SLIDE 1 - COPYRIGHT 2015 ELEPHANT FLOWS IN THE ROOM: SCIENCEDMZ NATIONALLY DISTRIBUTED

Similar documents
Achieving the Science DMZ

The Science DMZ Design Pattern

Engagement With Scientific Facilities

Enhancing Infrastructure: Success Stories

A Brief Overview of the Science DMZ

Research Cyberinfrastructure Upgrade Proposal - CITI

Improving Network Infrastructure to Enable Large Scale Scientific Data Flows and Collaboration (Award # ) Klara Jelinkova Joseph Ghobrial

Programmable Information Highway (with no Traffic Jams)

Cisco ISR G2 Management Overview

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

SD-WAN Solution How to Make the Best Choice for Your Business

High Throughput WAN Data Transfer with Hadoop-based Storage

E-Seminar. Storage Networking. Internet Technology Solution Seminar

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

FUJITSU Software Interstage Information Integrator V11

HIDDEN SLIDE Summary These slides are meant to be used as is to give an upper level view of perfsonar for an audience that is not familiar with the

Design a Remote-Office or Branch-Office Data Center with Cisco UCS Mini

The UniNet Express Lane Services

A High-Performance Storage and Ultra- High-Speed File Transfer Solution for Collaborative Life Sciences Research

Features. HDX WAN optimization. QoS

How Cisco ASR 1000 Enables Cisco Business Strategies by Providing Capacity and Resiliency for Collaborative Applications

Design a Remote-Office or Branch-Office Data Center with Cisco UCS Mini

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

Network Visibility and Segmentation

Meraki MX Family. Overview

WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility

Microsoft Office SharePoint Server 2007

Seven Criteria for a Sound Investment in WAN Optimization

Northern New Mexico College - Campus Cyberinfrastructure Plan 1. Introduction

2017 Resource Allocations Competition Results

Production Petascale Climate Data Replication at NCI Lustre and our engagement with the Earth Systems Grid Federation (ESGF)

Enabling a SuperFacility with Software Defined Networking

CCNP Switch Questions/Answers Cisco Enterprise Campus Architecture

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

Globus Research Data Management: Campus Deployment and Configuration. Steve Tuecke Vas Vasiliadis

International Big Science Coming to Your Campus Soon (Sooner Than You Think )

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

SD-WAN. Bringing Scale, Agility and Robustness to Enterprise Networks

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

OpenFlow: What s it Good for?

How Smart Networks are changing the Corporate WAN

Deployments and Network Topologies

Observer GigaStor. Post-event analysis and network security forensics

WLCG Network Throughput WG

SAS workload performance improvements with IBM XIV Storage System Gen3

vsan Remote Office Deployment January 09, 2018

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

Transform your network and your customer experience. Introducing SD-WAN Concierge

VMware vsphere Clusters in Security Zones

Making Enterprise Branches Agile and Efficient with Software-defined WAN (SD-WAN)

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.

Virtual Security Server

Observer Probe Family

Native vsphere Storage for Remote and Branch Offices

Zhengyang Liu! Oct 25, Supported by NSF Grant OCI

We re ready. Are you?

vsan Security Zone Deployment First Published On: Last Updated On:

perfsonar Deployment on ESnet

EqualLogic Storage and Non-Stacking Switches. Sizing and Configuration

BlueGene/L. Computer Science, University of Warwick. Source: IBM

Lessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO

SEVONE END USER EXPERIENCE

Introduction to perfsonar. RIPE SEE5, Tirana, Albania Szymon Trocha Poznań Supercomputing and Networking Center, Poland April 2016

RESEARCH DATA DEPOT AT PURDUE UNIVERSITY

IBM System Storage DCS3700

Tieto s itap Offering

SIMPLE, FLEXIBLE CONNECTIONS FOR TODAY S BUSINESS. Ethernet Services from Verizon

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Meraki MX Family Cloud Managed Security Appliances

perfsonar Going Forward Eric Boyd, Internet2 Internet2 Technology Exchange September 27 th 2016

Mellanox InfiniBand Solutions Accelerate Oracle s Data Center and Cloud Solutions

Meraki MX Family Cloud Managed Security Appliances

Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..

MyCloud Computing Business computing in the cloud, ready to go in minutes

Xyratex ClusterStor6000 & OneStor

Network and Host Design to Facilitate High Performance Data Transfer

WAN Application Infrastructure Fueling Storage Networks

Optimize and Accelerate Your Mission- Critical Applications across the WAN

SaaS Providers. ThousandEyes for. Summary

Developing Networking and Human Expertise in Support of International Science

Virtualizing Agilent OpenLAB CDS EZChrom Edition with VMware

CNIT 50: Network Security Monitoring. 2. Collecting Network Traffic: Access, Storage, and Management

How Cisco IT Deployed Cisco Firewall Services Modules at Scientific Atlanta

Data Protection with Riverbed

LMEnet. Market Participant Connectivity Guide. Please respond to: Technical Account Management LME.COM

Symantec Data Center Transformation

Unified Communications from West

Microsoft Exchange Server 2010 workload optimization on the new IBM PureFlex System

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

SentryWire Next generation packet capture and network security.

SDN, SD-WAN, NFV, VNF I m confused!

SentryWire Next generation packet capture and network security.

Secure Extensible Network. Solution and Technology Introduction

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Seamless Cloud Connectivity. for your business

Event-Based Software-Defined Networking: Build a Secure Science DMZ

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transcription:

SLIDE 1 - COPYRIGHT 2015 ELEPHANT FLOWS IN THE ROOM: SCIENCEDMZ NATIONALLY DISTRIBUTED

SLIDE 2 - COPYRIGHT 2015 Do you know what your campus network is actually capable of? (i.e. have you addressed your elephant )

SLIDE 3 - COPYRIGHT 2015 Why? The network has been purpose built for research!! Elephant Flows

SLIDE 4 - COPYRIGHT 2015 Our Aim To increase the expectations of researchers from every institution to move large volumes of data.

Transfer Time: One Terabyte SLIDE 5 - COPYRIGHT 2015 1Gb Institutions 10Gb Institutions AARNet4 One Terabyte on 10Gb actual transfer time = 20 min 2-3 hrs

Transfer Time: One Petabyte SLIDE 6 - COPYRIGHT 2015 1Gb Institutions 10Gb Institutions AARNet4

Transfer Time SLIDE 7 - COPYRIGHT 2015 1 TB 10TB 100TB 1PB 100 Mbps 1 day 10 days 3 months 3.4 years 1 Gbps 2.5 hours 1 day 10 days 3 months Institutions 10 Gbps 13 min 2.5 hours 1 day 10 days AARNet4 100 Gbps < 2 min 13 min 2.5 hours 1 day

What s the problem? SLIDE 8 - COPYRIGHT 2015 Security policies designed for enterprise, not science Poor choice of transfer tools Poor visibility of network, both national and international Ingrained workflows / behaviours Shortage of skills Poor visibility on user practice (i.e. who knows what they re doing! ) No support A big clue: Use of Sneakernet

SLIDE 9 - COPYRIGHT 2015 Moral: There s more to large data transfer than the size of your pipe.

SLIDE 10 - COPYRIGHT 2015 SO, what exactly is this Science DMZ and how will it help?

Overview The Science DMZ is a portion of the network, built at or near the campus or laboratory's local network perimeter that is designed such that the equipment, configuration, and security policies are optimised for high-performance scientific applications rather than for general-purpose business systems or enterprise computing. Carbon nanotubes being spun to form a yarn, CSIRO, source: https://en.wikipedia.org/wiki/carbon_

Overview SLIDE 12 - COPYRIGHT 2015 A Science DMZ integrates four key concepts into a unified whole that together serve as a foundation for this model Architecture Manage science network independently Security Tailored for few large science flows Monitoring Characterise and set network performance Data Transfer Dedicated tuned systems and tools

Overview SLIDE 13 - COPYRIGHT 2015 Architecture Manage science network independently Separates Data Intensive resources from the main campus network Allows more appropriate security methods to be applied for large flows Accommodates a range of scalable connectivity options, including redundancy, VPNs and additional wavelengths

Overview SLIDE 14 - COPYRIGHT 2015 Security Tailored for few large science flows Typical firewalls support many small flows rather than few large ones the small buffers lead to significant packet loss, and subsequently very poor performance As most large transfers are between few resources, use Router ACLs instead of very expensive large buffer firewalls Separating elephant flow security from campus security is a relatively inexpensive win-win for both science and campus

SLIDE 15 - COPYRIGHT 2015 Overview Monitoring Characterise and set network performance perfsonar Nodes: Allows proactive monitoring of critical science pathways Set expectations for end to end network performance Uses a dedicated mesh of tools spread across the national research network, with a dashboard for overall visibility Creates a ready deployed fault-finding mesh to assist rapid targeting for network errors

SLIDE 16 - COPYRIGHT 2015 Overview Data Transfer Dedicated tuned systems and tools Data Transfer Nodes or simply DTNs : Have access to local storage via either direct high-speed disk, a SAN or mounted high performance parallel filesystem (e.g. Lustre or GPFS) Have tuned high speed network interfaces, matched to the wan bandwidth. Have a collection of proven transfer tools which can sustain high data transfer rates over long latencies, e.g Aspera, Globus Do no general purpose computing tasks to mitigate security risks

Example: Current Connection SLIDE 17 - COPYRIGHT 2015

Example: Dependent Simple Connection SLIDE 18 - COPYRIGHT 2015 Security Architecture Monitoring Data Transfer

Simple SDN Connection SLIDE 19 - COPYRIGHT 2015

Redundant Standard Connection SLIDE 20 - COPYRIGHT 20152 0

Redundant Standard 40G Connection SLIDE 21 - COPYRIGHT 20152 1

Redundant Big Data Connection SLIDE 22 - COPYRIGHT 20152 2

Redundant Complex Connection SLIDE 23 - COPYRIGHT 20152 3

On Campus Services Connection SLIDE 24 - COPYRIGHT 20152 4

Has Science DMZ made a difference? SLIDE 25 - COPYRIGHT 2015

SLIDE 26 - COPYRIGHT 2015 Demonstrated result Internationally ESNet approach to answering the Big Data Flow problem has refined the architecture, see fasterdata.es.net In Australia Demonstrated significant performance improvement to line rate utilisation through robust deployment of DaShNet (RDSI) and national infrastructure Bottlenecks now *not* at Science DMZ capable end points, but often the other end or further up the stack. Sender and Receiver capabilities are both critical.

SLIDE 27 - COPYRIGHT 2015 Benchmarking Deployments Monitoring Data Transfer Node 2 x AARNet4 ScienceDMZ benchmarking deployments, capable of performing data transfer tests at 10Gbps

SLIDE 28 - COPYRIGHT 2015 On Campus Testing Gear 1G Monitoring (Liva) Portable 10G Data Transfer Node Portable testing gear you can deploy at various locations across the campus to test against the benchmarking gear.

SLIDE 29 - COPYRIGHT 2015 Is Science DMZ good for my university? (Hint: the answer is going to have a yes in it somewhere )

Do you qualify? SLIDE 30 - COPYRIGHT 2015 Answer YES! to any of these? ü Using or delivering national research infrastructure ü Data intensive research disciplines (established and emerging) ü General awareness of power users ü General lack of awareness of data handling techniques ü NetFlow data identifying sleepers ü Specific requests for more network performance ü No real testing done on border capability

The Plan SLIDE 31 - COPYRIGHT 2015 Benchmark Implement Demand

Diligence on Benchmarking SLIDE 32 - COPYRIGHT 2015 In a coordinated manner with us: Test from border / faculty against Benchmarking capability Deploy test perfsonar nodes on known transfers routes Conduct user machine / instrument throughput tests from deep within campus architecture Benchmark Demand Implement How fast can you go?

Diligence on Demand SLIDE 33 - COPYRIGHT 2015 In a coordinated manner with us: Capture transfer tools in use Assess NetFlow data Simply ask around research groups for indicative or expected performance Benchmark Demand Implement Where s your data?

Outcomes from first two steps SLIDE 34 - COPYRIGHT 2015 Identifiable and validated outcomes: Quantified performance across borders or known choke points Greater visibility on current and anticipated larger flows in/across/out of campus Greater visibility on discipline specific choice and capability of tools Better and proactive engagement with research. A demonstrated commitment to improve access to data Benchmark Demand Implement

Follow Up Implementation SLIDE 35 - COPYRIGHT 2015 Identify Science DMZ architecture and/or components to address issues discovered then as needed: YOU build and operate WE build, YOU operate WE build and operate = SDMZaaS Consult further with AARNet Enterprise Services for a broad multi-campus approach Benchmark Demand Implement Result = Demonstrable follow through in support of research

SLIDE 36 - COPYRIGHT 2015 Where to start? Datamovers@aarnet.edu.au

THANKS J SLIDE 37 - COPYRIGHT 2015

SPARES SLIDE 38 - COPYRIGHT 2015

Summary SLIDE 39 - COPYRIGHT 2015 What's a Science DMZ? Developed about six years ago by engineers at Energy Sciences Network (ESnet) and National Energy Research Scientific Computing Center (NERSC) the Science DMZ refers to an operationally-proven network architecture optimized for the transfer of large-scale scientific data. The model includes recommended hardware devices, security policies, and network performance software which together provide the ideal environment for moving science data as efficiently as possible.

Summary SLIDE 40 - COPYRIGHT 2015 In practice, a Science DMZ creates an enclave on a campus network that is specially designed for science data (a vastly different data profile than a campus enterprise applications). A Science DMZ recognizes that all the networked applications a university needs to run whether for science or for business have variable needs. By applying best practices for data management, the Science DMZ ensures the efficiency of science data and regular day-to-day university business applications is not impeded.

Overview SLIDE 41 - COPYRIGHT 2015 The Science DMZ Model addresses several key issues in data intensive science, including: Reducing or eliminating the packet loss that causes poor TCP performance. Implementing appropriate security architectures and controls so that high-performance applications are not hampered by unnecessary constraints. Providing an on-ramp for local science resources to access wide area science services including virtual circuits, software defined networking environments, and 100 Gigabit infrastructures. Incorporating network testing, network measurement, and performance analysis through the deployment of perfsonar.

Overview SLIDE 42 - COPYRIGHT 2015

Which architecture is right for you? SLIDE 43 - COPYRIGHT 2015