The Kollective SD ECDN is a software-defined content delivery network that uses a small agent deployed on employee devices and cloud-hosted servers to form an adaptive distributed content caching and delivery system. It addresses challenges of large enterprise networks by caching and delivering upwards of 90% of content via local "east-west" traffic rather than congesting long-distance "north-south" links. Key benefits include low cost with no additional hardware, minimal deployment effort, automatic adaptation to network changes, and centralized management and control through software.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
Kerberos is a computer network authentication protocol which works on the basis of 'tickets' to allow
nodes communicating over a non-secure network to prove their identity to one another in a secure
manner. Its designers aimed it primarily at a client–server model and it provides mutual
authentication—both the user and the server verify each other's identity. Kerberos protocol messages
are protected against eavesdropping and replay attacks.
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
Kerberos is a computer network authentication protocol which works on the basis of 'tickets' to allow
nodes communicating over a non-secure network to prove their identity to one another in a secure
manner. Its designers aimed it primarily at a client–server model and it provides mutual
authentication—both the user and the server verify each other's identity. Kerberos protocol messages
are protected against eavesdropping and replay attacks.
Even though the U.S. Department of Defense budget is shrinking and the country's military footprint worldwide is receding the need for the warfighter to have accurate and actionable intelligence has never been more critical. Data from Intelligence, Surveillance, and Reconnaissance (C4ISR) systems such as radar, image processing payloads on Unmanned Aerial Vehicles, and more will be used and fused together to provide commanders with real-time situational awareness. Each system will also need to embrace open architectures and the latest commercial standards to meet the DoD's performance, size, and cost requirements. This e-cast will discuss how embedded defense suppliers are meeting these challenges.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
View On-Demand: http://ecast.opensystemsmedia.com/369
To dramatically reduce defense costs, Open Architecture (OA) offers a vision of complex systems of systems built from composable, replaceable modules.
From its origins with the Navy's OA program for ship systems nearly 10 years ago, this design philosophy is spreading to military programs worldwide, including the the Future Architecture Computing Environment (FACE) for avionics, the Unmanned Air Segment Control Segment (UCS) for ground stations, the Army's Common Operating Environment (COE) and the UK's Generic Vehicle Architecture (GVA). These programs are defining technology and acquisition policy for the next generation of defense systems.
Overview of Network Programming, Remote Procedure Calls, Remote Method Invocation, Message Oriented Communication, and web services in distributed systems
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
This paper focuses on a specific real-world use case for SDN - the Software-Defined Data Center. It provides Avaya’s perspective on the characteristics of the Software-Defined Data Center and the value of its Fabric Connect technology as the foundation for this solution. It also talks about how combining Avaya Fabric Connect with open-source cloud orchestration capabilities (that are being defined by OpenStack) can enable a graceful migration to the Software-Defined Data Center.
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
We realize an open, programmable paradigm for application-driven network control by way of a novel network plane — the “service plane” — layered above legacy networks. The service plane bridges domains, establishes trust, and exposes control to credited users/applications while preventing unauthorized access and resource theft. The Authentication, Authorization, Accounting subsystem and the Dynamic Resource Allocation Controller are the two defining building blocks of our service plane. In concert, they act upon an interconnection request or a restoration request according to application requirements, security credentials, and domain-resident policy. We have experimented with such service
plane in an optical, large-scale testbed featuring two hubs (NetherLight in Amsterdam, StarLight in Chicago) and attached network clouds, each representing an independent domain. The dynamic interconnection of the heterogeneous domains occurred at Layer 1. The interconnections ultimately resulted in an optical end-to-end path (lightpath) for use by the
requesting Grid application.
Even though the U.S. Department of Defense budget is shrinking and the country's military footprint worldwide is receding the need for the warfighter to have accurate and actionable intelligence has never been more critical. Data from Intelligence, Surveillance, and Reconnaissance (C4ISR) systems such as radar, image processing payloads on Unmanned Aerial Vehicles, and more will be used and fused together to provide commanders with real-time situational awareness. Each system will also need to embrace open architectures and the latest commercial standards to meet the DoD's performance, size, and cost requirements. This e-cast will discuss how embedded defense suppliers are meeting these challenges.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
View On-Demand: http://ecast.opensystemsmedia.com/369
To dramatically reduce defense costs, Open Architecture (OA) offers a vision of complex systems of systems built from composable, replaceable modules.
From its origins with the Navy's OA program for ship systems nearly 10 years ago, this design philosophy is spreading to military programs worldwide, including the the Future Architecture Computing Environment (FACE) for avionics, the Unmanned Air Segment Control Segment (UCS) for ground stations, the Army's Common Operating Environment (COE) and the UK's Generic Vehicle Architecture (GVA). These programs are defining technology and acquisition policy for the next generation of defense systems.
Overview of Network Programming, Remote Procedure Calls, Remote Method Invocation, Message Oriented Communication, and web services in distributed systems
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
This paper focuses on a specific real-world use case for SDN - the Software-Defined Data Center. It provides Avaya’s perspective on the characteristics of the Software-Defined Data Center and the value of its Fabric Connect technology as the foundation for this solution. It also talks about how combining Avaya Fabric Connect with open-source cloud orchestration capabilities (that are being defined by OpenStack) can enable a graceful migration to the Software-Defined Data Center.
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
We realize an open, programmable paradigm for application-driven network control by way of a novel network plane — the “service plane” — layered above legacy networks. The service plane bridges domains, establishes trust, and exposes control to credited users/applications while preventing unauthorized access and resource theft. The Authentication, Authorization, Accounting subsystem and the Dynamic Resource Allocation Controller are the two defining building blocks of our service plane. In concert, they act upon an interconnection request or a restoration request according to application requirements, security credentials, and domain-resident policy. We have experimented with such service
plane in an optical, large-scale testbed featuring two hubs (NetherLight in Amsterdam, StarLight in Chicago) and attached network clouds, each representing an independent domain. The dynamic interconnection of the heterogeneous domains occurred at Layer 1. The interconnections ultimately resulted in an optical end-to-end path (lightpath) for use by the
requesting Grid application.
The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
What is Cloud Computing
virtualization
Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking resources from a centralized third-party provider using Wide Area Networking (WAN) or Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing resources are shared for customers or clients. In cloud networking, the network can be shared as well as the computing resources. It has spurred a trend of pushing more network management functions into the cloud, so that fewer customer devices are needed to manage the network.
Stuart Elby
VP, Network Architecture & Technology
Verizon
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
35 content distribution with dynamic migration of services for minimum cost u...INFOGAIN PUBLICATION
Content Delivery Networks are the key for today’s internet content delivery. Users are knowingly or unknowingly accessing the CDN via internet. No matter how much the data retrieved by the user it may contain the CDN hand behind every character of text and every pixel of image. CDN came into existence to solve the delay problem. The moment when a user requests for a web page and the response delivered to the corresponding users web browser facing a huge delay. The main goal of this paper is content distribution of web services to multiple data centers placed in different geographical locations and providing security. A content distribution service is a major part of popular Internet applications. In proposed system hybrid clouds are used i.e., both private cloud as well as public cloud. One data center is allocated to each region. Providing security to the data is always an important issue because of the critical nature of the cloud and very large amount of complicated data it carries. To provide security cipher text policy algorithm is used. Authentication technique is used to verify the user authentication. If the user is authorized to access services then and only he receives configuration key to use.
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
Chapter 11 Selecting Technologies and Devices for Enterprise Networks This chapter presents technologies for the remote-access and wide-area network (WAN) components of an enterprise network design. The chapter discusses physical and data link layer protocols and enterprise network devices, such as remote-access servers, routers, firewalls, and virtual private network (VPN) concentrators. The chapter begins with a discussion of the following remote-access technologies: Point-to-Point Protocol (PPP) Cable modems Digital subscriber line (DSL) After discussing remote-access technologies, the chapter presents options for selecting WAN and remote-access capacities with the North American Digital Hierarchy, the European E system, or the Synchronous Digital Hierarchy (SDH). The chapter continues with a discussion of the following WAN technologies: Leased lines Synchronous Optical Network (SONET) Frame Relay Asynchronous Transfer Mode (ATM) Metro Ethernet The chapter then covers two topics that will help you complete your WAN design: Selecting routers for an enterprise WAN design Selecting a WAN service provider The chapter concludes with an example of a WAN network design that was developed for a medium-sized company, Klamath Paper Products, Inc. The example indicates what technologies and devices were chosen for this customer based on the customer’s goals. The technologies and devices you select for your particular network design customer will depend on bandwidth and quality of service (QoS) requirements, the network topology, business requirements and constraints, and technical goals (such as scalability, affordability, performance, and availability). An analysis of traffic flow and load, as discussed in Chapter 4, “Characterizing Network Traffic,” can help you accurately select capacities and devices. For some organizations, scalability is a key design goal. The selected WAN solution must have enough headroom for growth. As discussed in this chapter, some WAN technologies are more scalable than others. Another key design goal for many organizations is to minimize the cost of WAN and remote-access circuits. Optimization techniques that reduce costs play an important role in most WAN and remote-access designs. Methods for merging separate voice, video, and data networks into a combined, cost-effective WAN also play an important role. These methods must handle the diverse QoS requirements of different applications. Remote-Access Technologies As organizations have become more mobile and geographically dispersed, remote-access technologies have become an important ingredient of many enterprise network designs. Enterprises use remote-access technologies to provide network access to telecommuters, employees in remote offices, and mobile workers who travel. An analysis of the location of user communities and their applications should form the basis of your remote-access design. It is important to recognize the location and number of full- and part-time t.
1. THE KOLLECTIVE SOFTWARE DEFINED ENTERPRISE CONTENT DELIVERY
NETWORK is a robust infrastructure component for secure and efficient content delivery
over large corporate networks.
It is a software-based network that orchestrates both an enterprise’s network infrastructure
and its end-user devices into an adaptive, continuously optimizing, fully distributed content
cache and delivery system. Its formation and operation are fully software-defined, providing
the flexibility, agility and central control commonly afforded by software-defined systems.
THE CORPORATE NETWORK CHALLENGE
The typical deployment context for the Kollective SD ECDN is a large, multi-national
corporation with a globally distributed workforce depending on a substantial but
heterogeneous corporate network. The diagram below is representative of this concept:
a high-capacity corporate backbone in the home country with lower capacity in-country
backbones and links to branch offices, fanning out to sometimes often very low-bandwidth
WAN links in remote offices.
The Kollective SD ECDN
How it Works
Large Enterprise WAN
Corporate
Backbone
Country
Backbones
RemoteOffices
Remote
Offices
Caching Appliances
High-traffic
Use-Cases
2. As more and more business functions become IP-based, demands on a corporate network’s
capacity increase to the point where it becomes a constraining and contested resource. Some
use cases that are particularly problematic include: the release of a new training video on
an internal portal that will be in high demand in the branch offices, or an important all-hands
webcast from the CEO. These generate substantial “north-south” traffic, from the backbones
out to the edge, which can easily result in saturated WAN links and the disruption of critical
business functions. These practices are often either banned outright, or require the purchase
and deployment of many expensive hardware caches, WAN optimizers, streaming-server
repeaters and other devices to reduce this north-south traffic over congested WAN links.
THE KOLLECTIVE DIFFERENCE: UNIQUE AND EFFICIENT
SOFTWARE DELIVERY
The Kollective SD ECDN addresses these content-delivery challenges entirely with software,
leveraging existing network infrastructure, as well as latent but generally unused capacity
in the broader infrastructure, notably storage and serving bandwidth on end-user devices,
to easily handle these cases. The SD ECDN is a set of Kollective-managed, cloud-hosted
control and origin servers and a small software agent deployed on employee devices
throughout the company, as shown below.
Kollective ECDN
Corporate
Backbone
Country
Backbones
RemoteOffices
Remote
Offices
Kollective Software Agents
Pub
DirOrigin
3. The central servers and the agents collectively form an adaptive, distributed content
delivery and caching system such that upwards of 90% of content delivered is via controlled,
localized, east-west traffic that doesn’t congest WAN links. All of these software components
cooperate to deliver content, secure it via a multi-layered crypto framework, and form an
optimal delivery overlay mesh that dynamically adapts to network changes. All aspects of its
operation are software-defined.
KOLLECTIVE SD ECDN BENEFITS
Econonomical – No additional hardware needs to be purchased, deployed, managed or
upgraded; the capital and operational cost savings are significant.
Minimal Deployment – Only the small client agent needs to be deployed within the
enterprise, typically via a desktop-management system. This is much simpler than
deploying distributed hardware solutions and can often be accomplished in a matter of days.
Adaptive Network – Automatically and dynamically adjusts to changes in traffic patterns
and physical changes in the underlying network.
Self-scaling – Particularly for the high-impact use cases mentioned – the more
requestors for content there are, the more resources are available for distributing
the load.
Self-healing – If a node stops serving, others take over automatically as necessary.
Smart Agent – Enables capabilities such as background push delivery and live-event
readiness testing, as well as future network edge monitoring & control applications.
Centrally Controlled – Being an SD-ECDN, all operational aspects are managed through
a central software controller.
THE KOLLECTIVE SD-ECDN IN OPERATION
Trust establishment
Once the agents are deployed and activated, they perform a lightweight discovery process,
first contacting the central SD ECDN control servers to establish a trust framework based on
1032 bit X.509 certificates. Every node in the network, along with each central server and
end-user device, is allocated a unique certificate containing a PKI key-pair, the public key of
4. which is used as the node’s main identifier within the network. All messages sent between
nodes are signed by the sender and encrypted for the receiver using these cert keys. The
central server nodes’ certs are signed by the Kollective certificate-authority, thus assigning to
them authoritative, system-server status. By leveraging this trust framework, there is no way
to introduce malicious commands or content.
Topology Discovery
The agents then perform a configurable sequence of topology discovery probes, including
a traceroute to the central servers, gateway router and local NIC inspection, and LAN or
subnet broadcasts or multicasts. The results are sent to the central controller so that it can
build a global topology graph. The agent also keeps this information locally so that it knows
its own neighborhood. This discovery process is repeated whenever a device restarts so that
any changes can be noted.
In addition to this startup process, each node, from time-to-time, sends a status report to
the central servers containing the latest topology discoveries, available content listings and
various delivery and network metrics, all of which help with the formation of optimal delivery
paths during actual delivery.
Content Publishing
The Kollective SD ECDN is a fully-managed ECDN, meaning all content publishing and live
event scheduling is authenticated and secure. A user authorized for publishing connects to
the SD ECDN through one of a number of content-management portals or APIs and can then
perform several tasks, such as:
Creating a logical content item that can be associated with one or more physical files or
streaming sources, typically as alternative formats, or sizes, or bitrates so that the
consuming client agent can pick the best format for its local context.
Adding descriptive metadata or portal-specific structure such as text descriptions,
thumbnails, keyframes, channel location, and more.
Defining content subscriptions and feeds that enable automatic background downloads
Defining availability date ranges or live event schedules.
Setting up end-user access controls; Kollective has a sophisticated content security
system that integrates with the enterprise’s own identity services.
5. Content items are assigned a unique location-independent GUID that can be embedded in
the SD ECDN URLs, commonly made available to users as clickable items in a content portal.
Content data itself is ingested into the SD ECDN in a number of ways, including HTTPS
upload for static files or push/pull stream endpoints for live streams. Depending on ingest
mode and publisher instructions, the content data may be transcoded, virus-scanned and
encrypted, and in all cases has a set of data-block cryptographic digests created that will be
used later during delivery to validate content as it arrives at a receiver.
End-user Authentication and Content Requests
In most cases, content stored in the Kollective SD ECDN is access-controlled and requires
end-user authentication to make it available for delivery. The SD ECDN provides a number
of authentication modes, including simple username & password and several single sign-on
schemes that can interface to an enterprise’s authentication system over protocols such as
LDAP and SAML. Once authenticated, the SD ECDN generates a time-limited token for the
user that securely encodes the user’s credentials and group membership.
Content can be requested explicitly, by presenting a content URL to the agent’s localhost
HTTP or RTMP server by clicking on a link in a content portal, or implicitly if the user
has subscribed to content feeds or subscriptions. In the latter case, the agent manages
subscriptions automatically in the background, downloading content under the control of
the subscription publisher’s policies, making it available either in a local directory or via the
agent’s localhost server using the content item’s localhost URL.
In both cases, the user’s authentication token and the content GUID are first presented
by the agent to a system server that checks access rights and returns encrypted content
metadata, block digests and a secret download ticket. This download ticket is used to
securely request content fragments from other nodes in the network during delivery and the
block digests are used to validate the fragments as they arrive.
6. Delivery-mesh Formation and Content Delivery
The Kollective network uses a proprietary protocol, known as Kollective Delivery Protocol
(KDP), that is specifically designed for distributed delivery and built from the ground-up on a
PKI security model. It can be carried over UDP, TCP or HTTP, and will automatically choose
the best carrier for a given context. The UDP-based version is particularly efficient and
supports software-defined quality-of-service settings using its adjustable congestion-control
capabilities.
In general, an agent requesting delivery will attempt to get different fragments of a content
item in parallel from as many nodes in the network with the content as it can find, subject to
software-defined topology boundaries, connection limits and bandwidth caps, thus bonding
the bandwidths of the available servers to speed up delivery.
To find available source nodes, the agent begins a source-discovery process that will be
repeated during delivery to adapt dynamically to network and resource changes. As more
nodes request the same content, a delivery mesh emerges with nodes collectively pipelining,
caching and serving various parts of the content for one another. It is the essential value of the
Kollective ECDN that this process adaptively seeks an optimal mesh, maximizing local, east-
west traffic and effective serving bandwidth, while minimizing north-south, WAN link traffic.
The mesh formation is a cooperative process between the central directory servers and
agents. The directory servers have a soft, global view of network topology and content
disposition based on content request history and the periodic readiness-reports sent by the
agents. The requesting nodes continuously discover and evaluate sources by:
1. Getting a list of candidate sources from directory servers prioritized by proximity and
other metrics,
2. Sending and receiving local content-discovery broadcasts or multicasts,
3. Receiving content requests from other nodes
Each node rotates through its prioritized sources, making multiple concurrent connections,
discarding poor sources, and re-engaging source discovery as needed, all under the control
of software-defined formation policies, such as LAN-focusing, topology boundaries rules,
throttling rules, and so on.
7. Serving requests are only honored if the requestor supplies a valid delivery ticket, which is
obscured to prevent ticket hijacking by hashing it against the requesting node’s ID. Received
content is accepted only if it passes block-digest tests. Content data blocks sent between
nodes are encrypted using unique, ephemeral 128 bit symmetric keys that node pairs
establish on connection.
The Kollective SD ECDN supports a range of delivery modes and will tune policies for mesh-
formation, block requests and traffic-control to best suit each mode.
Background File Download
Requesting nodes choose random blocks to download so they can cross-serve one-another
to reduce load on origin-servers and WAN links. The KDP software QoS controls are adjusted
to make background download traffic deferential to all other network traffic, effectively
making the download soak up idle bandwidth. Subscription-based downloads can be
scheduled to run during off-peak periods. Agents detect user activity and will politely throttle
CPU and bandwidth use, so as not to interfere with foreground tasks on the device.
Video-on-demand Streaming
During video stream playback, blocks in the buffering region ahead of the playhead is
requested to ensure smooth playback, falling back to random block requests if the buffer is
well filled. QoS levels are typically set to compete fairly with other traffic.
Live Event Streaming
All viewing nodes effectively want the same portions of the stream at the same time and so
nodes within a locality cooperate to elect a well-performing lead node that will get a single
copy of the stream across the WAN link and then pipeline it out though a mesh formed
from the other local nodes. The leader-node election itself is adaptive and leadership can
be handed off to better performing nodes on- the-fly during an event. QoS is set high for
important live events to ensure smooth event viewing.
8. Reporting and Analytics
All nodes make periodic reports to a central analytics system containing delivery event
details, local loading and serving metrics, video playback stats and data about other delivery-
related activity. This allows the Kollective SD ECDN analytics reports to be produced both on
content delivery and use, as well as network efficiencies and performance.
KOLLECTIVE SD ECDN ARCHITECTURE AND KEY
COMPONENTS
The Kollective SD ECDN architecture exhibits a classical three-layer SD structure:
1. An Applicaton Layer comprising management, analytics and content applications, all
built on a set of north-bound APIs provided by the second layer.
2. A Control Layer that centrally orchestrates and manages the network. It provides the
high-level API for the application layer and uses a common set of south-bound protocols
to manage the third layer.
3. A Data Layer comprising all the components that will be used to form the SD ECDN’s
network - a small number of central, cloud-based Kollective head-end servers, the
existing corporate network itself, plus the end-user devices running the Kollective agent.
ECDN Controller
Kollective Software-Defined Network
Management API
ECDN Optimization &
Diagnostics Apps
ECDN Management &
Control Apps
Content Apps,
Kontiki Enterprise
Video Platform
3rd-Party Integrations
(SCCM, Lync, SharePoint,
Chatter)
Application API
SECURITY FRAMEWORK
Enterprise
Identity
System
Control Layer
(Cloud)
Data Layer
(Software)
App Layer
(Cloud)
9. The top two layers, Application and Control, and portions of the Data layer are hosted in the
Kollective Cloud providing a fully-managed SaaS solution, only the Kollective client agent
needs to be deployed on end-user devices within the enterprise.
The Application Layer contains:
Management and control applications are used to manage and monitor SD ECDN
operation and orchestrate per-enterprise network policies and operational rules. There
are over 250 software controlled parameters covering these policies and rules, ranging
from protocol and port preferences, through hierarchical location and device group
definitions, in order to provide full control of network formation and traffic patterns, as
well as bandwidth, disk and CPU use caps for individual end-user devices.
Delivery monitoring and readiness-testing applications providing exhaustive pre-flight
and post-flight analytics. The network readiness testing applications are a unique
aspect of the Kollective SD ECDN, taking advantage of the deployed agents to perform
automatic and invisible delivery testing. This provides crucial feedback and operational
confidence prior to an important delivery event, such as a live CEO webcast.
Content-specific applications that provide user-focused capabilities for various
content-delivery use cases and leverage the unique delivery capabilities of the
Kollective SD ECDN. The available applications include a suite of video-centric solutions
offered by Kontiki, a Kollective company:
o Kontiki MediaCenter – a feature-rich, fully customizable video portal platform used by
customers to build enterprise enterprise intranet YouTubes.
o Kontiki Webcaster – an easy-to-use webcasting platform that can be set up and run
by individual departments but that can use the Kollective SD ECDN’s live-streaming
capabilities to broadcast webcasts to thousands of concurrent viewers across
the enterprise.
10. The Control Layer contains:
Network directory servers that keep track of the delivery network topology and content
disposition within the network. They provide key delivery-mesh formation intelligence to
the network as a whole.
Agent controllers that monitor and manage the agents, pushing any client-specific
software-defined network controls out to the agents, managing automated subscription
and targeted deliveries and assisting the network readiness-test system in orchestrating
agent test sets and runs.
A Content Management System that provides fully authenticated content ingest,
transcoding, encryption, metadata and access controls. This system integrates with an
enterprise’s authentication servers to provide enterprise directory-compliant content
access controls.
Live video stream ingest endpoints that can operate in either push or pull mode with
external encoders or other live video streams, conditioning and directing the streams for
delivery out through the ECDN.
Network readiness-test managers that are used to set up and monitor pre-flight
readiness tests. These allow various kinds of delivery events to be tested using explicitly
selected sets or statistically sampled sets of end-user devices.
SD ECDN status and monitoring servers that take in constant status and monitoring
data from all the components, enabling monitoring and analytics services. They take in
delivery event and network performance data from each agent, providing both for a
global view of the network’s operations, as well as content usage analytics for content
creators.
The Data Layer contains:
Delivery network origin servers, hosted in the Kollective Cloud. They contain the
source copies of any on-demand content and originate all live streams delivered through
the SD ECDN. Kollective’s delivery-mesh formation algorithms work to minimize traffic
from the origins, which usually act as single-copy originating sources for delivery meshes
that form from agents within the corporate network itself, or as guaranteed copies of last
resort if needed.
Kollective agents running silently in the background on enterprise end-user devices and
desktops. They cooperate with control layer components, the origin servers, and with
one another to form the adaptive, distributed delivery network and edge cache.
11. SUMMARY AND KEY BENEFITS
The Kollective SD ECDN offers an end to end delivery solution for video, software and other
massive files. It’s built to be used today but in the future the type of content and supported
applications will continue to expand.
Benefits Summary:
Kollective Solves the Biggest Network Challenges in the Enterprise
Stream a high quality, live video All Hands to all employees reliably, without impacting
the network.
Video-enable enterprise applications, like SharePoint or the corporate intranet with
thousands of videos managed centrally in one platform.
Move enormous files around your network with ease. Have a 4GB Microsoft Office
Update that needs to go to all employees in India? No problem.
Kollective Surpasses Enterprise Expectations by Utilizing Breakthrough Technology
Software Defined Technology - Kollective’s SD ECDN acts as an intelligent network
Every computer is a content server.
Control Layer – Network becomes highly configurable: characteristics of the network
functions are configured via software to determine the key attributes of the network’s
function.
Adaptive Response – Guaranteed most efficient, timely, and complete delivery;
dynamically redistributes load based on network changes within the guidelines set by the
Kollective Controller.