CARRIER GRADE PROFILE FOR WIND RIVER LINUX

Size: px
Start display at page:

Download "CARRIER GRADE PROFILE FOR WIND RIVER LINUX"

Transcription

1 AN INTEL COMPANY CARRIER GRADE PROFILE FOR WIND RIVER LINUX Carrier Grade Profile for Wind River Linux meets the registration requirements of the Linux Foundation s Carrier Grade Linux 5.0 specification. As an add-on profile for Wind River Linux 9.0, this turnkey solution delivers all of the technologies essential to building a powerful, flexible, responsive, stable, and secure platform. Built on the Yocto Project Compatible Wind River Linux platform, Carrier Grade Profile provides complete architecture support across major BSPs, with increased interoperability allowing changes to fit your future business needs while reducing switching costs and development effort. Backed by our unrivaled global support and services, Carrier Grade Profile provides essential capabilities for all industries, enabling the next generation of embedded Linux designs that require secure, standards-based, and reliable solutions. TABLE OF CONTENTS Technical Specifications... 2 Key Features... 2 Carrier Grade Kernel... 2 Carrier Grade User Space... 3 Broader Testing... 4 Yocto Project Compatibility... 6 Wind River Professional Services... 7 Contact Support... 7 Product Note WHEN IT MATTERS, IT RUNS ON WIND RIVER

2 TECHNICAL SPECIFICATIONS Linux base: Wind River Linux 9 Supported processor architectures: Full architecture support for any BSP provided in the Wind River Linux 9 base Linux Foundation s Carrier Grade Linux registration: Specification 5.0 Yocto Project version: 2.2 (Wind River Linux 9.0) KEY FEATURES Carrier Grade Kernel The kernel updates in Wind River Linux form the basis of many features to support Carrier Grade Linux (CGL) registration, including the following: Error Detection and Correction (EDAC): A set of Linux kernel modules for reporting and handling hardware-related errors Security Enhanced Linux (SELinux): A full-featured Linux Security Module providing a reference monitor capable of providing multilayer security and multi-category security, implementing both mandatory access control (MAC) and role-based access control (RBAC) Interrupt threading: Configuring interrupt handling and scheduling handler routines as any other software thread, allowing for maximum flexibility and higher predictability when designing a system Logical Volume Management (LVM): The ability to dynamically resize disks on a system according to changing needs Low latency event monitoring: A variant of poll(2) that can be used as either an edge-or a level-triggered interface that scales well to large numbers of watched file descriptors Open Cryptographic Framework: Transparent hardware-accelerated cryptographic support for specific BSPs Redundant array of independent disks (RAID): Both software and hardware RAID support, including striping Reliable file system support: Various highly reliable file systems are supported (e.g., ext4, btrfs, ocfs2) Group management: Support for grouping sets of processes together, for use with process control subsystems such as cpusets, CFS, memory controls, and device isolation; includes net traffic controller, memrlimit controller, dm-ioband bio_tracking, and group scheduling controllers kdump: Kernel crash dump for analyzing the cause of a deployed kernel crash kexec: A system call that provides the ability to shut down the current kernel and start another without rebooting hardware Persistent data storage: Data storage that persists across reboots for storing debug and log information (e.g., pstore) Profiling: Support for kernel and system-call profiling through LTTng and perf (rich abstractions over hardware performance monitoring capabilities; per-task, per-cpu, and per-workload counters and counter groups and sampling capabilities) 2 Product Note

3 Carrier Grade User Space In addition to the kernel features, the Carrier Grade Profile for Wind River Linux user space is a hardened, reliable base on which to develop applications and systems, whether they are headless, remote systems or must support multiple concurrent users with varying levels of access and clearance. Supported features include the following: SELinux and the Reference Policy SELinux is a full-featured Linux Security Module providing a reference monitor capable of providing multilayer security and multi-category security, implementing both MAC and RBAC. Based on the SELinux official reference policy and the Yocto Project selinux layer, the Wind River SELinux reference policy is tailored to support both strict and mcs modes out of the box. Security Originally developed by the National Security Agency (NSA), SELinux is the gold standard of flexible and trusted computing environments. SELinux is both a Linux Security Module (LSM) a piece of the kernel that arbitrates access to all system resources based on the system policy and a collection of supporting user space tools for developing, applying, enforcing, auditing, and debugging the security policy used by the LSM. Wind River Linux includes three levels of security out of the box for SELinux-enabled configurations, based on the SELinux Reference Policy Project and configured specifically for Wind River Linux. Wind River Linux also includes advanced, preemptive security technologies such as multilevel run-time stack and buffer overflow protection and a suite of tools that together provide a complete intrusion detection and prevention system. Reliability, Availability, Manageability Carrier Grade Profile meets the SCOPE Alliance Linux profile and addresses key SCOPE Alliance gaps. Relevant features include persistent shared memory with the system black box, coherent user and kernel tracing framework with LTTng, run-time analysis tools, and common command-line tools such as strace and ltrace for doing system call and library tracing. The following Carrier Grade Profile features go beyond the existing CGL requirements: Coarse resource enforcement that allows memory and scheduling limits to be enforced on a group basis rather than per process or per object Layer 2 Tunneling Protocol (L2TP version 3) support File access tracing that provides extensive logging and notification options for monitoring file access and recording system events Redundant virtual routing support, based on the Common Address Redundancy Protocol, that provides the ability to create highly available dynamic routers and gateways 3 Product Note

4 Feature-rich IPsec environment ranging from simple certificate creation and management to cryptographic reliability and integrity self-tests Dynamic multi-category security management tools for virtual guests through libvirt and the SELinux svirt tools Support for advanced system architectures that leverage memory and processor latency domains with tools such as numactl and libnuma that enable application and system designers to get the best performance out of their real and virtual machines Reliable damage-resistant file system support, detailed in the CGL 5.0 specification, including data and metadata integrity checking mechanisms With support for standalone and clustered systems as well as the PICMG Advanced Telecommunications Computing Architecture (ATCA) specification, Carrier Grade Profile provides highly available solutions for devices at the network core and edge. Network-Based Storage Solutions Carrier Grade Profile provides functionality for centralized logging servers, centralized billing and accounting servers, and share file system servers by integrating technologies such as the distributed replicated block device (DRBD), multiple redundant communication paths to external storage over fiber channel links, ATA over Ethernet, the Oracle Cluster File System version 2 (OCFS2), and Internet Small Computer System Interface (iscsi). IP Security (IPsec) Carrier Grade Profile supports a number of mechanisms for establishing trust between two systems with IPsec, the most common being Internet Key Exchange (IKE, both version 1 and version 2). IKE sets up a shared session secret via a Diffie-Hellman key exchange, using either public key techniques or a pre-shared key. IKE functionality can come from the IPsec- Tools suite in the form of the racoon daemon or from a dedicated IPsec implementation provided by strongswan. All of the expected standards (for example, X.509 for single sign-on, AH and ESP for header and payload encapsulation, IKEv2 for mobile devices via MOBIKE RFC 4555, and HMAC-SHA-256+/RFC 4868 and Suite B cryptography/rfc 4869 for IPSec) are available through IPsec-Tools or the strongswan suite. Broader Testing Wind River is committed to implementing and conforming to standards wherever possible. That commitment extends well beyond the Linux Foundation s Carrier Grade specification. As with past releases of Wind River Linux, Carrier Grade Profile for Wind River Linux provides all the necessary tools to validate conformance to the Linux Standard Base 4.1 Specification. Wind River Linux 8.0 and Carrier Grade Profile are not certified but maintain the IPv6-Ready status and can be certified if required. Carrier Grade Profile is the first version of Wind River Linux to undergo IPv4/IPv6 conformance testing, resulting in a more complete, interoperable product, and a more complete view of platforms based on it. 4 Product Note

5 Wind River has developed a robust, scalable, and automated build and test infrastructure with more than 5,500 test cases and 650,000 test runs. This infrastructure supports many processor architectures and uses a combination of commercial, open source, and proprietary tests, including LTP Core, LTP Network, LSB, TAHI, IxANVL, and Open POSIX. Wind River uses coverage tools, such as gcov and lcov, to optimize test development and close gaps in existing test suites. Automated and manual tests include the following: Automated boot login: This tests the booting process of any target architecture for a given kernel and rootfs. The process is completely automated for a set of targets, which helps in determining the boot sanity of the target. CD sanity: This automation suite covers CD installation on a new release, followed by building the rootfs for various target combinations using prebuilt RPMs. It boots the target with the prebuilt kernel and rootfs and executes KGDB and user-mode tests on the target, then reports the results to the database. Linux Test Project (LTP): This test suite validates the reliability, robustness, and stability of the Linux kernel and its network components. Open Hardware Platform Interface (HPI): The Open HPI is an abstracted interface for managing computer hardware, typically chassis and rack-based servers. It includes resource modeling; access to and control over sensor, control, watchdog, and inventory data associated with resources; abstracted System Event Log interfaces; hardware events and alarms; and a managed hotswap interface. Open POSIX: This test suite is for POSIX 2001 APIs not tied to specific implementations. It provides conformance, functional, and stress testing, with an initial focus on threads, clocks and timers, signals, message queues, and semaphores. Real-Time Feature Testing with Lmbench: Real-Time Feature Testing tests performance. LMBench mainly measures two categories of system performance: latency and bandwidth. Saftest: Saftest tests the Open HPI package. Kernel Test Suite (KTS): This package tests kernel features against architecture and hardware configurations. User Space Test Suite: User space tests verify that user packages have compiled and operated correctly in target run-time systems. Toolchain: This verifies that toolchains comply and operate correctly in target run-time systems. nmap: This is a network exploration tool and security scanner. Netperf: This tool tests networking performance. CGL compliance: This tests more than 113 P1 requirements. kexec and core-dump, server-based install: This tests CGL features. TAHI IPv6 conformance: The TAHI Project is a joint effort to develop and provide verification technology for IPv6. The TAHI IPv6 conformance tests ensure interoperability with IPv6 protocols. 5 Product Note

6 iozone: This is a file system performance test tool. IxANVL: This is an IPv4 IPsec compliance test, including IKEv2, IPSEC-AH, IPSEC-EP, and IPSEC-IKE. Footprint: This tests the static kernel footprint. Static rootfs footprint: This tests the static rootfs footprint size. Dynamic footprint: This tests the run-time system footprint. Boot-time: This measures board boot-up time. BSP Test Suite (BTS): Along with new BSPs, there are board-specific tests mentioned in the board readme file. Documentation: Documentation for Wind River Linux 8.0 was tested to make sure all steps are properly recorded. Host OS: Installation is tested on various host operating systems supported for Wind River Linux 8.0, as well as sample application build and debugging from Wind River Workbench and platform build. HRT regression: HRT features for previous releases were tested for regression on the supported platforms. Out-of-box experience: Tests validate customers specialized workflows for installation and upgrades, so the customers can install and upgrade their products smoothly and rapidly. Regression testing (RT) regression: RT features in previous releases were tested for regression on the supported platforms. Use case: The use cases for Workbench, run-time analysis tools, and build system were tested on supported hosts and platforms. Workbench integration: Wind River tests the feature integration of Workbench with Wind Manage, System Viewer, and run-time analysis tools. Yocto Project Compatibility Similar to an OpenEmbedded metadata layer, Carrier Grade Profile for Wind River Linux builds on top of the Yocto Project Compatible base of Wind River Linux. The OpenEmbedded meta-networking layer is the foundation layer between the Yocto Project and Carrier Grade Profile. Meta-networking provides common services required in carrier grade systems (e.g. File Transfer Protocol (FTP) daemons and network configuration, and authentication tools like autofs and Network Information Service (NIS)). Carrier Grade Profile provides more complex components (e.g., Cluster management services like the Corosync Cluster Engine) that assume the presence of such infrastructure in the underlying layers. Carrier Grade Profile also draws upon the meta-selinux layer, leveraging the work done by the OpenEmbedded community to integrate SELinux features into the Yocto base. Carrier Grade Profile also extends meta-selinux upward in order to fully provide the features required by the Security Requirements Definition of the CGL specification. 6 Product Note

7 CONTACT SUPPORT North America, South America, and Asia/Pacific Toll-free: (800-USA-4WRS) Tel.: Fax: Hours: 6:00 a.m. 5:00 p.m. (Pacific time) Japan Tel.: Fax: Hours: 9:00 a.m.to 5:30 p.m. (local time) Europe, Middle East, Africa support-ec@windriver.com Toll-free: France tel.: France fax: Germany tel.: Germany fax: Italy tel.: Italy fax: Middle East region tel.: Middle East region fax: Nordic tel.: Nordic fax: UK tel.: UK fax: Hours: 9:00 a.m.to 6:00 p.m. (local time) WIND RIVER PROFESSIONAL SERVICES Wind River has the proven expertise to customize Carrier Grade Profile for Wind River Linux platforms to your unique device requirements and maintain the stack for the long term. Our embedded Linux experts can help you plan, build, and manage even the most advanced andmission-critical Yocto Project Compatible software. Take your product to the next level with these solutions: Embedded Linux architecture and design Yocto Project Compatible BSP factory BSP creation, compatibility submission, and maintenance Support for ARM, x86, Power, MIPS Yocto Project Compatible and carrier grade middleware and kernel development Networking, security, medical Real-time, graphics Migration from roll-your-own or hardware vendor provided Linux to Carrier Grade Profile for Wind River Linux Acceleration of embedded multi-core Linux designs using open source and Wind River Hypervisor based virtualization Benchmark, functional, and performance testing and documentation IP compliance and results documentation and analysis based on the Linux Foundation s Software Package Data Exchange (SPDX) specification Long-term support and maintenance of your Yocto Project Compatible custom software Wind River Professional Services can help you meet your robustness, functionality, and security requirements to rapidly and cost-efficiently deliver your next-generation embedded Carrier Grade Linux device. Wind River is a global leader in delivering software for the Internet of Things. The company s technology is found in more than 2 billion devices, backed by world-class professional services and customer support. Wind River delivers the software and expertise that enable the innovation and deployment of safe, secure, and reliable intelligent systems Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems,Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev. 06/2017

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

10 Steps to Virtualization

10 Steps to Virtualization AN INTEL COMPANY 10 Steps to Virtualization WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Virtualization the creation of multiple virtual machines (VMs) on a single piece of hardware, where

More information

TITANIUM CLOUD VIRTUALIZATION PLATFORM

TITANIUM CLOUD VIRTUALIZATION PLATFORM TITANIUM CLOUD VIRTUALIZATION PLATFORM Glenn Seiler Software Defined Infrastructure BU 30 Minutes 12 Content Slides 2017 WIND RIVER. ALL RIGHTS RESERVED. Wind River Titanium Cloud Titanium Cloud is a cloud

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Red Hat Enterprise Linux 6 Server:

Red Hat Enterprise Linux 6 Server: Tech notes Red Hat Enterprise Linux 6 Server: FEATURES AND BENEFITS Red Hat Enterprise Linux 6 is the best platform to tranform current and future technology innovations into the best value and scale for

More information

Carrier Grade Linux and VxWorks

Carrier Grade Linux and VxWorks Carrier Grade Linux and VxWorks A Complete Solution for Next Generation Telecom Systems based on ATCA and AMC Hardware Vinay Panchdhari Regional FAE Manager - Asia Pacific Wind River Systems Telecom Market

More information

Security: The Key to Affordable Unmanned Aircraft Systems

Security: The Key to Affordable Unmanned Aircraft Systems AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY

More information

Wireless Network Virtualization: Ensuring Carrier Grade Availability

Wireless Network Virtualization: Ensuring Carrier Grade Availability AN INTEL COMPANY Wireless Network Virtualization: Ensuring Carrier Grade Availability WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY The wireless industry s battle to acquire new subscribers

More information

Wind River Lab Diagnostics

Wind River Lab Diagnostics Wind River Lab Diagnostics As the amount of code embedded in devices and systems continues to increase, the challenge of integrating, verifying, and validating it also expands. Engineering teams are routinely

More information

Outline Background Jaluna-1 Presentation Jaluna-2 Presentation Overview Use Cases Architecture Features Copyright Jaluna SA. All rights reserved

Outline Background Jaluna-1 Presentation Jaluna-2 Presentation Overview Use Cases Architecture Features Copyright Jaluna SA. All rights reserved C5 Micro-Kernel: Real-Time Services for Embedded and Linux Systems Copyright 2003- Jaluna SA. All rights reserved. JL/TR-03-31.0.1 1 Outline Background Jaluna-1 Presentation Jaluna-2 Presentation Overview

More information

COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications

COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications COMPUTING Data Sheet Centellis VP provides the hardware and software platform to deploy carrier grade virtualized applications. Application virtualization software framework based on industry standard

More information

Requirements for Virtualization in Next-Generation Industrial Control Systems

Requirements for Virtualization in Next-Generation Industrial Control Systems Requirements for Virtualization in Next-Generation Industrial Systems Wind River Titanium Delivers Industrial Grade Performance, Security, and High Availability for Critical Infrastructure WHEN IT MATTERS,

More information

Real-Time Systems and Intel take industrial embedded systems to the next level

Real-Time Systems and Intel take industrial embedded systems to the next level Solution brief Industrial IoT (IIoT) Embedded Software and Systems Real-Time Systems and Intel take industrial embedded systems to the next level Innovative hypervisor and partitioning software increases

More information

Red Hat enterprise virtualization 3.0

Red Hat enterprise virtualization 3.0 Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

WIND RIVER DIAB COMPILER

WIND RIVER DIAB COMPILER AN INTEL COMPANY WIND RIVER DIAB COMPILER Boost application performance, reduce memory footprint, and produce high-quality, standards-compliant object code for embedded systems with Wind River Diab Compiler.

More information

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network

More information

INFOBrief. Red Hat Enterprise Linux 3. Key Points

INFOBrief. Red Hat Enterprise Linux 3. Key Points INFOBrief Red Hat Enterprise Linux 3 Key Points Red Hat Enterprise Linux 3 is the second release of Red Hat s Enterprise Linux product line. Red Hat Enterprise Linux 3 (RHEL) is available in three variants,

More information

Red Hat enterprise virtualization 3.1 feature comparison

Red Hat enterprise virtualization 3.1 feature comparison Red Hat enterprise virtualization 3.1 feature comparison at a glance Red Hat Enterprise Virtualization 3.1 is first fully open source, enterprise ready virtualization platform Compare functionality of

More information

WIND RIVER NETWORKING SOLUTIONS

WIND RIVER NETWORKING SOLUTIONS WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are

More information

Using a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager

Using a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager Using a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager cory.bialowas@windriver.com Trends, Disruptions and Opportunity Wasn t life simple? Single-OS: SMP OS OS CPU Single Core Virtualization

More information

Juniper Networks M-series and J-series Routers. M10i. Solution Brochure J4350. Internet. Regional Office/ Medium Central Site. Branch Office J2320

Juniper Networks M-series and J-series Routers. M10i. Solution Brochure J4350. Internet. Regional Office/ Medium Central Site. Branch Office J2320 Branch Office Solution Brochure Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today s High-Performance Businesses Juniper

More information

2 to 4 Intel Xeon Processor E v3 Family CPUs. Up to 12 SFF Disk Drives for Appliance Model. Up to 6 TB of Main Memory (with GB LRDIMMs)

2 to 4 Intel Xeon Processor E v3 Family CPUs. Up to 12 SFF Disk Drives for Appliance Model. Up to 6 TB of Main Memory (with GB LRDIMMs) Based on Cisco UCS C460 M4 Rack Servers Solution Brief May 2015 With Intelligent Intel Xeon Processors Highlights Integrate with Your Existing Data Center Our SAP HANA appliances help you get up and running

More information

RTOS, Linux & Virtualization Wind River Systems, Inc.

RTOS, Linux & Virtualization Wind River Systems, Inc. taeyong.kim@windriver.com RTOS, Linux & Virtualization 2008 Wind River Systems, Inc. Simple Board Simple Code 2 2008 Wind River Systems, Inc. start: /* disable interrupts in CPU and switch to SVC32 mode

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

Virtual Private Networks (VPN)

Virtual Private Networks (VPN) CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1

More information

SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD

SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'

More information

Enterprise Linux vs. Embedded Linux

Enterprise Linux vs. Embedded Linux AN INTEL COMPANY Enterprise Linux vs. Embedded Linux WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY The use of open source operating systems has garnered more attention in recent years for a

More information

Oracle Linux 5 & 6 Advanced Administration

Oracle Linux 5 & 6 Advanced Administration Oracle University Contact Us: +27 (0)11 319-4111 Oracle Linux 5 & 6 Advanced Administration Duration: 5 Days What you will learn This Oracle Linux Advanced Administration training is ideal for experienced

More information

Introduction to Service Availability Forum

Introduction to Service Availability Forum Introduction to Service Availability Forum Sasu Tarkoma (sasu.tarkoma@cs.helsinki.fi) Seminar on High Availability and Timeliness in Linux University of Helsinki, Department of Computer Science Spring

More information

Hypervisors and Server Flash Satyam Vaghani

Hypervisors and Server Flash Satyam Vaghani Hypervisors and Server Flash Satyam Vaghani Agenda r Case for server flash in SDDC r Technology implications of marrying hypervisors with server flash r Empirical data r Conclusion and open issues 2 Reference

More information

AVOIDING THE 2020 WINDOWS 10 ATM HARDWARE UPGRADE CYCLE A PROOF OF CONCEPT

AVOIDING THE 2020 WINDOWS 10 ATM HARDWARE UPGRADE CYCLE A PROOF OF CONCEPT AVOIDING THE 2020 WINDOWS 10 ATM HARDWARE UPGRADE CYCLE A PROOF OF CONCEPT Rick Anderson Director, Professional Services, Wind River rick.anderson@windriver.com INTRODUCTION For an insider in the automated

More information

Delivering a cost-effective and highly manageable solution without compromising performance, scalability, or security

Delivering a cost-effective and highly manageable solution without compromising performance, scalability, or security The Red Hat Enterprise Virtualization Platform: Extending the Reach of Virtualization Delivering a cost-effective and highly manageable solution without compromising performance, scalability, or security

More information

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

WIND RIVER INTELLIGENT DEVICE PLATFORM XT AN INTEL COMPANY WIND RIVER INTELLIGENT DEVICE PLATFORM XT By 2020, more than 200 billion devices will be connected to the cloud and to each other in what is commonly called the Internet of Things (IoT).

More information

Three Steps Toward Zero Downtime. Guide. Solution Guide Server.

Three Steps Toward Zero Downtime. Guide. Solution Guide Server. Three Steps Toward Zero Downtime Guide Solution Guide Server Server Solution Guide Three Steps Toward Zero Downtime Introduction Service uptime is a top priority for many business operations. From global

More information

Java Embedded on ARM

Java Embedded on ARM Java Embedded on ARM The Embedded Market Evolving Rapidly Internet of Things 2.3B Internet Users Cloud for Embedded Devices Med-Large Embedded Multi-function Devices Enterprise Data and Applications Up

More information

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Wendy Chen, Roger Lopez, and Josh Raw Dell Product Group February 2013 This document is for informational purposes only and may

More information

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements

More information

WIND RIVER VXWORKS CERT PLATFORM

WIND RIVER VXWORKS CERT PLATFORM Wind River VxWorks Cert Platform provides safety-critical systems developers access to Wind River s commercial off-the-shelf (COTS) platform for delivering applications that must be certified to the stringent

More information

Coordinated Threat Control

Coordinated Threat Control Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Messaging Overview. Introduction. Gen-Z Messaging

Messaging Overview. Introduction. Gen-Z Messaging Page 1 of 6 Messaging Overview Introduction Gen-Z is a new data access technology that not only enhances memory and data storage solutions, but also provides a framework for both optimized and traditional

More information

POWERED BY OPENSTACK. Powered by OpenStack. Globo.Tech GloboTech Communications

POWERED BY OPENSTACK. Powered by OpenStack. Globo.Tech GloboTech Communications PRIVATE PRIVATE CLOUD CLOUD POWERED BY OPENSTACK Powered by OpenStack Globo.Tech GloboTech Communications sales@globo.tech TABLE OF CONTENT 2 EXECUTIVE SUMMARY...3 OPENSTACK... 4 INFRASTRUCTURE... 8 GLOBOTECH...

More information

Netronome NFP: Theory of Operation

Netronome NFP: Theory of Operation WHITE PAPER Netronome NFP: Theory of Operation TO ACHIEVE PERFORMANCE GOALS, A MULTI-CORE PROCESSOR NEEDS AN EFFICIENT DATA MOVEMENT ARCHITECTURE. CONTENTS 1. INTRODUCTION...1 2. ARCHITECTURE OVERVIEW...2

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Merging Enterprise Applications with Docker* Container Technology

Merging Enterprise Applications with Docker* Container Technology Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions

More information

Red Hat OpenStack Platform 10 Product Guide

Red Hat OpenStack Platform 10 Product Guide Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team rhos-docs@redhat.com

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

VNF Benchmarking. Customer Profile. The Move to Virtualization. The Challenges. Case Study

VNF Benchmarking. Customer Profile. The Move to Virtualization. The Challenges. Case Study Case Study VNF Benchmarking Customer Profile Customer: Large Network Equipment Manufacturer Industry: Networking Equipment Employees: 180,000 (2016) The Challenges How to test the performance of VNFs?

More information

Understanding Layer 2 Encryption

Understanding Layer 2 Encryption Understanding Layer 2 Encryption TECHNICAL WHITEPAPER Benefits of Layer 2 Encryption Lowest cost of ownership Better bandwith efficiency (up to 50%) Minimal ongoing maintenance routing updates transparent

More information

Internet security and privacy

Internet security and privacy Internet security and privacy IPsec 1 Layer 3 App. TCP/UDP IP L2 L1 2 Operating system layers App. TCP/UDP IP L2 L1 User process Kernel process Interface specific Socket API Device driver 3 IPsec Create

More information

BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS

BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS Alex Wilson Director, Market Development 2017 WIND RIVER. ALL RIGHTS RESERVED. For over 30 years, Wind River has helped the world's technology

More information

Feature Comparison Summary

Feature Comparison Summary Feature Comparison Summary,, and The cloud-ready operating system is the cloud-ready operating system that delivers new layers of security and Azure-inspired innovation for the applications and infrastructure

More information

military demands, this transition to NCW has created new uses for existing

military demands, this transition to NCW has created new uses for existing Solution Brief Carrier Grade Linux for Military and Aerospace MontaVista CGE 7 delivers reliable, secure, and serviceable Linux to interconnected embedded devices and high performance networks. In the

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO

TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TECHNICAL WHITE PAPER FIDO APPROACHES: NOK NOK LABS S3 SUITE VS BUILD YOUR OWN FIDO TABLE OF CONTENTS Executive Summary... 3 FIDO Solution Requirements... 3 FIDO UAF Client infrastructure... 4 FIDO UAF

More information

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and

More information

Quick Guide to Red Hat

Quick Guide to Red Hat Quick Guide to Red Hat Technical Support for customer IT decision makers Linux and related open source technologies provide companies with more capability and higher performance for substantially less

More information

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing

More information

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.

More information

TCC, so your business continues

TCC, so your business continues TCC, so your business continues 1 Whitepaper Executive summary The TCC (Tuxis Cloud Concept) is a smart way to build hosting infrastructures for your private cloud and virtual datacenter. It natively integrates

More information

Juniper Care Plus Advanced Services Credits

Juniper Care Plus Advanced Services Credits Juniper Care Plus Advanced Services Credits Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments

More information

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE. JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE. EXECUTIVE SUMMARY There s little question that advances in therapeutic technologies have

More information

NETSMART Network Management Solutions

NETSMART Network Management Solutions shaping tomorrow with you NETSMART NETSMART management solutions simplify maintenance, provisioning and surveillance. 1 NETSMART Unify Your Network As new and legacy services coexist to support a widening

More information

IP VPn COMMITTED TO QUALITY

IP VPn COMMITTED TO QUALITY IP VPn COMMITTED TO QUALITY Intraselect THE RIGHT SERVICE FOR ALL AND ANY REQUIREMENTS CONNECTIVITY TAILORED TO YOUR BUSINESS Businesses face an array of connectivity challenges. They need high bandwidth

More information

What's New in SUSE LINUX Enterprise Server 9

What's New in SUSE LINUX Enterprise Server 9 What's New in SUSE LINUX Enterprise Server 9 www.novell.com July 29, 2004 2 TABLE OF CONTENTS Table of Contents...2 Executive Summary...3 New Kernel...3 New Scalability and Availability s...5 New Systems

More information

Launching StarlingX. The Journey to Drive Compute to the Edge Pilot Project Supported by the OpenStack

Launching StarlingX. The Journey to Drive Compute to the Edge Pilot Project Supported by the OpenStack Launching StarlingX The Journey to Drive Compute to the Edge Pilot Project Supported by the OpenStack Foundation Ian Jolliffe, WIND RIVER SYSTEMS Director Engineering @ian_jolliffe Project Overview An

More information

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell/EMC storage solutions, based on the Microsoft SQL Server

More information

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications

Applying Multi-core and Virtualization to Industrial and Safety-Related Applications White Paper Wind River Hypervisor and Operating Systems Intel Processors for Embedded Computing Applying Multi-core and Virtualization to Industrial and Safety-Related Applications Multi-core and virtualization

More information

The Service Availability Forum Platform Interface

The Service Availability Forum Platform Interface The Service Availability Forum Platform Interface The Service Availability Forum develops standards to enable the delivery of continuously available carrier-grade systems with offthe-shelf hardware platforms

More information

ITTIA DB SQL Em bedded Dat abase and VxWorks

ITTIA DB SQL Em bedded Dat abase and VxWorks ITTIA DB SQL Em bedded Dat abase and VxWorks Copyright 2017 ITTIA L.L.C. An ITTIA White Paper, August 2017 ITTIA DB SQL TM is a small-footprint, high-performance relational database engine for embedded

More information

Microsoft SQL Server on Stratus ftserver Systems

Microsoft SQL Server on Stratus ftserver Systems W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from

More information

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE. INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building

More information

Red Hat Enterprise Linux

Red Hat Enterprise Linux Red Hat Enterprise Linux Security www.redhat.com A Powerful Collection of Red Hat Enterprise Linux Security Tools Computing security has never been more important. Increasing regulations, differing requirements

More information

ARM TrustZone for ARMv8-M for software engineers

ARM TrustZone for ARMv8-M for software engineers ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,

More information

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing

More information

Securing LTE Backhaul with IPsec

Securing LTE Backhaul with IPsec WHITE PAPER Securing LTE Backhaul with IPsec Marko Kulmala Staff Product Manager Mobile Routing Introduction The mobile network has grown and changed radically from its origins in the early 1980s as an

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

Design Better. Reduce Risks. Ease Upgrades. Protect Your Software Investment

Design Better. Reduce Risks. Ease Upgrades. Protect Your Software Investment Protect Your Software Investment Design Better. Reduce Risks. Ease Upgrades. Protect Your Software Investment The Difficulty with Embedded Software Development Developing embedded software is complicated.

More information

Microsoft Office SharePoint Server 2007

Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

Network Security: IPsec. Tuomas Aura

Network Security: IPsec. Tuomas Aura Network Security: IPsec Tuomas Aura 3 IPsec architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects IP packets between two hosts or gateways Transparent to

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

OPTera Metro 8000 Services Switch

OPTera Metro 8000 Services Switch Product/Service Bulletin Nortel Networks Services Switch Service providers looking for ways to scale Ethernet-based services and maximize their profitability need look no further than the Nortel Networks

More information

ENTERPRISE CONNECTIVITY

ENTERPRISE CONNECTIVITY ENTERPRISE CONNECTIVITY Elevating Enterprise Private Networks with Cost-effective Satellite Services The success of today s organizations and enterprises highly depends on reliable and secure connectivity.

More information

SUSE OpenStack Cloud Production Deployment Architecture. Guide. Solution Guide Cloud Computing.

SUSE OpenStack Cloud Production Deployment Architecture. Guide. Solution Guide Cloud Computing. SUSE OpenStack Cloud Production Deployment Architecture Guide Solution Guide Cloud Computing Table of Contents page Introduction... 2 High Availability Configuration...6 Network Topography...8 Services

More information

An Oracle White Paper September Oracle Integrated Stack Complete, Trusted Enterprise Solutions

An Oracle White Paper September Oracle Integrated Stack Complete, Trusted Enterprise Solutions An Oracle White Paper September 2010 Oracle Integrated Stack Complete, Trusted Enterprise Solutions Executive Summary... 1 Oracle s Complete Hardware and Software Stack... 2 The Production Life Cycle...

More information

What s New in VMware vsphere 5.1 Platform

What s New in VMware vsphere 5.1 Platform vsphere 5.1 Platform VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 2.0 / UPDATED JUNE 2012 Table of Contents Introduction.................................................................. 3 vsphere

More information

BUILDING A NEXT-GENERATION FIREWALL

BUILDING A NEXT-GENERATION FIREWALL How to Add Network Intelligence, Security, and Speed While Getting to Market Faster INNOVATORS START HERE. EXECUTIVE SUMMARY Your clients are on the front line of cyberspace and they need your help. Faced

More information

A Next Generation Hypervisor for the Embedded Market. Whitepaper

A Next Generation Hypervisor for the Embedded Market. Whitepaper A Next Generation Hypervisor for the Embedded Market Whitepaper 1 Table of Contents Background: Current Generation of Hypervisors... 3 Limitations of Current Generation Hypervisors... 4 Next Generation

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

Extremely Fast Distributed Storage for Cloud Service Providers

Extremely Fast Distributed Storage for Cloud Service Providers Solution brief Intel Storage Builders StorPool Storage Intel SSD DC S3510 Series Intel Xeon Processor E3 and E5 Families Intel Ethernet Converged Network Adapter X710 Family Extremely Fast Distributed

More information

Corente Cloud Services Exchange

Corente Cloud Services Exchange Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Next Generation Enterprise Solutions from ARM

Next Generation Enterprise Solutions from ARM Next Generation Enterprise Solutions from ARM Ian Forsyth Director Product Marketing Enterprise and Infrastructure Applications Processor Product Line Ian.forsyth@arm.com 1 Enterprise Trends IT is the

More information

SilverCreek SNMP Test Suite

SilverCreek SNMP Test Suite SilverCreek SNMP Test Suite What's Inside: Executive Overview... 2 SilverCreek SNMP Tests... 2 Test Coverage:... 2 A Rich Toolset... 3 MIB Tools... 3 Traps, Alerts, Informs... 3 Utilities... 3 Diagnostic

More information

Juniper Networks M Series and J Series Routers

Juniper Networks M Series and J Series Routers PRODUCT CATEGORY BROCHURE Juniper Networks M Series and J Series Routers Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today

More information

OpenNebula on VMware: Cloud Reference Architecture

OpenNebula on VMware: Cloud Reference Architecture OpenNebula on VMware: Cloud Reference Architecture Version 1.2, October 2016 Abstract The OpenNebula Cloud Reference Architecture is a blueprint to guide IT architects, consultants, administrators and

More information

2011 Global Price Performance Value Leader in Gigabit Ethernet Testing Red Herring Global Top 100

2011 Global Price Performance Value Leader in Gigabit Ethernet Testing Red Herring Global Top 100 Xena Networks 2011 Global Price Performance Value Leader in Gigabit Ethernet Testing Red Herring Global Top 100 Corporate Profile Founded 2007 by group of communications professionals Corporate HQ in Copenhagen

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Application Note for Open Text Fax Server (RightFax v9.4) and 3COM VCX platform

Application Note for Open Text Fax Server (RightFax v9.4) and 3COM VCX platform Page 1 of 26 Application Note for Open Text Fax Server (RightFax v9.4) and 3COM VCX platform Issue: 1.0 Date: January 28, 2009 Authors: Abstract: Michael Hamlin (Open Text) and Ciaran O Shaughnessy (3Com)

More information