, NetApp Gary Gumanow, Dell

iscsi : A loss-less Ethernet fabric with DCB Jason Blosil, NetApp Gary Gumanow, Dell iscsi : A loss-less Ethernet fabric with DCB Jason Blosil, NetApp Gary Gumanow, Dell SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking

More information

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter:

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter: Chapter 1 Windows Server 2008 Storage Services Microsoft Exam Objectives covered in this chapter: ÛÛConfigure storage. May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API,

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

Storage Networking Standards: Future Directions

Storage Networking Standards: Future Directions Storage Networking Standards: Future Directions David L. Black, EMC Corporation, Member, SNIA Technical Council Steven Wilson, Brocade Communications, Member, SNIA Technical Council SNIA Legal Notice The

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

CompTIA Storage+ Powered by SNIA

CompTIA Storage+ Powered by SNIA CompTIA Storage+ Powered by SNIA http://www.snia.org/education/courses/training_tc Course Length: 4 1/2 days 9AM 5PM (Monday-Thursday) local time 9AM 2PM (Friday) local time Course Fee: $2,790 USD Register:

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper

EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper Dell EqualLogic Best Practices Series EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper Storage Infrastructure and Solutions Engineering Dell

More information

iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification?

iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification? iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification? Dr. M. K. Jibbe Distinguished Engineer Manager and Technical Lead of Test Architect and Product

More information

iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu

iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu Bachelor of Technology, JNTU, India, 2005 Submitted to Department of Electrical and Computer

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Seite von 7 05.0.200 Close Window Assessment System Exam Viewer - CCNA Practice Certification Exam # - (Version 4.0) Below you will find the assessment items as presented on the exam as well as the scoring

More information

Introduction to iscsi In BladeCenter

Introduction to iscsi In BladeCenter R Introduction to iscsi In BladeCenter First Edition (June 2005) Copyright International Business Machines Corporation 2005. All rights reserved. US Government Users Restricted Rights Use, duplication,

More information

FlexNAS/NetServ as iscsi Target

FlexNAS/NetServ as iscsi Target FlexNAS/NetServ as iscsi Target Revision History Version Comments V.0 First Edition. Contents What is iscsi...... Add iscsi target on NAStorage.......... ~ Connect to iscsi target (Windows 7)..... 5 ~

More information

C H A P T E R Commands Cisco SFS Product Family Command Reference OL

C H A P T E R Commands Cisco SFS Product Family Command Reference OL CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet

More information

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Objective A Virtual Private Network (VPN) is a private network that is used to virtually

More information

A Proposal for Access Controls

A Proposal for Access Controls A Proposal for Access Controls (aka SAN Boxes) SAN Promise and Problem T10 99-278r0 Promise: pool Storage Devices on SAN for ease of management Problem: SCSI not suited for "big shared bus" data integrity

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

TS Open Day Data Center Fibre Channel over IP

TS Open Day Data Center Fibre Channel over IP TS Open Day Data Center Fibre Channel over IP Presented by: Rong Cheng- TAC LAN & DCN China Jan 30 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 FCIP Introduction FCIP Configuration

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Agenda Why Secure a SAN? SAN Security Threats Weaknesses Fabric Security Controls Security

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

An Overview of CORAID Technology and ATA-over-Ethernet (AoE)

An Overview of CORAID Technology and ATA-over-Ethernet (AoE) An Overview of CORAID Technology and ATA-over-Ethernet (AoE) Dr. Michael A. Covington, Ph.D. University of Georgia 2008 1. Introduction All CORAID products revolve around one goal: making disk storage

More information

iscsi Design Considerations and Deployment Guide VMware Infrastructure 3

iscsi Design Considerations and Deployment Guide VMware Infrastructure 3 Technical Note iscsi Design Considerations and Deployment Guide VMware Infrastructure 3 With the release of VMware Infrastructure 3, VMware added ESX Server support for iscsi storage. With rapidly increasing

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

PAC532 iscsi and NAS in ESX Server 3.0. Andy Banta Senior Storage Engineer VMware

PAC532 iscsi and NAS in ESX Server 3.0. Andy Banta Senior Storage Engineer VMware PAC532 iscsi and NAS in ESX Server 3.0 Andy Banta Senior Storage Engineer VMware October 20th, 2005 Overview What is iscsi? What is NAS? Why are iscsi and NAS Interesting? How VMware is Doing iscsi Implementation

More information

Connectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1

Connectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1 Connectivity Module 2.2 2006 EMC Corporation. All rights reserved. Connectivity - 1 Connectivity Upon completion of this module, you will be able to: Describe the physical components of a networked storage

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support

More information

Interconnecting Cisco Networking Devices Part 1 ( )

Interconnecting Cisco Networking Devices Part 1 ( ) Interconnecting Cisco Networking Devices Part 1 (100-101) Exam Description: The 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1) is a 1.5- hour exam with 50 60 questions. The 100-101 Interconnecting

More information

Chapter 8 Network Security

Chapter 8 Network Security Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Design and Implementations of FCoE for the DataCenter. Mike Frase, Cisco Systems

Design and Implementations of FCoE for the DataCenter. Mike Frase, Cisco Systems Design and Implementations of FCoE for the DataCenter Mike Frase, Cisco Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Storage Update and Storage Best Practices for Microsoft Server Applications Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Agenda Introduction Storage Technologies Storage Devices

More information

HP0-S15. Planning and Designing ProLiant Solutions for the Enterprise. Download Full Version :

HP0-S15. Planning and Designing ProLiant Solutions for the Enterprise. Download Full Version : HP HP0-S15 Planning and Designing ProLiant Solutions for the Enterprise Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-s15 QUESTION: 174 Which rules should be followed when installing

More information

PeerStorage Arrays Unequalled Storage Solutions

PeerStorage Arrays Unequalled Storage Solutions Simplifying Networked Storage PeerStorage Arrays Unequalled Storage Solutions John Joseph, VP of Marketing EqualLogic,, 9 Townsend West, Nashua NH 03063 Phone: +1-603 603-249-7772, FAX: +1-603 603-579-6910

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Configuration of an IPSec VPN Server on RV130 and RV130W

Configuration of an IPSec VPN Server on RV130 and RV130W Configuration of an IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote access to corporate resources by establishing an encrypted tunnel

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Snia S Storage Networking Management/Administration.

Snia S Storage Networking Management/Administration. Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Title: CompTIA Storage+ Powered by SNIA

Title: CompTIA Storage+ Powered by SNIA 1 Title: CompTIA Storage+ Powered by SNIA Course Length: 4.5 Days Course Instructional Method: Interactive Lecture Animations, Lab Exam Study Sessions Course Documentation DVD containing: o Printable and

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Storage Networking Standards: Recent Developments

Storage Networking Standards: Recent Developments Storage Networking Standards: Recent Developments David L. Black, EMC Corporation, Member, SNIA Technical Council SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Information Storage and Management

Information Storage and Management Information Storage and Management Storing, Managing, and Protecting Digital Information Edited by G. Somasundaram Alok Shrivastava EMC Education Services W WILEY Wiley Publishing, Inc. Contents Foreword

More information

[ Quick Start Guide ]

[ Quick Start Guide ] [ Quick Start Guide ] QUICK START GUIDE INTELLIGENT STORAGE ROUTER INSTALLATION z isr6200 Purchasers of OEM products should consult with the OEM for support. Please feel free to contact your QLogic approved

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Lecture 7: Internetworking See Chapter 3 of Colouris

Lecture 7: Internetworking See Chapter 3 of Colouris 95-702 Distributed Systems Lecture 7: Internetworking See Chapter 3 of Colouris Learning Goals Preamble: MISM and MSIT grads may need to plan, develop, and manage distributed systems. These distributed

More information