Virtual Infrastructure C27_B259, MSCS building, UNE, Armidale ...


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Virtual Infrastructure C27_B259, MSCS building, UNE, Armidale ...

  1. 1. Virtual Infrastructure C27_B259,  MSCS building, UNE, Armidale, NSW, Australia on Friday, 25th May 2007 from 12 to 1pm. by Dr. Charles R. Watson School of Maths, Stats and Computer Science University of New England, Armidale NSW 2351 URL:
  2. 2. Overview <ul><li>Digital Communications Technology </li></ul><ul><li>Voice over IP </li></ul><ul><li>Integrity and Availability </li></ul><ul><li>Security </li></ul><ul><li>Discussion: cost-neutral improvement of our virtual infrastructure </li></ul>
  3. 3. Transmission Media
  4. 4. Wireless LAN Architecture
  5. 5. Ethernet: CSMA/CD Carrier Sense Multiple Access with Collision Detection
  6. 6. Protocol Analyzers Traffic displayed by protocol type
  7. 7. Wide Area Network
  8. 8. Gateways
  9. 9. Client/Server Communication
  10. 10. Satellite Internet Access
  11. 11. Satellite Internet Access (continued) Dial return satellite Internet service
  12. 12. WAN Technologies Compared
  13. 13. WAN Technologies Compared (continued)
  14. 14. Voice-over-IP <ul><li>Cisco AS5300 is the core AARNet Gateway. </li></ul><ul><li>Voice card for Cisco 3660 </li></ul><ul><li>Skype is a peer-to-peer Internet telephony network founded by the Niklas Zennström . </li></ul><ul><ul><li>It competes against existing open VoIP protocols such as SIP , IAX , and H.323 . </li></ul></ul><ul><ul><li>Rapid growth in free and paid services . </li></ul></ul><ul><ul><li>Features include </li></ul></ul><ul><ul><ul><li>free voice and video conferencing, </li></ul></ul></ul><ul><ul><ul><li>its ability to use peer to peer (decentralized) technology to overcome common firewall and NAT ( Network address translation ) problems </li></ul></ul></ul>
  15. 15. VoIP (continued) Accessing a VoIP network from traditional telephones
  16. 16. VoIP (continued) Accessing a VoIP network from IP phones
  17. 17. Internet Group Management Protocol <ul><li>Network layer protocol that manages multicasting allowing one node to send data to defined group of nodes </li></ul><ul><li>Routers use IGMP to determine which nodes belong to multicast group and to transmit data to all nodes in that group </li></ul><ul><li>IGMP can be used for online video and gaming, and allows more efficient use of resources </li></ul><ul><li>UDP - User (Unreliable) Datagram Protocol is faster and more efficient than TCP for lightweight or time-sensitive purposes, e.g. IPTV, audio-visual streaming media </li></ul>
  18. 18. Real world example <ul><li> </li></ul><ul><li>One hour of video encoded at 300 kbit/s (this is a typical broadband video for 2005 and it's usually encoded in a 320×240 pixels window size) will be: </li></ul><ul><ul><li>(3,600 s · 300 kbit/s) / 8,388.608 = 128.7 MiB of storage </li></ul></ul><ul><li>If the file is stored on a server for on-demand streaming. If this stream is viewed by 1,000 people using a Unicast protocol, you would need </li></ul><ul><li>300 kbit/s · 1,000 = 300,000 kbit/s = 300 Mbit/s of bandwidth </li></ul><ul><li>This is equivalent to 125.73 GiB per hour. Of course, using a Multicast protocol the server sends out only a single stream that is common to all users. Hence, such a stream would only use 300 kbit/s of bandwidth. </li></ul>
  19. 19. Integrity and Availability <ul><li>Integrity refers to the soundness of network files, systems, and connections </li></ul><ul><li>Fault tolerance is a system’s capacity to continue performing despite unexpected hardware or software malfunction </li></ul><ul><li>A UPS is a battery power source that prevents undesired features of the power source from harming the device or interrupting its services </li></ul><ul><li>Backup rotation provides excellent data reliability without overtaxing network or requiring much intervention </li></ul><ul><li>Disaster recovery is the process of restoring critical functionality and data after an enterprise-wide outage </li></ul><ul><li>Critical servers often contain redundant NICs, processors, and/or hard disks to provide better fault tolerance </li></ul><ul><li>Server mirroring involves utilizing a second, identical server to duplicate the transactions and data storage of one server </li></ul><ul><li>Clustering links multiple servers together to act as a single server </li></ul>
  20. 20. Redundant Array of Independent (or Inexpensive) Disks RAID Level 5—disk striping with distributed parity
  21. 21. Fully redundant T1 connectivity Redundancy provides load balancing and fault tolerance .
  22. 22. Security <ul><li>Choosing secure passwords is one of the easiest and least expensive ways to guard against unauthorized access. </li></ul><ul><li>A security policy identifies an organization’s security goals, risks, levels of authority, designated security coordinator and team members, responsibilities for each team member and each employee, and strategies for addressing security breaches. </li></ul><ul><li>A firewall is a specialized device that selectively filters or blocks traffic between networks. </li></ul><ul><li>A proxy service is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. </li></ul>
  23. 23. Physical Security Badge access security system
  24. 24. Authentication A RADIUS server providing centralized authentication
  25. 25. Domains = Organizational Units
  26. 26. Trust Relationships
  27. 27. Trust Relationships (continued) Explicit one-way trust between domains in different trees
  28. 28. Public Key Encryption
  29. 29. Proxy Servers A proxy server used on a WAN
  30. 30. Network Address Translation
  31. 31. Deep packet inspection <ul><li> </li></ul><ul><li>Deep packet inspection ( DPI ) is a form of computer network packet filtering that examines the data part of a through-passing packet , searching for non-protocol compliance or predefined criteria to decide if the packet can pass. This is in contrast to shallow packet inspection (usually called just packet inspection) which just checks the header portion of a packet. </li></ul><ul><li>DPI devices have the ability to look at Layer 2 through Layer 7 of the OSI model . This includes headers and data protocol structures. The DPI will identify and classify the traffic based on a signature database </li></ul><ul><li>A classified packet can be redirected, marked/tagged (see QoS ), blocked, rate limited, and of course, reported to a reporting agent in the network. </li></ul><ul><li>Many DPI devices identify flows rather than a packet by packet analysis. </li></ul><ul><li>DPI allows phone and cable companies to &quot;readily know the packets of information you are receiving online--from e-mail, to websites, to sharing of music, video and software downloads&quot; [1] . </li></ul><ul><li>DPI is also increasingly being used in security devices to analyze flows, compare them against policy, and then treat the traffic appropriately (i.e., block, allow, rate limit, tag for priority, mirror to another device for more analysis or reporting). </li></ul>
  32. 32. Project Management
  33. 33. NCRIS <ul><li>National Collaborative Research Infrastructure Strategy (NCRIS) projects </li></ul><ul><li>http:// / </li></ul><ul><ul><li>5.16 Platforms for collaboration </li></ul></ul><ul><ul><li>5.16.1 Data access and discovery, storage and management </li></ul></ul><ul><ul><li>5.16.2 Grid enabled technologies and infrastructure </li></ul></ul><ul><ul><li>5.16.3 Technical expertise </li></ul></ul><ul><ul><li>5.16.4 High performance computing </li></ul></ul><ul><ul><li>5.16.5 High capacity communications networks </li></ul></ul><ul><li>&quot;Platforms for Collaboration&quot; will develop our strengths in other NCRIS categories: </li></ul><ul><li>Evolving Bio-molecular Platforms and Informatics </li></ul><ul><li>Integrated Biological Systems </li></ul><ul><li>Biotechnology Products </li></ul><ul><li>Networked Bio-security Framework </li></ul><ul><li>Structure and Evolution of the Australian Continent </li></ul><ul><li>Terrestrial Ecosystem Research Network </li></ul><ul><li>Population health and clinical data linkage </li></ul>
  34. 34. Discussion <ul><li>Future virtual infrastructure </li></ul><ul><li>Email spam </li></ul><ul><li>voice-over-IP </li></ul><ul><li>multicasting </li></ul><ul><li>firewall configuration </li></ul><ul><li>federated identity management </li></ul><ul><li>intellectual property protection </li></ul><ul><li>cost-neutral deployment </li></ul><ul><li>rapid obsolescence </li></ul>