This design document proposes a modular and scalable infrastructure solution to support critical space operations. The conceptual solution involves deploying infrastructure in standardized datacenter pods that can be transported to locations as needed. Each site would host a datacenter pod containing compute, storage, networking hardware and virtualization software. Redundant communication links between sites would provide continuous contact with the moon base to support the mission to Mars.
This document discusses existing media used to target teenage audiences, including magazines, websites, and social media. It analyzes the We Love Pop and Top of the Pops magazines' websites, noting features like previews of magazine content, videos, competitions, and newsletters. It also briefly examines the magazines' Facebook pages and how they are used to share new issues and updates. The goal is to attract teenage audiences across different media platforms.
The document summarizes feedback received on a documentary. It shows that audiences found the documentary entertaining, informative, and attention-grabbing, which is important for gaining publicity and profit. However, the camera setup during interviews and sound quality could be improved. Viewers suggested areas for improvement like including more interviews while improving sound quality and transitions to create a higher quality, more engaging documentary.
The document discusses the importance of social and cultural awareness for journalists. It notes that journalists often write about groups they may not be familiar with, so it is important they do not create biased representations. The National Union of Journalists has prepared ethical guidelines for journalists covering topics like terrorism, race, disability, and others. Journalists must consider how their writing may influence readers' perceptions of different groups.
The document discusses how horseshoe crabs play a vital role in medical testing. Their blue blood contains cells that can detect and clot around bacterial endotoxins, even those from non-pathogenic bacteria. This reaction was discovered in 1960 and is now used to test all injectable drugs, vaccines, and medical devices for bacterial contamination before use on humans. The process involves collecting horseshoe crabs and extracting 30% of their blood, which rebounds within a week. This testing using horseshoe crab blood has helped ensure public safety by preventing bacterial infections from medical products.
Career Confidence Online & IRL: A Networking WorkshopFindSpark
The document describes a networking workshop presented by Emily Miethner of FindSpark. The workshop provides tips for networking both online and in-person, including openers and closers for conversations, using websites and MOO cards to connect with others, and setting goals for networking like attending events and adding new connections on LinkedIn. It also advertises an upcoming career conference and provides contact information.
This document discusses existing media used to target teenage audiences, including magazines, websites, and social media. It analyzes the We Love Pop and Top of the Pops magazines' websites, noting features like previews of magazine content, videos, competitions, and newsletters. It also briefly examines the magazines' Facebook pages and how they are used to share new issues and updates. The goal is to attract teenage audiences across different media platforms.
The document summarizes feedback received on a documentary. It shows that audiences found the documentary entertaining, informative, and attention-grabbing, which is important for gaining publicity and profit. However, the camera setup during interviews and sound quality could be improved. Viewers suggested areas for improvement like including more interviews while improving sound quality and transitions to create a higher quality, more engaging documentary.
The document discusses the importance of social and cultural awareness for journalists. It notes that journalists often write about groups they may not be familiar with, so it is important they do not create biased representations. The National Union of Journalists has prepared ethical guidelines for journalists covering topics like terrorism, race, disability, and others. Journalists must consider how their writing may influence readers' perceptions of different groups.
The document discusses how horseshoe crabs play a vital role in medical testing. Their blue blood contains cells that can detect and clot around bacterial endotoxins, even those from non-pathogenic bacteria. This reaction was discovered in 1960 and is now used to test all injectable drugs, vaccines, and medical devices for bacterial contamination before use on humans. The process involves collecting horseshoe crabs and extracting 30% of their blood, which rebounds within a week. This testing using horseshoe crab blood has helped ensure public safety by preventing bacterial infections from medical products.
Career Confidence Online & IRL: A Networking WorkshopFindSpark
The document describes a networking workshop presented by Emily Miethner of FindSpark. The workshop provides tips for networking both online and in-person, including openers and closers for conversations, using websites and MOO cards to connect with others, and setting goals for networking like attending events and adding new connections on LinkedIn. It also advertises an upcoming career conference and provides contact information.
Sample 1 writing - charfauros, e. Copyright 2013 Edward F. T. Charfauros. R...Edward F. T. Charfauros
This is one of many of my University of Phoenix writing essay papers for achieving my Bachelor Science of Business Administraion (concentraion in Management) degree~
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The students and teachers at CEIP Carmen Martín Gaite school in Spain have been working on an active citizenship campaign to improve their school playgrounds. Younger students drew pictures and wrote letters to the mayor with their requests, while older students created banners, interviewed others, and wrote official letters to the mayor. The children's work was displayed at the school and their petitions were brought to the town hall to be presented to the mayor. The school hopes the mayor will listen to the students' voices and improve the playgrounds.
The document proposes a secure personal identification system based on human retina recognition. The system uses retinal vascular patterns, which are unique to each individual, for identification. It consists of three stages: 1) preprocessing to extract the vascular pattern from retinal images, 2) feature extraction to identify feature points like endings and bifurcations, and represent them as vectors, and 3) matching input images to templates by calculating distances between feature vectors. Experimental results on two retinal image databases achieved over 97% accuracy, demonstrating the potential of the proposed system for high-security identification.
This document discusses branding elements for an organization including a logo that is eye-catching, clever, relevant, and simple and can be used at different sizes. It also mentions creating merchandise through a collaboration with a surfboard company using handmade wood products, which explores a new area for the organization. Finally, it discusses designing a membership form and poster that are cartoon-style, eye-catching, simple, to the point, and can reflect the negative impacts of pollution.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
This document discusses distributed computing systems. It defines distributed computing as a collection of interconnected processors with local memory and peripherals that communicate via message passing over a network. There are two types of distributed systems - tightly coupled systems with shared memory and loosely coupled systems where processors have separate local memory and communicate by passing messages. Distributed computing became popular due to the difficulties of centralized processing on mainframes and the development of microprocessors and computer networks. The key benefits of distributed computing systems over centralized systems include scalability, redundancy, and independence from specific hardware or software standards.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The document provides steps and guidance for starting one's journey to becoming wealthy. It recommends paying yourself first by saving money (Commandment #1). It advises setting goals that define how much wealth is needed and by what timeframe (I.Goal and I.Horizon). Various investment instruments are described for generating wealth over the long term, such as owning stocks, mutual funds, businesses, and lending investments like bonds. Regular planning, tracking assets and expenses, and overcoming obstacles like inflation and spending habits are also emphasized. The document stresses that learning about fundamentals of investing like risk, return, and liquidity is important. Overall, the key message is that taking proactive steps to save and plan one's investments is essential
This document summarizes ventilation requirements for occupied spaces in buildings. It requires that all occupied spaces be ventilated either through natural means according to Section 402 or mechanical means according to Section 403. Section 403 specifies minimum outdoor air ventilation rates for various occupancies based on estimated maximum occupant loads. It also restricts recirculation of air from certain spaces and allows transfer air to be used as makeup air. Requirements for outdoor air intake and exhaust openings include minimum distances from contaminant sources and protection with screens or louvers.
This season, on Virtual Design Master, we’ve been dealing with the aftermath of a second round of the zombie outbreak. We’ve designed the systems to build spaceships, which are evacuating what’s left of the human race from the earth. We’ve built the infrastructure to support our new civilization on the moon. We’ve also tried to prepare what’s left of the earth in case there is another round of the outbreak, by fortifying islands across the world by deploying infrastructure remotely.
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
This document describes CloudAnalyst, a tool for simulating large-scale cloud computing environments. CloudAnalyst is built on CloudSim, a framework for modeling and simulating cloud infrastructures. The tool aims to provide an easy to use graphical interface for configuring and running simulations of internet applications deployed in cloud environments. It measures key metrics like response time and data center usage. The document outlines CloudAnalyst's design, which leverages CloudSim while introducing extensions. It also provides instructions for using the tool and demonstrates simulating a social networking application across multiple data centers under different configurations.
This thesis examines machine learning approaches using Hadoop in the cloud. It implements a distributed machine learning infrastructure in the cloud without dependence on distributed file systems or shared memory. This infrastructure learns and configures a distributed network of learners. The results are then filtered, fused and visualized. The thesis also develops a machine learning infrastructure using Python and compares the two approaches. It uses real-world immigration and GDP datasets from a government database to test the frameworks. The cloud-based approach is able to scale to petabytes of data with minimal configuration.
The Green Evolution of EMOTIVE Cloud EMOTIVE Cloud: The BSC’s IaaS open-sourc...Alex Vaqué
Alexandre Vaqué Brull.
Master in Computer Architecture, Network and Systems.
Universitat Politècnica de Catalunya.
Advisors: Jordi Torres and Jordi Guitart.
September 2011
#VirtualDesignMaster 3 Challenge 3 - Steven Viljoenvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
This document discusses principles for building application front-ends in a service-oriented world. It proposes a Service-Oriented Front-End Architecture (SOFEA) style with the following key principles: 1) Decouple the processes of application download, presentation flow, and data interchange; 2) Presentation flow should be driven by client-side components and managed within the client; 3) Data interchange between tiers should follow common standards to avoid integrity issues and support rich data. Adhering to these principles can help integrate presentation tiers with increasingly service-oriented backends.
The document summarizes Kaavya Kuppa's Master's project on developing an Airline Reservation System. The project was designed using C#.NET and SQL Server as the backend database. Key features of the system included allowing customers to search and book flights, hotels and packages online and giving administrators tools to manage customer and flight information. The document describes all aspects of developing the system from initial planning through implementation and testing.
This document is a seminar report submitted by Shubham Madhukar Rokade to North Maharashtra University in partial fulfillment of a bachelor's degree in computer engineering. The report discusses Sky X technology, which overcomes limitations in TCP performance over satellite links by replacing TCP with a custom protocol optimized for satellite conditions. Key aspects of Sky X addressed include its gateway operation, protocol design features like efficient acknowledgment and dynamic window sizing, and its performance benefits.
- Jyoti Tyagi submitted a project titled "Modification in the behavior of Nova Filter Scheduler to enhance the performance in OpenStack cloud" as part of her MSc in Cloud Computing at the National College of Ireland.
- The project aims to assess the behavior of the nova scheduler in OpenStack with the goal of reducing latency when placing virtual machines. It analyzes the default filters of the nova scheduler to understand limitations and attempts to improve performance and resource allocation.
- An experiment was performed to modify essential filters in the scheduler to prove the concept. Various scheduling filters were analyzed to check their impact on performance by changing default values and metrics.
Sample 1 writing - charfauros, e. Copyright 2013 Edward F. T. Charfauros. R...Edward F. T. Charfauros
This is one of many of my University of Phoenix writing essay papers for achieving my Bachelor Science of Business Administraion (concentraion in Management) degree~
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The students and teachers at CEIP Carmen Martín Gaite school in Spain have been working on an active citizenship campaign to improve their school playgrounds. Younger students drew pictures and wrote letters to the mayor with their requests, while older students created banners, interviewed others, and wrote official letters to the mayor. The children's work was displayed at the school and their petitions were brought to the town hall to be presented to the mayor. The school hopes the mayor will listen to the students' voices and improve the playgrounds.
The document proposes a secure personal identification system based on human retina recognition. The system uses retinal vascular patterns, which are unique to each individual, for identification. It consists of three stages: 1) preprocessing to extract the vascular pattern from retinal images, 2) feature extraction to identify feature points like endings and bifurcations, and represent them as vectors, and 3) matching input images to templates by calculating distances between feature vectors. Experimental results on two retinal image databases achieved over 97% accuracy, demonstrating the potential of the proposed system for high-security identification.
This document discusses branding elements for an organization including a logo that is eye-catching, clever, relevant, and simple and can be used at different sizes. It also mentions creating merchandise through a collaboration with a surfboard company using handmade wood products, which explores a new area for the organization. Finally, it discusses designing a membership form and poster that are cartoon-style, eye-catching, simple, to the point, and can reflect the negative impacts of pollution.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
This document discusses distributed computing systems. It defines distributed computing as a collection of interconnected processors with local memory and peripherals that communicate via message passing over a network. There are two types of distributed systems - tightly coupled systems with shared memory and loosely coupled systems where processors have separate local memory and communicate by passing messages. Distributed computing became popular due to the difficulties of centralized processing on mainframes and the development of microprocessors and computer networks. The key benefits of distributed computing systems over centralized systems include scalability, redundancy, and independence from specific hardware or software standards.
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
The document provides steps and guidance for starting one's journey to becoming wealthy. It recommends paying yourself first by saving money (Commandment #1). It advises setting goals that define how much wealth is needed and by what timeframe (I.Goal and I.Horizon). Various investment instruments are described for generating wealth over the long term, such as owning stocks, mutual funds, businesses, and lending investments like bonds. Regular planning, tracking assets and expenses, and overcoming obstacles like inflation and spending habits are also emphasized. The document stresses that learning about fundamentals of investing like risk, return, and liquidity is important. Overall, the key message is that taking proactive steps to save and plan one's investments is essential
This document summarizes ventilation requirements for occupied spaces in buildings. It requires that all occupied spaces be ventilated either through natural means according to Section 402 or mechanical means according to Section 403. Section 403 specifies minimum outdoor air ventilation rates for various occupancies based on estimated maximum occupant loads. It also restricts recirculation of air from certain spaces and allows transfer air to be used as makeup air. Requirements for outdoor air intake and exhaust openings include minimum distances from contaminant sources and protection with screens or louvers.
This season, on Virtual Design Master, we’ve been dealing with the aftermath of a second round of the zombie outbreak. We’ve designed the systems to build spaceships, which are evacuating what’s left of the human race from the earth. We’ve built the infrastructure to support our new civilization on the moon. We’ve also tried to prepare what’s left of the earth in case there is another round of the outbreak, by fortifying islands across the world by deploying infrastructure remotely.
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
This document describes CloudAnalyst, a tool for simulating large-scale cloud computing environments. CloudAnalyst is built on CloudSim, a framework for modeling and simulating cloud infrastructures. The tool aims to provide an easy to use graphical interface for configuring and running simulations of internet applications deployed in cloud environments. It measures key metrics like response time and data center usage. The document outlines CloudAnalyst's design, which leverages CloudSim while introducing extensions. It also provides instructions for using the tool and demonstrates simulating a social networking application across multiple data centers under different configurations.
This thesis examines machine learning approaches using Hadoop in the cloud. It implements a distributed machine learning infrastructure in the cloud without dependence on distributed file systems or shared memory. This infrastructure learns and configures a distributed network of learners. The results are then filtered, fused and visualized. The thesis also develops a machine learning infrastructure using Python and compares the two approaches. It uses real-world immigration and GDP datasets from a government database to test the frameworks. The cloud-based approach is able to scale to petabytes of data with minimal configuration.
The Green Evolution of EMOTIVE Cloud EMOTIVE Cloud: The BSC’s IaaS open-sourc...Alex Vaqué
Alexandre Vaqué Brull.
Master in Computer Architecture, Network and Systems.
Universitat Politècnica de Catalunya.
Advisors: Jordi Torres and Jordi Guitart.
September 2011
#VirtualDesignMaster 3 Challenge 3 - Steven Viljoenvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
This document discusses principles for building application front-ends in a service-oriented world. It proposes a Service-Oriented Front-End Architecture (SOFEA) style with the following key principles: 1) Decouple the processes of application download, presentation flow, and data interchange; 2) Presentation flow should be driven by client-side components and managed within the client; 3) Data interchange between tiers should follow common standards to avoid integrity issues and support rich data. Adhering to these principles can help integrate presentation tiers with increasingly service-oriented backends.
The document summarizes Kaavya Kuppa's Master's project on developing an Airline Reservation System. The project was designed using C#.NET and SQL Server as the backend database. Key features of the system included allowing customers to search and book flights, hotels and packages online and giving administrators tools to manage customer and flight information. The document describes all aspects of developing the system from initial planning through implementation and testing.
This document is a seminar report submitted by Shubham Madhukar Rokade to North Maharashtra University in partial fulfillment of a bachelor's degree in computer engineering. The report discusses Sky X technology, which overcomes limitations in TCP performance over satellite links by replacing TCP with a custom protocol optimized for satellite conditions. Key aspects of Sky X addressed include its gateway operation, protocol design features like efficient acknowledgment and dynamic window sizing, and its performance benefits.
- Jyoti Tyagi submitted a project titled "Modification in the behavior of Nova Filter Scheduler to enhance the performance in OpenStack cloud" as part of her MSc in Cloud Computing at the National College of Ireland.
- The project aims to assess the behavior of the nova scheduler in OpenStack with the goal of reducing latency when placing virtual machines. It analyzes the default filters of the nova scheduler to understand limitations and attempts to improve performance and resource allocation.
- An experiment was performed to modify essential filters in the scheduler to prove the concept. Various scheduling filters were analyzed to check their impact on performance by changing default values and metrics.
The document describes a project submission for a Masters student's research dissertation on modifying the nova scheduler in OpenStack to enhance performance. The student aims to reduce latency when launching virtual machines by analyzing how scheduling is affected by factors like CPU cores, memory allocation, and disk usage. The submission sheet provides details of the student's name, ID, program of study, module, supervisor, project title, word count, and certification that the work is original. It also includes submission instructions.
This document analyzes the past, present, and future of enterprise data center networking. It discusses physical network topologies like common bus, ring, star, and mesh. It then covers routing methods like Spanning Tree Protocol (STP) that were commonly used but have limitations. Newer protocols like Transparent Interconnection of Lots of Links (TRILL) and Shortest Path Bridging (SPB) aim to improve performance over STP. Software Defined Networking (SDN) provides another option to overcome STP's weaknesses by controlling switches from a centralized server.
This document is a project report that proposes developing a web application to securely store files on a cloud server using hybrid cryptography. It aims to address data security and privacy issues for cloud storage. The application would use a hybrid cryptography technique combining symmetric and asymmetric encryption to encrypt files before uploading them to the cloud. Only authorized users with decryption keys would be able to access and download encrypted files from the cloud server. The report outlines the problem statement, objectives, methodology, design, and implementation of the proposed application to provide secure file storage on the cloud.
This thesis proposes methods for semantically enabling and verifying compositions of geospatial web services. It develops RESTful implementations of OGC services using JSON and describes services using Hydra vocabulary. A type system and algorithms are defined for static syntactic verification and Hoare logic is extended for dynamic verification. Semantic descriptions are propagated through compositions and JSON-W is created to describe compositions in JSON. The services are implemented to demonstrate semantic discovery, verification and execution of compositions.
This document is a final report from 1993 on modelling and designing scalable parallel computing systems. It details the development of a fractal parallel computer topology that can extend to fill a wafer. Algorithms were developed for routing and load balancing, and a simulation program tested a 64-node network using UNIX and PC workstations. Benchmarking of a 16-node example network demonstrated scalability. The report discusses implementing hardware control to support applications using wafer-scale integration.
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
Cloud computing is driving the business of information technology today.
“A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today.“ (Gartner, Inc, 2013)
As companies rush to adopt cloud, however, information technology (IT) security sometimes seems to be an afterthought.
The goal of this paper is to provide a survey of the current state of IT security within public cloud infrastructure-as-a-service providers. After first providing a cloud computing overview, the paper will focus on the infrastructure-as-a-service (IaaS) deployment model, the typical home of IaaS intrusion detection components. The Gartner Cloud Use Case Framework will then be introduced as it will also serve as the framework for this survey. An in-depth review of public cloud intrusion detection studies, options and expert observations will then follow. The paper will then offer the authors conclusions and cloud computing IDS recommendations for enterprises considering a move to the cloud.
Use of reverse proxies to counter attacks -- TCP flow analysisDavid Sweigert
This document summarizes Matthew Weant's 2013 master's thesis from the Naval Postgraduate School, which developed a method for fingerprinting reverse proxy servers using timing analysis of TCP flows. The thesis collected TCP session data from global vantage points while actively probing a list of servers. By analyzing packet round trip times within HTTP requests, the research aimed to classify whether each server was a reverse proxy or not. Key findings included developing algorithms to parse TCP flows and identify relevant timing windows, collecting data from different website categories, and analyzing results to discern reverse proxies through threshold ratios of timing metrics. The thesis evaluated the approach on case studies and popular websites to identify reverse proxies with reasonable accuracy.
The document discusses cloud computing and Eucalyptus, an open-source software for building private and public clouds. It provides an overview of cloud computing models, benefits and challenges. It then describes the architecture and components of Eucalyptus, including the cluster controller, node controller and cloud controller. Sample setup configurations are also discussed. Finally, it compares Eucalyptus to other cloud software like OpenNebula and Nimbus.
The document discusses cloud computing and provides an overview of its key concepts and models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers public and private clouds as well as the benefits and challenges of cloud computing. The role of grid computing technologies in cloud computing is examined. Details are given on the open-source cloud computing platform Eucalyptus including its architecture, sample setups, and security issues. A comparison is provided of other cloud software such as OpenNebula, Nimbus, CloudStack, and OpenStack. Steps are outlined for installing and configuring Eucalyptus and managing its nodes and images.
The document describes a project report submitted by R Ashwin for the award of a Bachelor of Technology degree. It discusses the distributed implementation of the graph database system DGraph. The key steps in the distributed version include sharding the data, assigning unique IDs, loading the data into different servers, and enabling communication between servers through network calls. Performance evaluation on the Freebase film dataset showed that the distributed version had higher throughput and lower latency than the centralized version, especially as the load and computational power increased.
Similar to Alex Ramirez - Challenge 1 - Virtual Design Master (20)
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 – James Brownvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Dennis Georgevdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Abdullah Abdullahvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 2 - Steven Viljoenvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 – James Brownvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 - Dennis Georgevdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 - Abdullah Abdullahvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 1 - Abdullah Abdullahvdmchallenge
We are now settled on Mars, and ready to build a more permanent infrastructure. Keep in mind that power, cooling, and space are extremely expensive resources on Mars.
#VirtualDesignMaster 3 Challenge 1 - Dennis Georgevdmchallenge
Millionaire philanthropists Richard M. and Elon B., have teamed up to work towards humanity’s survival after the outbreak of the virus, that lead to the zombie apocalypse and evacuation of what was left of the human species from earth.
The objective of this design is to supportfirst of its kind humancoloniesin Marsuntila more permanent infrastructurewill be built. Alsobuild amessaging and collaboration infrastructure on top of it for developinga warning systemto give a more human touch to residents in Mars.
#VirtualDesignMaster 3 Challenge 1 – James Brownvdmchallenge
We are now settled on Mars, and ready to build a more permanentinfrastructure. Keep in mind that power, cooling, and space are extremelyexpensive resources on Mars. In order to save space, we have decidednot to use a traditional FiberChannel infrastructure, meaning there will beno dedicated FiberChannel Switches.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
2. VIRTUAL DESIGN MASTER
1
Contents
This design is incomplete but it represents the overall idea and design objectives that I put together.
Thank you for your time and feedback. ........................................................................................................3
Overview.......................................................................................................................................................3
Scenario / Summary..................................................................................................................................3
Scope.........................................................................................................................................................4
Requirements............................................................................................................................................4
Constraints................................................................................................................................................4
Assumptions..............................................................................................................................................4
Risks ..........................................................................................................................................................5
Sizing .............................................................................................................................................................5
Conceptual Solution......................................................................................................................................6
Logical Structure .......................................................................................................................................7
Engineering Specifications............................................................................................................................7
Vendors.....................................................................................................................................................7
Software....................................................................................................................................................8
Physical Space...........................................................................................................................................8
Power & Cooling .......................................................................................................................................8
Host Design...............................................................................................................................................8
ESXi Hosts..................................................................................................................................................9
Hardware ................................................................................................................................................10
Time ........................................................................................................................................................11
Network Infrastructure...............................................................................................................................11
Hardware ................................................................................................................................................11
Jumbo Frames and MTU.........................................................................................................................12
Cabling.....................................................................................................................................................12
Storage........................................................................................................................................................12
Storage Tiers ...........................................................................................................................................12
vCenter....................................................................................................................................................12
Management...........................................................................................................................................12
Orchestration..........................................................................................................................................12
Application..............................................................................................................................................13
HA & DR...................................................................................................................................................13
3. VIRTUAL DESIGN MASTER
2
Management...........................................................................................................................................14
Security .......................................................................................................................................................14
CCTV........................................................................................................................................................14
Alarm.......................................................................................................................................................14
Outbreak Detection ................................................................................................................................14
Biometric ID ............................................................................................................................................14
Access Control Systems...........................................................................................................................14
Satellite Imaging......................................................................................................................................14
Space.......................................................................................................................................................14
Deployment Plan.........................................................................................................................................15
Installation Guide........................................................................................................................................15
Standard Operating Procedures .................................................................................................................16
Other Considerations..................................................................................................................................16
Localization .............................................................................................................................................16
Change Management..............................................................................................................................16
Version Control .......................................................................................................................................16
Email........................................................................................................................................................16
Voice .......................................................................................................................................................16
RADIO COMMUNICATIONS.....................................................................................................................16
Laser PTP Comm Link with Moon Base...................................................................................................17
CISCO NERV Truck & DIRT.......................................................................................................................17
Log and Dump Collection........................................................................................................................17
4. VIRTUAL DESIGN MASTER
3
This design is incomplete but it represents the overall idea and design
objectives that I put together. Thank you for your time and feedback.
Overview
Scenario / Summary
As the world continues to fall into disrepair and the zombies continue to grow in number we have been
tasked to help with the eventual evacuation of humanity from earth. To do so we must coordinate our
efforts to lay down the infrastructure required for such as feat. Using the space facilities already in place
at Cape Canaveral Florida and the Moon colony we have been able to start preparing for our departure
from earth and eventual resettlement in mars.
Thanks to the generosity of our anonymous billionaire contributor we are now tasked with providing the
technology necessary to build and run another 3 space depots here on earth. A web based app has been
developed that will manage and control the space depots. Since this application will control critical
infrastructure as well as the potentially dangerous manufacturing and testing processes it must be
highly available and resilient.
Another aspect of our mission is to collect as much historical data from earth as we can find and take it
with us as we travel to our new home. To accommodate this need we will need to implement a storage
system that will allow us to take at least a subset of reference and historical data with us.
Base to base communications will be provided with a dual redundant full mesh topology of site to site
links. Links will be fiber 10gbe backbone connections. Each one tying into a set of carrier grade Cisco
routers at each site. Backup communications will be provided by satellite data links and low-frequency
packet radio as an emergency management network interface.
The web application is the top priority of this project but other needs have arisen. We must provide
basic communications services such as telephones and radio to the bases and colony. Each base will
undoubtedly be dealing with securing their perimeter from zombie invasion as well as potential
outbreaks. Therefore we will need to implement CCTV, security and intrusion alert systems, as well as
newly developed viral agent detection system that would allow the application to detect the presence of
the zombie inducing virus and quarantine that section of the base. Wifi and cell sites throughout the
properties are also being considered.
To support the planning efforts of our relocation we will also need large blocks of compute to crunch
through the data and calculations needed for space travel and settlement as well as predictions. Any
compute resources not in use will be dedicated to scientific computation when it is needed, however
priority will always be given to all other applications.
To provide the ability to easily scale out the hardware will be assembled in Modular Datacenter Pods.
This allows the datacenters to be built in a central location and then shipped to the new sites via boat,
truck, military transport airplane, or space vehicle. The pods also give us a basic unit or building block
with which to expand our infrastructure if it becomes necessary. This will be done by adding subsequent
pods alongside the existing ones. This will help in terms of build times, modularity, as well as portability.
5. VIRTUAL DESIGN MASTER
4
The ISS will act as a monitoring and management station due to proximity and isolation. However no
datacenter will be built in the ISS.
Once we have safely made it to Mars and settled there we will relocate our datacenter pods to Mars for
further expansion and research of the planet.
Scope
The scope of this project should cover the physical and virtual infrastructure required to support first the
space depot application as well as other critical services that are needed. Application specific designs for
these other critical services may fall out of the scope of this design and will likely be addressed by their
respective teams. However some thought has been given to those services in terms of sizing and
capacity planning.
Requirements
ID Requirement
R01 Highly Available - All systems require some level of redundancy
R02 Solution must be able to scale with ease
R03 Support 4 Space depots, Moon Base, and possibly Mars colony
R04 Support Highly Scalable 3 Tier App
R05 Systems should survive catastrophic failure of all other space depots / bases.
Constraints
ID Constraint
C01 Unnecessary Power Usage should be avoided
C02 All earth locations maybe subject to attack
C03 Communications with the Moon site may be unpredictable and unreliable
Assumptions
ID Assumption
A01 This is a greenfield deployment
A02 Satellite’s Orbiting Earth have not been affected and are in good working order
A03 The Global Positioning System (GPS) is fully functional
A04 The International Space Station (ISS) is intact, Manned, and fully operational
A05 There is a space vehicle ready for launch to deliver equipment, personnel, etc, to
moon base.
A06 There is high speed fiber connectivity to all over future site locations.
A07 There will be IT personnel at each site
A08 Each site will have approximately 32,000 personnel
(# of personnel at NASA’s Cape Canaveral during normal shuttle operations)
A09 Workload overview (cpu, ram, etc..)
A10 Zombies could attack at any time and overrun any facility, possibly all of them at
the same time
6. VIRTUAL DESIGN MASTER
5
Risks
ID Risk
Rs01 Laser PTP Technology is cutting edge
Rs02 The Florida site is a single point of failure for our space efforts until other sites
become operational.
Rs03 If other sites are not operational within a year hurricanes could potentially impact
operations at the Florida site.
Rs04 Modular datacenters could be destroyed during transport, causing further delays
Rs05 No utilization metrics available
Rs06 A failure in deployment could cost us our only active space depot
Rs07 Radiation Damage of Equipment & Data Corruption due to Radiation exposure in
space
Sizing
Attribute Specification
Number of CPUs (sockets) per host 2
Number of cores per CPU (Intel) 12
MHz per CPU core 2,700Mhz
Total CPU MHz per CPU 32,400Mhz
Total CPU MHz per host 64,800Mhz
Proposed maximum host CPU utilization 80%
Available CPU MHz per host 51,840Mhz
How many users are we supporting?
# of VMS
How many different classes of VMs?
Resource Pools ?
Storage Size?
How many desktops?
How many Devices?
How many network devices (non-user)?
IOPS?
Bandwidth Requirements intersite? Intrasite?
Storage
Networking
Compute
Power
Physical Space and Location Considerations
Hardware List
Naming Conventions
7. VIRTUAL DESIGN MASTER
6
Conceptual Solution
The main goal of this design is to provide a framework to build the computer infrastructure required to
run the Space Depot Management App as well as any other applications that might be needed for day to
day operations. Since scale is a large
concern as we ramp up production of
other space depots and bases. To
address we can use a modular
approach to the design.
The base of this modular approach is a
Datacenter Pod. The pod, like the one pictured
below, is essentially a datacenter built around an
ISO shipping container. Pods enable us to
perform quick deployments, scale out in a
modular fashion, mobility, and even help isolate
problems to specific pods themselves (think fires). The pods come equipped with racks, Power
distribution, UPS, Switched PDUs, fire suppression, access control, and A/C. Therefore providing
the basic building blocks of any standard datacenter.
The next layer is Hardware. Hardware can be broken down into:
Storage
Networking
Compute
These building blocks represent the hardware components that will be incorporated on top of the Pod
base. Each category can be addressed in a modular approach on its own. For example we can add more
storage by adding more drives to a subsystem or a whole other subsystem all together.
8. VIRTUAL DESIGN MASTER
7
The virtualization layer will then allow us to apply a layer of abstraction over these resources and allow
us to deploy our applications on top of this great hardware. In this case we will be using Vmware
Vshpere 5.5.
The software and applications we want to run will be packaged into virtual machines and then deployed
on top of the virtual infrastructure.
Orchestration and management software will then allow us to create automated processes to monitor,
maintain, and even expand our infrastructure to make sure that our VMs and the apps that run inside of
them always have the adequate resources they need.
The main site will be in Cape Canaveral Florida. Each subsequent site should be in the next quadrant of
earth. Therefore once the next 3 sites are operational we should have a routable communications link
with the space station, certain satellites, and the moon at all times (weather permitting).
Each site will deploy at least one datacenter pod. The datacenter will host the space depot control
application and have enough resources to service all other local operation as well as act as a DR site for
one other location. A datacenter pod will also be deployed on the moon and will act as a last resort DR
location. All space depots will have an uplink to the moon datacenter and replicate data there. If all
space depots on earth are destroyed the datacenter on the moon can continue to provide services for
the mission to Mars.
Logical Structure
Currently there is one earth site (site E001) and the others will be built out soon. Since the Moon will be
our foothold in the stars we must setup different communication links to be able to maintain reliable
and constant contact with the colony base and their computer systems there. To do so the other 3
space depots will be spread out across the world so that as one base rotates out of range of the moon
the next base can initiate a link and provide an alternate route for data and communications to
continue.
SITES
Site ID Location Name/Location
E001 Earth Cape Canaveral, FL
E002 Earth Nasa Telescope Facility, Hawaii
E003 Earth Europe/Africa Facility
E004 Earth China Facility
M001 Moon Moon Colony
Engineering Specifications
Vendors
APC
Cisco
Netapp
9. VIRTUAL DESIGN MASTER
8
Vmware
Microsoft
Veeam
Verto
F5
Riverbed
Software
Vmware Vsphere 5.5
Vmware vCenter
Vmware vCenter Orchestrator
Microsoft Windows Server 2012 R2 x64
Microsoft SQL Server 2012
Microsoft SQL Server 2014
PowerShell
Veeam
Verto
F5 virtual appliance for load balancing
Riverbed Software appliance for Wan Optimization
Cisco V1000 Switches & Routers
Physical Space
Each data center is based around a Modular Pod that can be transported.
o This can help to accelerate the construction of the other 3 sites. As the infrastructure
could be built in Florida and then shipped off to the remote site prepopulated with all
the configurations and data necessary.
o Can also be useful for eventual space transport of datacenter to the Moon or Mars
o The Pod comes equipped with 4x racks each with 42u of empty rack space.
Power & Cooling
Power is being supplied by the former FPL Cape Canaveral Next Generation Clean Energy Center
Dual Power circuits to each rack
Onsite Diesel Generator Banks will be required (minimum 150KW output)
In rack distribution will be 220v for efficiency
Each rack will need to have a minimum of 30KW of power
Redundant A/C Units
Hot isle containment for efficiency
APC Environmental Control and Monitoring Netbotz
APC Vertical Switched PDU
APC Redundant UPS Systems
Host Design
To keep with the modular nature of this design all hosts are sized equally. This also helps in that any
blade can be swapped with any other blade in an emergency, as well as parts all being identical.
10. VIRTUAL DESIGN MASTER
9
The system will implement a cable once strategy where all ports are populated and wired so as to
reduce the need for manual human intervention. Most changes can be made by modifying the
configuration in software and the committed.
Cisco UCS Blades are used in a 5108 chassis that can hold up to 8 blades and supports a total of 16 10Gb
connections.
Attribute Specification
Vendor Cisco
Model B200 M3
Number of CPU sockets 2
Number of Processors Installed 2
Number of CPU cores 24
Processor Model Intel Xeon Processor E5-2697 v2 (12C, 2.7 GHz , 30M
Cache, 130 W)
Processor speed 2.7Ghz
Memory 256GB Memory (16 x 16GB 1866MHz Memory)
Number of network adaptor ports 8
Network adaptor vendor(s) Cisco
Network adaptor model(s) Cisco UCS Virtual Interface Card 1280
Network adaptor speed 10Gbps
Installation destination Stateless Cached
VMware ESXi server version VMware ESXi 5.5 server latest Build
ESXi Hosts
The management cluster will be deployed using a standard install to the onboard SD card. Subsequent
clusters will use auto deploy using stateless cached mode using the onboard SD card. This will make
configuration changes and maintenance of the hosts much easier to handle.
11. VIRTUAL DESIGN MASTER
10
Hardware
Cisco UCS 5108 Blade Chassis
o UCS 5108 blade chassis is complete with 4 hot swappable Platinum AC power supplies
(redundant power), two UCS 2208XP Fabric Extenders (8 x 10 Gb FCoE ports each) for
maximum chassis I/O through put capability, all mounting and cable accessories.
Cisco UCS B200 M3 Blades
o 2 x Intel® Xeon® Processor E5-2697 v2 (12C, 2.7 GHz , 30M Cache, 130 W)
o 1 x UCS 1280 80Gb Virtual Interface Card
Fabric Interconnects2 x 6296UP Fabric Interconnect
o 6296UP Fabric Interconnect 1RU switch comes with 48 UP ports (UP / universal ports
support - 1/10Gb Ethernet, FCoE, and Fibre Channel) upgradable to 96 ports, Layer 2
switching, redundant hot swappable power supplies, embedded UCS Manager v2.1, and
all mounting and cable accessories.
Dual Cisco Nexsus 7000 Core Switches
12. VIRTUAL DESIGN MASTER
11
Time
Redundant NTP Servers will be deployed at each location. Network enabled GPS Receivers at each
location will provide NTP servers with accurate time sync.
Network Infrastructure
Hardware
Dual Cisco Nexus 7k for Datacenter Core
o The 7k was chosen because of the ability to expand to handle expansion and scale (as
required by R02) beyond something like a nexus 5k which has limited expansion.
Cisco Carrier Grade for Edge Routing
Cisco 3702e Wireless Access Point with Virtual Controller
Purpose built Satellite Data link Units
Purpose Built Point-to-Point Free Space Optics Laser Links
Software Defined Packet Radio interface for management of devices in worst case scenario over
Long Range RF frequencies
VLAN ID Name Description
110 OOB Management Out of band management
120 Management
130 vMotion
140 FT Traffic
150 IP Storage NFS, iSCSI, ...
210 Network Traffic All other unclassified traffic
220 Database Traffic Traffic connecting to database VMs
230 Application Traffic Traffic connecting to middle tier application VMs
310 WAN (terrestrial)
320 Comm Links (RF, Laser, etc…)
The Cisco Nexsus 1000v (n1kv) will be used as the virtual switch of choice. It was chosen for its granular
control of traffic and QoS features.
Segmentation of traffic by type and QoS within
Storage Traffic
Fault Tolerance Logging
vMotion
Network Traffic
Management
Cisco UCS is FCoE aware and lets us set priority levels for that type of traffic, which we cannot do
through the n1kv.
13. VIRTUAL DESIGN MASTER
12
Jumbo Frames and MTU
Jumbo frames will be enabled on all ports being used for IP storage or high bandwidth traffic
MTUs for the WAN Links, RF Links, Etc.. will have different MTU maximums and requirements .
Since MTUs must be configured end to end for network to function optimally it should be taken
into account when the application is written.
Cabling
All cabling should be labeled in accordance to the TIA-606-B standard.
Cable every port so that configuration can be done hands off and through software. Network
configuration should be able to happen in most instances by changing the configuration of the switches
and not by swapping cables. This will reduce time needed to implement changes as well as providing
maximum available bandwidth when combined with port aggregation.
Storage
All data will be stored in dual Netapp Filers. The filler will be configured with FCoE. LUNS will be created
to host the VMFS data stores for vsphere. Fillers will run ontap 8.0< in cluster mode. Storage APIs (vAAI)
will be enabled and in use.
Storage Tiers
Tier Drive Type
Gold SAS SSD
Silver High Speed SAS Spinning Disk 15k RPM
Bronze SATA 7200
….
vCenter
3x vCenter VMs in Linked Mode at each site
vCenter VMs will be part of the management cluster
Microsoft SQL Server 2012 with AlwaysOn for database HA
Each site will have its own set of vCenter servers in a management cluster and linked in group
Management
Management of the infrastructure will use several products.
For Vmware we will use vCenter Standard combined with vCenter Orchestrator.
For some of the Microsoft stack System Center 2012 will provide management control.
Orchestration
Will be using a combination of Vmware vCO with custom developed PowerShell/PowerCLI scripts.
14. VIRTUAL DESIGN MASTER
13
Application
The Space Depot Control Application is a mission critical application that must be protected at all costs
as human lives depend on it. The application is a standard 3-tier application with a web-frontend,
Business Logic, and database. Each tier will be composed of servers that will be clustered in order to
provide availability and reliability of the application.
The web tier will be composed of Windows Server 2012 R2 Datacenter servers
running IIS 8. The F5 Big-IP virtual appliance will provide application load
balancing for the front end web tier.
The Business Logic will run the application server on Windows Server 2012 R2
Datacenter.
Finally the Database tier will run SQL Server 2014 Enterprise on Windows
Server 2012 R2 Datacenter. High availability will be provided using AlwaysOn
Availability Groups and Failover Clustering.
Using Orchestrator in combination with PowerShell we can easily scale out
this model by provisioning more servers and having PowerShell configure all
the pieces.
Application can be split up
Local Functions (where local functions and computations are performed
locally)
Global Functions ( Functions that must be run at the main site using
HA & DR
Site E001 will serve as the primary site for all global operations. Site E002 will serve as a DR recovery site
for E001. Each subsequent site will use the closest geographical site as a DR site.
All data is also asynchronously replicated to the Moon Base when possible and offline backups are sent
via rocket/shuttle.
Recovery Time Objective (RTO): 1 hour
Recovery Point Objective (RPO): 15 Min
Service Level Agreement (SLA): 99.9999% Uptime
15. VIRTUAL DESIGN MASTER
14
Management
Management of systems will be performed at each corresponding site. There will be a balanced team of
IT professionals and developers at each site. This will reduce the likely hood of losing all personnel of a
particular skill set due to a site being compromised or destroyed.
Security
CCTV
Using IP based cameras all video data can be routed and stored efficiently without having to
have additional infrastructure.
Alarm
Alarm system is IP based. Uses a combination of Sensor nodes (motion, seismic, etc..), Facial
Recognition, and biological. Most systems run on embedded computers systems such as Raspberry Pi,
Arduino, and Intel Galileo with Ethernet ports providing a link to the central system.
Outbreak Detection
Uses specially crafted sensors that can detect the “virus” and send alerts via network connection
to trigger alarms, automated responses, and scripts.
Biometric ID
Uses Fingerprints and Retinal Scan to ID user.
Retinal scan can also alert if user may be potentially infected. This can fire off alerts, block
certain levels of access, etc… especially useful in a case where an individual is exposed and is
aware of the infection but is trying to undermine security out of self-preservation.
Access Control Systems
High security Areas are secured with a combination of Biometric, Keycard, & Pin access points. All three
inputs are required. Access Control Systems integrate with Active Directory and provide reporting.
Satellite Imaging
Using satellite imaging to track zombie movements and weather patterns. The existing NSA and NOAA
weather satellites fit the bill for this purpose.
Since Cape Canaveral is partially surrounded by water it helps reduce the attack footprint by which
zombies could attack. Also by eliminating the bridges connecting to the mainland, attack vectors are also
reduced.
Space
Space telescopes and Radio telescopes feed data back regarding possible debris, solar flare activity, and
other space anomalies that could impact the success of our missions.
16. VIRTUAL DESIGN MASTER
15
Deployment Plan
Phases
1. Florida Site
2. Moon Colony
3. 2nd
Site
4. 3rd
Site
5. 4th
Site
6. Mars
Installation Guide
Physical
1) Build out Modular Container
2) Connect Utilities
3) Rack and Stack Computer Equipment
4) Cable and Label
5) Test Basic Functionality
a) Power
b) A/C
c) PDUs
6) Setup PC for setup purposes
a) Setup PC with all documentation and files for project
b) Install all necessary management tools
c) Prepare any necessary ISO, Executables, or additional files needed
7) Configure Networking
a) Configure Basic Networking
b) Configure Management Network
8) Configure Storage
9) Configure UCS, Fabric & Interconnects
10) Install and Configure Management Cluster
a) Setup Main Esxi Hosts
b) Setup Base Infrastructure
c) Setup vCenter
d)
11) Auto Deploy Hosts
a) Host auto-deploy to Stateless w/ Caching
b) Test Functionality
12) Install and Configure N1KV Virtual Switches
13) Install and Configure Management & Orchestration Tools
14)
15) Connect to Local Network Infrastructure
a) Create links between Nexsus 7k to Core/Distributions layer of client/device network
17. VIRTUAL DESIGN MASTER
16
16) Connect Environment to WAN Links, SAT Links, Terrestrial RF Data Links, and Laser Arrays
17)
18) Install Backup & Recovery Software
19) Perform Initial Backup
20) Test Backup
21) Implement DR Strategy & Replication
22) Test DR failover
23) Hand-off to Ops team
24) Postmortem Analysis
Standard Operating Procedures
…
Other Considerations
Localization
Having different language options for the space depots in other continents and possibly a mixture of
personnel at every base as well as the moon colony.
Change Management
Implementation of a change management / CMDB system will be crucial to making sure human error is
reduced to a minimum.
Version Control
Version control is necessary not only to track changes but also to keep a distributed repository for all
code and scripts in the unfortunate event that one of the space depots/bases are taken out.
Email
Email will undoubtedly be another application that will be required for day to day operations.
Communication is key and email affords us the luxury of being able to communicate using text even in
extreme circumstances where data bandwidth might be at a premium or unreliable.
Voice
In addition to email, voice communications will be the next step. Using a cisco call manager system we
will be able to tie in all of the sites via VOIP.
RADIO COMMUNICATIONS
Radio Frequency (RF) Voice and Data Links play an integral part of this design as we will be dealing with
off-world components that are only reachable via RF, Line of Sight Laser, or other non-conventional
networking methods.
Can use Cisco iPICS to interface with existing radio platforms for communications with ISS and other
emergency response infrastructure that might have survived.
18. VIRTUAL DESIGN MASTER
17
Laser PTP Comm Link with Moon Base
Using freespace optics we can use laser point to point communications to establish data links with the
moon base. Multigigabit links have already been tested.
http://opticalcomm.jpl.nasa.gov/PAGES/pubs.html#mgtsvr
http://trs-new.jpl.nasa.gov/dspace/bitstream/2014/17809/1/99-1257.pdf
CISCO NERV Truck & DIRT
When establishing a new site/base a cisco NERV truck could be used to establish satellite
communications, setup temporary radio repeaters, provide network access, and other crucial
components that could facilitate construction.
Log and Dump Collection
Network based Log and Core Dump collection should be implemented since the hosts are stateless and
do not have local storage.