Virtual machine (VM) replication (replicating the state of a primary VM running on a primary node to a secondary VM running on a secondary node) is a well known technique for providing application-agnostic, non-stop service. Unfortunately, existing VM replication approaches suffer from excessive replication overhead and, for client-server systems, there is really no need for the secondary VM to match its machine state with the primary VM at all times.
In this paper, we propose COLO (COarse-grain LOck-stepping virtual machine solution for non-stop service), a generic and highly efficient non-stop service solution, based on on-demand VM replication. COLO monitors the output responses of the primary and secondary VMs. COLO considers the secondary VM a valid replica of the primary VM, as long as network responses generated by the secondary VM match that of the primary. The primary VM state is propagated to the secondary VM, if and only if outputs from the secondary and primary servers no longer match.
If you are a cloud computing provider, soon you might start facing problems with the network part of it. Conventional solutions for network doesn't apply very well for Cloud environments. SDN give us a new way of thinking about network, embracing Inovation. In this session, you will see how Locaweb implemented SDN to solve their network problems after 3 years providing Cloud Solutions in Brazil. A new era for network on the way...
Bei der Adressarchitektur von IPv4 beinhaltet eine IP-Adresse zwei Informationen über einen Knoten (genaugenommen ein Interface): erstens die Adresse des Interfaces (Host-ID) und zweitens die Information, wie das Interface mit dem Netzwerk verbunden ist (Subnetz). Dies ändert sich mit IPv6 nicht, ausser dass der Adressraum viel grösser ist. Dies führt zu grösseren Herausforderungen in komplexen Netzwerken, insbesondere wenn Anforderungen an Multi-Homing oder Mobilität vorliegen.
LISP (Locator/ID Separation Protocol) ist eine neue Routingarchitektur mit einer neuen Adressierungsstruktur. Dabei wird die Identität eines Gerätes, auch Endpoint Identifier genannt (EID), von seiner Position im Netzwerk, auch Routing Locator (RLOC) genannt, in zwei separate Adressräume unterteilt.
Die Präsentation geht auf verschiedene Use Cases, insbesondere die Migration von IPv4 auf IPv6 mit LISP ein.
IPv6 configuration at CSCS
● Dual Stack approach
● Static addressing for networking equipment and servers
● Dynamic addressing for PC and guest networks
– Auto configuration with SLAAC
● But we still rely on DHCPv4 to distribute DNS
– Tests ongoing for:
● Distributing DNS via RA (RDNSS, RFC6106)
● DHCPv6
IPv6 deployment
5
● Configure the network part and FW/ACLs
– Test
● Configure IPv6 on the systems
– Test
– At this point the system uses IPv6 and IPv4 for outgoing
connections
● Publish the AAAA resource record into the DNS with short TTL
– If test is succesful: set normal TTL for the RR AAAA
– Now the system is fully IPv6 enabled
IPv6 lessons learned
7
● Some network devices send out RA even if they shouldn't
– Impact: machines get IPv6 global address
● Disable SLAAC autoconfiguration on all the servers
● Rogue RA:
– Impact: default gateway changed! No IPv6 connectivity anymore..
● Filter RA messages at the network level
● IPv6 ACL: be careful not to filter NS/ND messages
– Impact: you may break IPv6 connectivity
● On IPv6 ARP is replaced by ICMPv6 NS and ICMPv6 ND messages
● Firewall IPv6 limitations (CLI config needed, WebGUI not ready)
● Services not listening on IPv6. Remember to configure ssh, httpd, etc to
listen also on IPv6
This document provides guidance on rapidly deploying IPv6 for ISP networks. It begins by outlining common concerns with IPv6 implementation and then provides steps to take including: starting implementation in a lab; enabling IPv6 on core infrastructure; enabling customer services in stages from easiest to hardest; and conducting a network readiness assessment. The document then provides examples of enabling IPv6 on routers and end customer connections using a simplified IPv6 addressing scheme. It discusses additional considerations like security, Linux and Windows test beds, non-networking devices, sources of help, and convincing management of the need for IPv6 deployment.
The document discusses OpenStack networking deployment models. It describes the moderator and panelists for a discussion on the topic. The body examines different networking models used in OpenStack like Nova networking, Neutron network services, and overlay networks. It provides examples of how these models could be applied to different use cases with varying numbers of tenants and hosts. Finally, it poses questions the panelists might discuss around advising customers on model choices, integrating physical infrastructure, alternatives to switched VLAN models, and using BGP/MPLS in single data center solutions.
This document summarizes IPv6 implementation plans at ETH Zurich. It discusses that IPv4 addresses are running out, so IPv6 is needed to connect growing devices. The roadmap is to gain experience with IPv6 in 2013-2014, start dual-stack rollout in 2015, and transition fully from IPv4 by 2020. Key aspects covered include changing to a new IPv6 address range, DHCPv6 implementation challenges, firewall upgrades, and initial projects already using IPv6.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
If you are a cloud computing provider, soon you might start facing problems with the network part of it. Conventional solutions for network doesn't apply very well for Cloud environments. SDN give us a new way of thinking about network, embracing Inovation. In this session, you will see how Locaweb implemented SDN to solve their network problems after 3 years providing Cloud Solutions in Brazil. A new era for network on the way...
Bei der Adressarchitektur von IPv4 beinhaltet eine IP-Adresse zwei Informationen über einen Knoten (genaugenommen ein Interface): erstens die Adresse des Interfaces (Host-ID) und zweitens die Information, wie das Interface mit dem Netzwerk verbunden ist (Subnetz). Dies ändert sich mit IPv6 nicht, ausser dass der Adressraum viel grösser ist. Dies führt zu grösseren Herausforderungen in komplexen Netzwerken, insbesondere wenn Anforderungen an Multi-Homing oder Mobilität vorliegen.
LISP (Locator/ID Separation Protocol) ist eine neue Routingarchitektur mit einer neuen Adressierungsstruktur. Dabei wird die Identität eines Gerätes, auch Endpoint Identifier genannt (EID), von seiner Position im Netzwerk, auch Routing Locator (RLOC) genannt, in zwei separate Adressräume unterteilt.
Die Präsentation geht auf verschiedene Use Cases, insbesondere die Migration von IPv4 auf IPv6 mit LISP ein.
IPv6 configuration at CSCS
● Dual Stack approach
● Static addressing for networking equipment and servers
● Dynamic addressing for PC and guest networks
– Auto configuration with SLAAC
● But we still rely on DHCPv4 to distribute DNS
– Tests ongoing for:
● Distributing DNS via RA (RDNSS, RFC6106)
● DHCPv6
IPv6 deployment
5
● Configure the network part and FW/ACLs
– Test
● Configure IPv6 on the systems
– Test
– At this point the system uses IPv6 and IPv4 for outgoing
connections
● Publish the AAAA resource record into the DNS with short TTL
– If test is succesful: set normal TTL for the RR AAAA
– Now the system is fully IPv6 enabled
IPv6 lessons learned
7
● Some network devices send out RA even if they shouldn't
– Impact: machines get IPv6 global address
● Disable SLAAC autoconfiguration on all the servers
● Rogue RA:
– Impact: default gateway changed! No IPv6 connectivity anymore..
● Filter RA messages at the network level
● IPv6 ACL: be careful not to filter NS/ND messages
– Impact: you may break IPv6 connectivity
● On IPv6 ARP is replaced by ICMPv6 NS and ICMPv6 ND messages
● Firewall IPv6 limitations (CLI config needed, WebGUI not ready)
● Services not listening on IPv6. Remember to configure ssh, httpd, etc to
listen also on IPv6
This document provides guidance on rapidly deploying IPv6 for ISP networks. It begins by outlining common concerns with IPv6 implementation and then provides steps to take including: starting implementation in a lab; enabling IPv6 on core infrastructure; enabling customer services in stages from easiest to hardest; and conducting a network readiness assessment. The document then provides examples of enabling IPv6 on routers and end customer connections using a simplified IPv6 addressing scheme. It discusses additional considerations like security, Linux and Windows test beds, non-networking devices, sources of help, and convincing management of the need for IPv6 deployment.
The document discusses OpenStack networking deployment models. It describes the moderator and panelists for a discussion on the topic. The body examines different networking models used in OpenStack like Nova networking, Neutron network services, and overlay networks. It provides examples of how these models could be applied to different use cases with varying numbers of tenants and hosts. Finally, it poses questions the panelists might discuss around advising customers on model choices, integrating physical infrastructure, alternatives to switched VLAN models, and using BGP/MPLS in single data center solutions.
This document summarizes IPv6 implementation plans at ETH Zurich. It discusses that IPv4 addresses are running out, so IPv6 is needed to connect growing devices. The roadmap is to gain experience with IPv6 in 2013-2014, start dual-stack rollout in 2015, and transition fully from IPv4 by 2020. Key aspects covered include changing to a new IPv6 address range, DHCPv6 implementation challenges, firewall upgrades, and initial projects already using IPv6.
Yoshihiro Nakajima presented on software stacks that enable software-defined networking (SDN) and network functions virtualization (NFV). He discussed trends in SDN and NFV, introduced the Lagopus SDN software switch project, and described how Data Plane Development Kit (DPDK) helps optimize packet processing performance. The goal of his talk was to provide an NFV/SDN-aware software stack capable of 100Gbps switching through high-performance packet processing.
Introduction to the Helium release of OpenDaylightSDN Hub
"Helium" is the second release of OpenDaylight made on Oct 2, 2014. This release has more expanded support for Yang, modeling and autogeneration of REST API, improved performance of MD-SAL datastore using Tree-based Akka storage, better integration with OpenStack Neutron API, support for Group-based Policy and support for Service Function Chaining.
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
The document provides information on enhancements in FreeRADIUS versions 3.0.0 through 3.2.0. Key updates include improved security with RADSEC and DTLS support, expanded testing, and new features like password changing and caching. EAP-TLS is discussed as a more secure authentication method than PEAP. The Trust Router was added to allow cross-federation authentication by distributing identity provider information.
The document discusses IPv6 addressing fundamentals and policies. It covers how to obtain IPv6 address space from RIPE, including the different allocation and assignment types. It provides guidelines for creating IPv6 addressing plans, with an example addressing plan that encodes information like function and location in the address. The document also discusses IPv6 transition mechanisms and how they allow connectivity to IPv4 networks during the transition period.
PLNOG15: Practical deployments of Kea, a high performance scalable DHCP - Tom...PROIDEA
This document discusses Kea, an open source DHCP server from ISC. It provides high-level summaries of Kea's design, features, and deployments. Kea was designed for high performance, modularity, and scalability. Notable deployments include a large ISP serving over 2 million users and Facebook using Kea in their datacenters for bare metal provisioning. Kea provides advantages like failure resilience, rapid configuration updates, and metrics collection.
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof MazepaPROIDEA
IOS XR is Cisco's modular, distributed network operating system. In 2004, Cisco introduced IOS XR and the CRS-1 router, the first router to run IOS XR. IOS XR offers innovations such as a distributed architecture, high scalability, and always-on operations. In subsequent years, Cisco continued expanding IOS XR's capabilities with features like 64-bit support and virtualization.
Ron Broersma presented on his organization's experiences deploying IPv6 and the challenges they faced. Some of the major issues included lack of feature parity between IPv4 and IPv6 implementations, vendors not fully supporting IPv6, and issues with privacy addresses and rogue router advertisements. He also discussed the operational complexity of managing dual-stack networks and provided an update on progress deploying IPv6 within the U.S. government. Key lessons learned included gaining hands-on operational experience with IPv6 before extensive planning and addressing common mistakes in initial addressing plans.
Aspekte von IPv6-Security
• Hackertools & ein paar Angriffsszenarien
• 3 Empfehlungen
q a) Ist IPv6 sicherer als IPv4?
q b) Ist IPv6 unsicherer als IPv4?
q c) Wer ist an allem Schuld?
q d) Wie wirkt sich die Integration von IPv6 in
meine Organisation auf deren IT-Sicherheit aus?
This document discusses microservices architecture compared to a monolithic architecture. A microservices architecture breaks an application into smaller, independent services that each perform discrete functions. This allows for more rapid development and improved scalability. However, a microservices architecture is also more complex to deploy and manage. The document provides an example of how a VoIP application could use a microservices approach by breaking components like billing, fraud detection, and call analytics into separate services. It also discusses using Docker containers and services to deploy and scale the microservices architecture.
This document discusses configuring FreeSWITCH, an open source telephony platform, on Docker. It provides background on IP telephony systems and introduces FreeSWITCH and Docker. The benefits of using FreeSWITCH on Docker are explained, such as easier deployment and scalability. Steps are outlined to install FreeSWITCH from source on a CentOS Docker container and configure the network settings. Finally, instructions are given to configure a SIP phone like Linphone and verify the FreeSWITCH installation by placing test calls.
Presentation at OpenStack Summit Boston. This talk covers various lessons on IPv6 Neutron deployments like address allocation, address configuration, router consideration and so on.
Distribution, redundancy and high availability using OpenSIPSDigium
This document discusses using OpenSIPS, an open source SIP proxy server, to provide distribution, redundancy, and high availability for VoIP networks. It begins with an outline and brief history of VoIP. It then covers proxy servers and highlights advantages like improved performance, security, flexibility, and most importantly redundancy and high availability through failure detection and rerouting. The document focuses on OpenSIPS, describing its features such as load balancing, signaling manipulation, and over 120 modules. It also addresses using OpenSIPS for distribution across redundant servers to ensure continuity of VoIP services.
Service Function Chaining in Openstack NeutronMichelle Holley
Service Function Chaining (SFC) uses software-defined networking (SDN) capabilities to create a service chain of connected network services (such as L4-7 like firewalls,
network address translation [NAT], intrusion protection) and connect them in a virtual chain. This capability can be used by network operators to set up suites or catalogs
of connected services that enable the use of a single network connection for many services, with different characteristics.
networking-sfc is a service plugin of Openstack neutron. The talk will go over the architecture, implementation, use-cases and latest enhancements to networking-sfc (the APIs and implementation to support service function chaining in neutron).
About the speaker: Farhad Sunavala is currently a principal architect/engineer working on Network Virtualization, Cloud service, and SDN technologies at Huawei Technology USA. He has led several wireless projects in Huawei including virtual EPC, service function chaining, etc. Prior to Huawei, he worked 17 years at Cisco. Farhad received his MS in Electrical and Computer Engineering from University of New Hampshire. His expertise includes L2/L3/L4 networking, Network Virtualization, SDN, Cloud Computing, and
mobile wireless networks. He holds several patents in platforms, virtualization, wireless, service-chaining and cloud computing. Farhad was a core member of networking-sfc.
This document discusses IPv6 only hosting and the challenges of moving to an IPv6-only infrastructure. It notes that IPv4 addresses are becoming scarce and expensive, leading to complicated overlay networks. IPv6 addresses are effectively unlimited and free in comparison. The document outlines steps taken to implement IPv6-only hosting, including NAT64 for outbound IPv4 access, inbound proxies, DHCPv6, and updates to monitoring, backup, and management services. It reports that roughly 5% of the company's servers are now IPv6-only.
This document provides an overview of containers and container networking. It begins with defining containers and their advantages over virtual machines. It then discusses the container ecosystem including key projects like Docker, CoreOS, and the Open Container Initiative. The document reviews container orchestration systems like Kubernetes, Docker Swarm, and Mesos. It concludes with a demo of OpenStack and containers and a discussion of containers on Cisco platforms.
The document discusses HP's involvement in network function virtualization (NFV) and their plans for Mobile World Congress 2015 in Barcelona. It outlines HP's OpenNFV program to support NFV transformation through an open reference architecture, NFV labs, and a partner program. It describes HP's numerous NFV partners and contributions to standards bodies like ETSI. It also provides details on HP's NFV demonstration plans for MWC2015, including showcasing virtualized mobile core network functions with partners.
This document provides a 12-step plan for enabling IPv6 in an Internet service provider (ISP) network. The steps include: 1) requesting IPv6 address space from registries; 2) auditing network equipment for IPv6 support; 3) training staff on IPv6; 4) enabling IPv6 with upstream providers; 5) updating security policies for IPv6; 6) monitoring IPv6 metrics; 7) developing an IPv6 addressing plan; 8) deploying IPv6 in the core network; 9) conducting IPv6 trials; 10) enabling IPv6 in the access network; 11) configuring IPv6 transition technologies; and 12) updating customer-premises equipment to support IPv6. The document compares
This document discusses performance-oriented design and what metrics should be measured. It emphasizes that performance is important and organizations should care about it. Key metrics that should be measured include arrival rate, service time, throughput, queues, method counts, response times, and other application and system-level metrics. References for further reading on performance engineering and capacity planning are also provided.
Blue Coat PacketShaper provides visibility and optimization of network applications through application classification, monitoring, quality of service controls, and compression. It automatically classifies network applications, monitors performance in real time, controls bandwidth with quality of service policies, and increases WAN capacity with compression. PacketShaper supports application delivery networks with deep application visibility and controls to optimize WAN performance.
Introduction to the Helium release of OpenDaylightSDN Hub
"Helium" is the second release of OpenDaylight made on Oct 2, 2014. This release has more expanded support for Yang, modeling and autogeneration of REST API, improved performance of MD-SAL datastore using Tree-based Akka storage, better integration with OpenStack Neutron API, support for Group-based Policy and support for Service Function Chaining.
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
The document provides information on enhancements in FreeRADIUS versions 3.0.0 through 3.2.0. Key updates include improved security with RADSEC and DTLS support, expanded testing, and new features like password changing and caching. EAP-TLS is discussed as a more secure authentication method than PEAP. The Trust Router was added to allow cross-federation authentication by distributing identity provider information.
The document discusses IPv6 addressing fundamentals and policies. It covers how to obtain IPv6 address space from RIPE, including the different allocation and assignment types. It provides guidelines for creating IPv6 addressing plans, with an example addressing plan that encodes information like function and location in the address. The document also discusses IPv6 transition mechanisms and how they allow connectivity to IPv4 networks during the transition period.
PLNOG15: Practical deployments of Kea, a high performance scalable DHCP - Tom...PROIDEA
This document discusses Kea, an open source DHCP server from ISC. It provides high-level summaries of Kea's design, features, and deployments. Kea was designed for high performance, modularity, and scalability. Notable deployments include a large ISP serving over 2 million users and Facebook using Kea in their datacenters for bare metal provisioning. Kea provides advantages like failure resilience, rapid configuration updates, and metrics collection.
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof MazepaPROIDEA
IOS XR is Cisco's modular, distributed network operating system. In 2004, Cisco introduced IOS XR and the CRS-1 router, the first router to run IOS XR. IOS XR offers innovations such as a distributed architecture, high scalability, and always-on operations. In subsequent years, Cisco continued expanding IOS XR's capabilities with features like 64-bit support and virtualization.
Ron Broersma presented on his organization's experiences deploying IPv6 and the challenges they faced. Some of the major issues included lack of feature parity between IPv4 and IPv6 implementations, vendors not fully supporting IPv6, and issues with privacy addresses and rogue router advertisements. He also discussed the operational complexity of managing dual-stack networks and provided an update on progress deploying IPv6 within the U.S. government. Key lessons learned included gaining hands-on operational experience with IPv6 before extensive planning and addressing common mistakes in initial addressing plans.
Aspekte von IPv6-Security
• Hackertools & ein paar Angriffsszenarien
• 3 Empfehlungen
q a) Ist IPv6 sicherer als IPv4?
q b) Ist IPv6 unsicherer als IPv4?
q c) Wer ist an allem Schuld?
q d) Wie wirkt sich die Integration von IPv6 in
meine Organisation auf deren IT-Sicherheit aus?
This document discusses microservices architecture compared to a monolithic architecture. A microservices architecture breaks an application into smaller, independent services that each perform discrete functions. This allows for more rapid development and improved scalability. However, a microservices architecture is also more complex to deploy and manage. The document provides an example of how a VoIP application could use a microservices approach by breaking components like billing, fraud detection, and call analytics into separate services. It also discusses using Docker containers and services to deploy and scale the microservices architecture.
This document discusses configuring FreeSWITCH, an open source telephony platform, on Docker. It provides background on IP telephony systems and introduces FreeSWITCH and Docker. The benefits of using FreeSWITCH on Docker are explained, such as easier deployment and scalability. Steps are outlined to install FreeSWITCH from source on a CentOS Docker container and configure the network settings. Finally, instructions are given to configure a SIP phone like Linphone and verify the FreeSWITCH installation by placing test calls.
Presentation at OpenStack Summit Boston. This talk covers various lessons on IPv6 Neutron deployments like address allocation, address configuration, router consideration and so on.
Distribution, redundancy and high availability using OpenSIPSDigium
This document discusses using OpenSIPS, an open source SIP proxy server, to provide distribution, redundancy, and high availability for VoIP networks. It begins with an outline and brief history of VoIP. It then covers proxy servers and highlights advantages like improved performance, security, flexibility, and most importantly redundancy and high availability through failure detection and rerouting. The document focuses on OpenSIPS, describing its features such as load balancing, signaling manipulation, and over 120 modules. It also addresses using OpenSIPS for distribution across redundant servers to ensure continuity of VoIP services.
Service Function Chaining in Openstack NeutronMichelle Holley
Service Function Chaining (SFC) uses software-defined networking (SDN) capabilities to create a service chain of connected network services (such as L4-7 like firewalls,
network address translation [NAT], intrusion protection) and connect them in a virtual chain. This capability can be used by network operators to set up suites or catalogs
of connected services that enable the use of a single network connection for many services, with different characteristics.
networking-sfc is a service plugin of Openstack neutron. The talk will go over the architecture, implementation, use-cases and latest enhancements to networking-sfc (the APIs and implementation to support service function chaining in neutron).
About the speaker: Farhad Sunavala is currently a principal architect/engineer working on Network Virtualization, Cloud service, and SDN technologies at Huawei Technology USA. He has led several wireless projects in Huawei including virtual EPC, service function chaining, etc. Prior to Huawei, he worked 17 years at Cisco. Farhad received his MS in Electrical and Computer Engineering from University of New Hampshire. His expertise includes L2/L3/L4 networking, Network Virtualization, SDN, Cloud Computing, and
mobile wireless networks. He holds several patents in platforms, virtualization, wireless, service-chaining and cloud computing. Farhad was a core member of networking-sfc.
This document discusses IPv6 only hosting and the challenges of moving to an IPv6-only infrastructure. It notes that IPv4 addresses are becoming scarce and expensive, leading to complicated overlay networks. IPv6 addresses are effectively unlimited and free in comparison. The document outlines steps taken to implement IPv6-only hosting, including NAT64 for outbound IPv4 access, inbound proxies, DHCPv6, and updates to monitoring, backup, and management services. It reports that roughly 5% of the company's servers are now IPv6-only.
This document provides an overview of containers and container networking. It begins with defining containers and their advantages over virtual machines. It then discusses the container ecosystem including key projects like Docker, CoreOS, and the Open Container Initiative. The document reviews container orchestration systems like Kubernetes, Docker Swarm, and Mesos. It concludes with a demo of OpenStack and containers and a discussion of containers on Cisco platforms.
The document discusses HP's involvement in network function virtualization (NFV) and their plans for Mobile World Congress 2015 in Barcelona. It outlines HP's OpenNFV program to support NFV transformation through an open reference architecture, NFV labs, and a partner program. It describes HP's numerous NFV partners and contributions to standards bodies like ETSI. It also provides details on HP's NFV demonstration plans for MWC2015, including showcasing virtualized mobile core network functions with partners.
This document provides a 12-step plan for enabling IPv6 in an Internet service provider (ISP) network. The steps include: 1) requesting IPv6 address space from registries; 2) auditing network equipment for IPv6 support; 3) training staff on IPv6; 4) enabling IPv6 with upstream providers; 5) updating security policies for IPv6; 6) monitoring IPv6 metrics; 7) developing an IPv6 addressing plan; 8) deploying IPv6 in the core network; 9) conducting IPv6 trials; 10) enabling IPv6 in the access network; 11) configuring IPv6 transition technologies; and 12) updating customer-premises equipment to support IPv6. The document compares
This document discusses performance-oriented design and what metrics should be measured. It emphasizes that performance is important and organizations should care about it. Key metrics that should be measured include arrival rate, service time, throughput, queues, method counts, response times, and other application and system-level metrics. References for further reading on performance engineering and capacity planning are also provided.
Blue Coat PacketShaper provides visibility and optimization of network applications through application classification, monitoring, quality of service controls, and compression. It automatically classifies network applications, monitors performance in real time, controls bandwidth with quality of service policies, and increases WAN capacity with compression. PacketShaper supports application delivery networks with deep application visibility and controls to optimize WAN performance.
Blue Coat PacketShaper provides visibility and optimization of network applications through application monitoring, traffic shaping, and compression. It automatically classifies network applications, provides quality-of-service controls, and increases WAN capacity. PacketShaper supports application delivery networks through deep application visibility and controls to optimize WAN performance.
The Real World - Plugging the Enterprise Into It (nodejs)Aman Kohli
This document discusses using Node.js as the foundation for building applications that connect the physical world to enterprise systems through mobile devices and sensors. It describes initial work done to build a proxy and protocol for handling requests and addresses challenges with authentication, scalability, and performance testing. The document shares results from benchmarking the system under different network conditions and outlines next steps to improve concurrency, security, and infrastructure elasticity.
Hadoop World 2011: BI on Hadoop in Financial Services - Stefan Grschupf, Data...Cloudera, Inc.
This session is designed for banking and other financial services managers with technical experience or engineers. It will discuss business intelligence platform deployments on Hadoop including cost performance, customer analytics, value-at-risk analytics and IT SLA’s.
Nonfunctional Testing: Examine the Other Side of the CoinTechWell
Creating a highly available, scalable, and high-performing system requires a substantial amount of what we call nonfunctional testing. Developing nonfunctional testing skills is a must for many of today’s quality engineers (QEs). For the past several years, Balaji Arunachalam’s quality team for Intuit Core Services has experienced several highly available and disaster recovery buildup and testing challenges. Their journey includes the evolution of functional QEs into hybrid QEs who are capable of doing both functional and nonfunctional testing. Nonfunctional testing includes capacity, stability, benchmarking, FMEA/RAS, datacenter failover, and scalability testing. Balaji shares nonfunctional testing best practices, learnings, and mistakes they encountered on this journey. If you or your team is ready flip the coin and take a serious look at nonfunctional testing methods, opportunities, challenges, and solutions, this session is for you.
Optimizing Performance of your Oracle Database using 8Gb Fibre ChannelEmulex Corporation
James Morle Oracle large-scale implementation specialist discusses keys to deploying 8Gb Fibre Channel using Oracle Database 11g Release 2 and Oracle Linux 6.2. The presentation will include and overview of the Oracle Architecture, how SAN performance can impact database performance, results of a Scale Abilities study comparing 8GFC to 4GFC HBAs.
This presentation will help you better understand:
- The Oracle Embedded Value Proposition
- The Oracle Service Bus (OSB) Value Proposition
- The Challenge Of The Extended Enterprise
- Introducing the OSB Appliance (OSBA)
From the Gaming Scalability event, June 2009 in London (http://gamingscalability.org).
Dave Felcey from Oracle will give an overview of Oracle Coherence and releted technologies, like JRockit Real-Time JVM, and discuss how they are being used to address some of the challenges their gaming customers face. In the gaming industry real-time updates and resilience are key. Getting price changes to users by caching data in memory and pushing real-time changes to clients using Coherence can provides a competitive edge and attracts new customers. Increasingly holding data in-memory and using the real-time tools are the only way sites can meet user expectations. However, ensuring in-memory data is resilient under load is also crucial, to protect against costly outages at key times. Dave will discuss the technical details and approaches that can be used to meet these requirements.
Server Day 2009: Oracle/Bea Fusion Middleware by Paolo RamassoJUG Genova
Paolo Ramasso presentation at the Application Server Day 2009, discussing the latest innovations in Oracle Fusion Middleware and Oracle/Bea Weblogic platforms
This document discusses Cisco and EMC solutions and Cisco Unified Computing System (UCS) storage features. Some key points:
- Cisco and EMC collaborate on converged infrastructure solutions like Vblock and joint application solutions for SAP HANA, Oracle databases, and data warehousing.
- UCS provides embedded automation of server, network, and storage configuration through service profiles. Storage features include virtual host bus adapters (vHBAs), two fabric interconnect storage modes (FC end-host and FC switching), and uplink port types.
- Cisco Validated Designs provide tested reference architectures for VSPEX private cloud and end user computing solutions scaled from 50 to 2000 VMs/desktops.
Effectively Plan for Your Move to the CloudPrecisely
Many companies using Power Systems running IBM i are looking to more some or all of their workloads to the cloud. Whether the motivation is to optimize their spending or allow for a more flexible consumption model, the cloud can provide unique opportunities to optimize their IBM i environment.
IBM Power Systems Virtual Server is one way to get the benefits of hybrid cloud, maintain the high performance of IBM Power Systems while modernizing at your pace and price point, on and off premises.
As companies move to a cloud environment, they need to consider the challenges of migrating their workload. Migrations always require detailed, coordinated planning and flawless execution. This is especially true today when downtime of any duration is completely unacceptable. So, above all other considerations, maintaining continuous uptime throughout the process is absolutely mandatory.
Watch this on-demand webinar to hear about:
• Benefits of a hybrid cloud approach for IBM i
• Ways the IBM Power VS can add value to your IBM i environment
• How to effectively scope and execute a migration to the cloud.
NTT has been using OpenStack in production since 2013 and has contributed significantly to the OpenStack community. Initially, NTT built a proprietary system on top of OpenStack to address issues around stability and operability. Over time, NTT shifted to an "upstream first" approach, contributing fixes and features to the community. Currently, NTT runs a highly available OpenStack deployment with features like VM high availability contributed back to the community. NTT continues working to integrate OpenStack further into its business and explore new use cases like NFV.
MBL303 Scalable Mobile and Web Apps - AWS re: Invent 2012Amazon Web Services
AWS offers an array of products and services to handle the unprecedented volumes of traffic, enormous user numbers and vast amounts of data being experienced by a successful mobile app that takes off. Learn how with new found agility and amazingly low time to market, these must-know best practices and techniques in the rapidly evolving and highly demanding mobile landscape can ensure success. Featuring Intuit's txtWeb architecture as a case study.
The document announces a seminar from IBM and Peanuts on Tivoli Storage Manager 6.4. The agenda includes presentations on IBM and Peanuts, new features in TSM 6.3 and 6.4 like deduplication and replication, new TSM reporting, TSM and virtualization, and a demonstration.
PLNOG15 :Assuring Performance, Scalability and Reliability in NFV Deployments...PROIDEA
This document discusses testing methodologies for Network Function Virtualization (NFV) deployments. It begins with an agenda that includes testing NFV, existing test tools, and new NFV test methodologies. It then discusses challenges in NFV testing like portability, performance trade-offs, and network stability. New PASS testing methodologies are proposed to evaluate performance, availability, security, and scale of NFV deployments. Both hardware-based and virtual machine-based testing approaches are described, along with their advantages and limitations. Specific NFV testing use cases are outlined, such as convergence testing, migration impact testing, and auto-scaling testing.
PLNOG15 :Assuring Performance, Scalability and Reliability in NFV Deployments...Marta Pacyga
This document discusses testing methodologies for Network Function Virtualization (NFV) deployments. It begins with an agenda that includes testing NFV, existing test tools, and new NFV test methodologies. It then discusses challenges in NFV testing like portability, performance trade-offs, and network stability. New PASS methodologies are proposed to test performance, availability, security, and scale of NFV. Finally, the document compares hardware-based and virtual machine-based testing approaches and some sample NFV test methodologies.
CA Spectrum® Just Keeps Getting Better and BetterCA Technologies
The CA Spectrum 10 release represented one of the most substantial releases for this solution in recent years. Join us for this session to explore some of the new features, such as the new web client for operators, software-defined network (SDN) support, wireless LAN controller and access point management, bi-directional integration with CA Unified Infrastructure Management, support for ModSecurity, and simplified reporting. This will be a combination of slides, demos and hands-on practice.
For more information, please visit http://cainc.to/Nv2VOe
Veloxum corporate introduction for crowdfunder may 29 2012Veloxum Corporation
Veloxum is a company founded in 2009 that actively and continuously optimizes existing server infrastructure and application settings to maximize workload density and reduce costs by up to 50%. Their product, Veloxum Automated Optimization, collects metrics across systems to solve performance and capacity issues by automatically calculating optimal values for hundreds of interrelated settings and continuously updating them. This improves performance of applications like Microsoft Exchange, SharePoint and SQL Server, increases server capacity by 30%, and enhances network throughput by 200-1300%.
This document discusses applications that can experience performance issues when virtualized due to expensive address translation costs. It describes how virtual machines require an additional level of memory virtualization that introduces shadow page tables or nested page tables to map guest virtual addresses to machine memory. While hardware-assisted virtualization reduces exit frequencies and overhead compared to software address translation, it also makes the translation lookup more expensive due to deeper page table walks. In rare cases with very poor memory locality and high translation miss rates, the cycle costs of the two-level address translation can significantly degrade application performance when virtualized.
Similar to COLO: COarse-grain LOck-stepping Virtual Machines for Non-stop Service (20)
Static partitioning is used to split an embedded system into multiple domains, each of them having access only to a portion of the hardware on the SoC. It is key to enable mixed-criticality scenarios, where a critical application, often based on a small RTOS, runs alongside a larger non-critical app, typically based on Linux. The two domains cannot interfere with each other.
This talk will explain how to use Xen for static partitioning. It will introduce dom0-less, a new Xen feature written for the purpose. Dom0-less allows multiple VMs to start at boot time directly from the Xen hypervisor, decreasing boot times drastically. It makes it very easy to partition the system without virtualization overhead. Dom0 becomes unnecessary.
This presentation will go into details on how to setup a Xen dom0-less system. It will show configuration examples and explain device assignment. The talk will discuss its implications for latency-sensitive and safety-critical environments.
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
Daniel Smith discusses TrenchBoot, a project aiming to establish a unified approach to harnessing boot integrity technologies across open source platforms. TrenchBoot will enable establishing hardware-rooted integrity during platform boot (first launch inspection), runtime (runtime inspection), and other states. For runtime inspection, TrenchBoot will develop a way to securely re-establish the integrity of Xen at any time without rebooting by dynamically launching an integrity kernel to inspect and verify Xen. The talk outlines the initial and future work of TrenchBoot to integrate these capabilities with Linux, Xen and other open source projects.
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
Artem will briefly cover what has been done since the first talk on Xen in Automotive domain back in 2013, what is going on now and what is still missing for broad adaptation of Xen in vehicles. The following topics will be covered:
Embedded/automotive features of Xen
Collaboration with AGL and GENIVI organizations for standardization
Efforts on Functional Safety compliance
Artem will also go over typical automotive use scenarios for Xen which may not be the same as generic computing use of hypervisor.
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
In this keynote talk, we will give an overview of the state of the Xen Project, trends that impact the project, see whether challenges that surfaced last year have been addressed and how we did it, and highlight new challenges and solutions for the coming year.
In recent years unikernels have shown immense performance potential (e.g., boot times of only a few ms, image sizes of only hundreds of KBs).The fundamental drawback of unikernels is that they require that applications be manually ported to the underlying minimalistic OS, needing both expert work and often considerable amount of time.
The Unikraft project provides a unikernel code base and build system that significantly simplifies the building of unikernels. In addition to support for a number CPU architectures, languages and frameworks, Unikraft provides debugging and tracing features that are generally sorely missing from unikernel projects. In this talk we will talk about these features, show a set of preliminary performance numbers, and provide a roadmap for the project's future.
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
The idea of making Xen secret-free has been floating since Spectre and Meltdown came into light. In this talk we will discuss what is being done and what needs to be done next.
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
This talk will introduce Dom0-less: a new way of using Xen to build mixed-criticality solutions. Dom0-less is a Xen feature that adds a novel approach to static partitioning based on virtualization. It allows multiple domains to start at boot time directly from the Xen hypervisor, decreasing boot times dramatically. Xen userspace tools, such as xl and libvirt, become optional.
Dom0-less extends the existing device tree based Xen boot protocol to cover information required by additional domains. Binaries, such as kernels and ramdisks, are loaded by the bootloader (u-boot) and advertised to Xen via new device tree bindings.
The audience will learn how to use Dom0-less to partition the system. Uboot and device tree configuration details will be explained to enable the audience to get the most out of this feature. The talk will include a status update and details on future plans.
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
As the number of contributions grow, reviewer bandwidth becomes a bottleneck; and maintainers are always asking for more help. However, ultimately maintainers must at least Ack every patch that goes in; so if you're not a maintainer, how can you contribute? Why should anyone care about your opinion?
This talk will try to lay out some advice and guidelines for non-maintainers, for how they can do code review in a way which will effectively reduce the load on maintainers when they do come to review a patch.
This talk is a follow-up to our Summit 2017 presentation in which we covered our plans for Intel VMFUNC and #VE, as well as related use-cases. This year, we will provide a report on what we have accomplished in Xen 4.12, and what remains to be addressed. We will also give a brief status update of VMI on AMD hardware. The session will end with some real-world numbers of the Hypervisor Introspection solution running on Citrix Hypervisor 8.0 with #VE enabled.
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. Besides technical and compliance issues (such as ISO 26262 vs IEC 611508) transitioning an existing project to become more easily safety certifiable requires significant changes to development practices within an open source project.
In this session, we will lay out some challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the Xen Project has followed thus far and highlight lessons learned along the way. The talk will primarily focus on necessary process, tooling changes and community challenges that can prevent progress. We will be offering an in-depth review of how Xen Project is approaching this challenging goal and try to derive lessons for other projects and contributors.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
This document summarizes a discussion around enabling functional safety certification for the Xen open source hypervisor project. Key points discussed include:
- Establishing a split development model with open and closed parts to balance community needs and safety requirements.
- Developing reference implementations and stacks supported by multiple vendors to demonstrate safety certification feasibility.
- Creating plans and processes around requirements, documentation, verification testing, and tooling integration to begin filling gaps for certification.
- Addressing challenges around funding, resources, expertise, and maintaining contributions to ensure any initial work is sustainable long-term.
- Taking an iterative, agile approach to make early progress while further securing necessary funding and support from interested parties.
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
2018 saw fundamental shifts in security boundaries which were previously taken for granted. A lot of work has been done in the past 2 years, and largely in secret under embargo, but there is plenty more work to be done to strengthen the existing mitigations and to try to recover some performance without reopening security holes.
This talk will look at speculative execution sidechannels, the work which has already been done to mitigate the security holes, and future work which hopes to bring some improvements.
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
The Arm architecture provides a set of guidelines that any software should abide by when accessing the memory with MMU off and update page-tables. Failing to do so may result in getting TLB conflicts or breaking coherency.
In a previous talk ("Keeping coherency on Arm"), we focused on updating safely the stage-2 (aka P2M) page-tables. This talk will focus on the boot code and Xen memory management.
During this session, we will introduce some of the guidelines and when they should be used. We will also discuss how Xen boot sequence needs to be reworked to avoid breaking the guidelines.
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
For many years the QEMU codebase has contained PV backends for Xen guests, giving them paravirtual access to storage, network, keyboard, mouse, etc. however these backends have not been configurable as QEMU devices as their implementation did not fully adhere to the QEMU Object Model (QOM).
Particularly the PV storage backend not using proper QOM devices, or qdevs, meant that the QEMU block layer needed to maintain legacy code that was cluttering up the source. This was causing push-back from the maintainers who did not want to accept any patches relating to that Xen backend until it was 'qdevified'.
In this talk, I'll explain the modifications I made to QEMU to achieve 'qdevification' of the PV storage backend, how compatibility with the libxl toolstack was maintained, and what the next steps in both QEMU and libxl development should be.
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
PCI is a local computer bus for attaching hardware devices in a computer, and is the main peripheral bus on modern x86 systems. As such, having a proper way to emulate it is crucial for Xen to be able to expose both fully emulated devices or passthrough devices to guests.
This talk will focus on the current status of PCI emulation in Xen, how and where it is used, what are its main limitations and future plans to improve it in order to be more robust and modular.
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
Volodymyr will speak about TEE mediators. This is a new feature in Xen which allows multiple virtual machines to interact with Trusted Execution Environment available on platform. He developed mediator for one of TEEs, namely OP-TEE.
He will give background information on why TEE is needed at all and share some implementation details.
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
Xen is a very powerful hypervisor with a talented and diverse developers community. Despite the fact it's almost everywhere (from the Cloud to the embedded world), it can be difficult to set up and manage as a system administrator. General purpose distros have Xen packages, but that's just a start in your Xen journey: you need some tooling and knowledge to have a working and scalable platform.
XCP-ng was built to overcome those issues: by bringing Xen to the masses with a fully turnkey distro with Xen as its core. It's the logical sequel to the XCP project, with a community focus from the start. We'll see how it happened, what we did, and what's next. Finally, we'll see the impact of XCP-ng on the Xen Project.
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
Doug has long advocated for more CI/CD (Continuous Integration / Continuous Delivery) processes to be adopted by the Xen Project from the use of Travis CI and now GitLab CI. This talk aims to propose ideas for building upon the existing process and transforming the development process to provide users a higher quality with each release by the Xen Project.
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
High level toolstacks for server and cloud virtualization are very mature with large communities using and supporting them. Client virtualization is a much more niche community with unique requirements when compared to those found in the server space. In this talk, we’ll introduce a client virtualization toolstack for Xen (redctl) that we are using in Redfield, a new open-source client virtualization distribution that builds upon the work done by the greater virtualization and Linux communities. We will present a case for maturing libxl’s Go bindings and discuss what advantages Go has to offer for high level toolstacks, including in the server space.
Today Xen is scheduling guest virtual cpus on all available physical cpus independently from each other. Recent security issues on modern processors (e.g. L1TF) require to turn off hyperthreading for best security in order to avoid leaking information from one hyperthread to the other. One way to avoid having to turn off hyperthreading is to only ever schedule virtual cpus of the same guest on one physical core at the same time. This is called core scheduling.
This presentation shows results from the effort to implement core scheduling in the Xen hypervisor. The basic modifications in Xen are presented and performance numbers with core scheduling active are shown.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
4. Non-Stop Service with VM Replication
• Typical Non-stop Service Requires
– Expensive hardware for redundancy
– Extensive software customization
• VM Replication: Cheap Application-agnostic Solution
Software & Services Group
4
5. Existing VM Replication Approaches
• Replication Per Instruction: Lock-stepping
– Execute in parallel for deterministic instructions
– Lock and step for un-deterministic instructions
• Replication Per Epoch: Continuous Checkpoint
– Secondary VM is synchronized with Primary VM per
epoch
– Output is buffered within an epoch
Software & Services Group
5
6. Problems
• Lock-stepping
– Excessive replication overhead
• memory access in an MP-guest is un-deterministic
• Continuous Checkpoint
– Extra network latency
– Excessive VM checkpoint overhead
Software & Services Group
6
8. Why COarse-grain LOck-stepping (COLO)
• VM Replication is an overly strong condition
– Why we care about the VM state ?
• The client care about response only
– Can the control failover without ”precise VM state
replication”?
• Coarse-grain lock-stepping VMs
– Secondary VM is a replica, as if it can generate same
response with primary so far
• Be able to failover without service stop
Non-stop service focus on server response, not internal machine state!
Software & Services Group
8
9. How COLO Works
• Response Model for C/S System
– & are the request and the execution result of
an un-deterministic instruction
– Each response packet from the equation is a
semantics response
• Successfully failover at kth packet if
(C is the packet series the client received)
Software & Services Group
9
10. Architecture of COLO
COarse-grain LOck-stepping Virtual Machine for Non-stop Service
Software & Services Group
10
11. Why Better
• Comparing with Continuous VM checkpoint
– No buffering-introduced latency
– Less checkpoint frequency
• On demand vs. periodic
• Comparing with lock-stepping
– Eliminate excessive overhead of un-deterministic
instruction execution due to MP-guest memory
access
Software & Services Group
11
13. Performance Challenges
• Frequency of Checkpoint
– Highly dependent on the Output Similarity, or
Response Similarity
• Key Focus is TCP packet!
• Cost of Checkpoint
– Xen/Remus uses passive-checkpoint
• Secondary VM is not resumed until failover Slow path
– COLO implements active-checkpoint
• Secondary VM resumes frequently
Software & Services Group
13
14. Improving Response Similarity
• Minor Modification to Guest TCP/IP Stack
– Coarse Grain Time Stamp
– Highly-deterministic ACK mechanism
– Coarse Grain Notification Window Size
– Per-Connection Comparison
Software & Services Group
14
15. Similarities after Optimization
• Web Server • FTP Server
Packets # Duration Packets # Duration
16000 600 4000 400
500
12000
3000 300
400
Number of Packets
Time (ms)
Time (ms)
Packets #
8000 300
2000 200
200
4000
100 1000 100
0 0
1 2 4 8 16 32
0 0
Number of Threads
PUT GET
*Run Web Bench in Client
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
15
16. Reducing the Cost of Active-checkpoint
• Lazy Device State Update
– Lazy network interface up/down
– Lazy event channel up/down
• Fast Path Communication
Software & Services Group
16
17. Checkpoint Cost with Optimizations
Leave Net UP
Suspend Resume Netif-Up Netif-Down Mem Xmit
Leave EventChannel up
1800
1500
Replace
XenStore
1200 Access with
Spent Time (ms)
Eventchannel
900
600
300
0
Baseline Lazy Netif Lazy Event Channel Efficient Comm.
Final cost: 74ms/checkpoint: (1/3 on page transmission, 2/3 on suspend/resume)
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
17
19. Configurations
• Hardware
– Intel® Core™ i7 platform, a 2.8 GHz quad-core
processor
– 2GB RAM
– Intel® 82576 1Gbps NIC * 2 (internal & external)
• Software
– Xen 4.1
– Domain 0: RHEL5U5
– Guest: 32-bit BusyBox 1.20.0, Linux kernel 2.6.32
• 256MB RAM and uses a ramdisk for storage
Software & Services Group
19
20. Bandwidth of NetPerf
Native Remus-20ms Remus-40ms COLO Native Remus-20ms Remus-40ms COLO
1000 1000
800 800
Bandwidth (Mb/s)
Bandwidth (Mb/s)
600 600
400 400
200 200
0 0
54 1500 64K 54 1500 64K
Message Size Message Size
TCP UDP
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
20
21. FTP Server
128
64
32
16
Remus-20ms
Time (s)
Remus-40ms
8
COLO
Native
4
2
1
PUT GET
0.5
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
21
22. Web Server - Concurrency
Native Remus-20ms Remus-40ms COLO
1000
100
Throughput (Mbps)
10
1
1 2 4 8 16 32
Threads
Run Web Bench in Client
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
22
23. Web Server - Throughput
Native Remus-20ms Remus-40ms COLO
1200
1000
Throughput (response/s)
800
600
400
200
0
100 500 1000 1500
Request / second
Run httperf in Client
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
23
24. Latency in Netperf/Ping
40
30
Average Latency (ms)
Native
20 Remus-20ms
Remus-40ms
COLO
10
0.28 0.40 0.28 0.4 0.38 0.55
0
Netperf-TCP-RR Netperf-UDP-RR Ping
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
24
25. Web Server - Latency
Native Remus-20ms Remus-40ms COLO
1200
1000
Response Latency (ms)
800
600
400
200
0
100 500 1000 1500
Request/second
Run httperf in Client
For more complete information about performance and benchmark results, visit Performance Test Disclosure
Software & Services Group
25
27. Summary
• COLO is an ideal Application-agnostic Solution
for Non-stop service
– Web server: 67% of native performance
– CPU, memory and netperf: near-native performance
• Next steps:
– Merge into Xen
– More optimizations
Software & Services Group
27