Class lecture by Prof. Raj Jain on Storage Virtualization. The talk covers Disk Arrays, Data Access Methods, SCSI (Small Computer System Interface), Advanced Technology Attachment (ATA), ESCON and FICON, Fibre Chanel, Fibre Channel Devices, Fibre Channel Protocol Layers, Fibre Channel Flow Control, Fibre Channel Classes of Service, What is Storage Virtualization?, Benefits of Storage Virtualization, Virtualizing Storage, RAID Levels, Nested RAIDs, Synchronous vs. Asynchronous Replication, Virtual Storage Area Network (VSAN), Physical Storage Network, Virtual Storage Network, SAN vs. NAS, iSCSI (Internet Small Computer System Interface), iFCP (Internet Fiber Channel Protocol), FCIP (Fibre Channel over IP), FCoE (Fibre Channel over Ethernet), Virtual File Systems. Video recording available in YouTube.
The document discusses the differences between network attached storage (NAS) and storage area network (SAN) solutions for small businesses. It outlines the key benefits and use cases of each technology. NAS is best for file sharing and backup, while SAN provides faster performance for databases and applications. The document also notes that a combination of NAS and SAN can provide the best of both worlds.
This document provides an overview of various data storage technologies including RAID, DAS, NAS, and SAN. It discusses RAID levels like RAID 0, 1, 5 which provide data striping and redundancy. Direct attached storage (DAS) connects directly to servers but cannot be shared, while network attached storage (NAS) uses file sharing protocols over IP networks. Storage area networks (SAN) use dedicated storage networks like Fibre Channel and iSCSI to provide block-level access to consolidated storage. The key is choosing the right solution based on capacity, performance, scalability, availability, data protection needs, and budget.
The document provides an overview of storage technology options including network attached storage (NAS), storage area networks (SANs), and discusses specific NAS and SAN products. It highlights the key features of an iSCSI SAN brick platform including software for snapshots, replication, and continuous data protection. Appliance strategies and partnerships are also summarized.
Basic knowledge of Storage technology and complete understanding on DAS, NAS & SAN with advantages and disadvantages. A quick understanding on storage will help you make the best decision in terms of cost and need.
This document provides an overview of VMware virtualization solutions including ESXi, vSphere, and vCenter. It describes what virtualization and hypervisors are, lists VMware's product lines, and summarizes key features and capabilities of ESXi, vSphere, and vCenter such as centralized management, monitoring, high availability, and scalability.
Virtualization allows multiple operating systems and applications to run on the same physical server at the same time. This increases hardware utilization and flexibility while reducing IT costs. VMware virtualization solutions can reduce energy costs by 80% through server consolidation and powering down unused servers without affecting applications or users. Virtualization makes hardware resources independent of operating systems and applications, treating them as single unified units that can be more easily deployed, maintained, and supported.
Redundant Arrays of independent disks is a family of techniques that use multiple disks that are organized to provide high performance and/or reliability
The document discusses the differences between network attached storage (NAS) and storage area network (SAN) solutions for small businesses. It outlines the key benefits and use cases of each technology. NAS is best for file sharing and backup, while SAN provides faster performance for databases and applications. The document also notes that a combination of NAS and SAN can provide the best of both worlds.
This document provides an overview of various data storage technologies including RAID, DAS, NAS, and SAN. It discusses RAID levels like RAID 0, 1, 5 which provide data striping and redundancy. Direct attached storage (DAS) connects directly to servers but cannot be shared, while network attached storage (NAS) uses file sharing protocols over IP networks. Storage area networks (SAN) use dedicated storage networks like Fibre Channel and iSCSI to provide block-level access to consolidated storage. The key is choosing the right solution based on capacity, performance, scalability, availability, data protection needs, and budget.
The document provides an overview of storage technology options including network attached storage (NAS), storage area networks (SANs), and discusses specific NAS and SAN products. It highlights the key features of an iSCSI SAN brick platform including software for snapshots, replication, and continuous data protection. Appliance strategies and partnerships are also summarized.
Basic knowledge of Storage technology and complete understanding on DAS, NAS & SAN with advantages and disadvantages. A quick understanding on storage will help you make the best decision in terms of cost and need.
This document provides an overview of VMware virtualization solutions including ESXi, vSphere, and vCenter. It describes what virtualization and hypervisors are, lists VMware's product lines, and summarizes key features and capabilities of ESXi, vSphere, and vCenter such as centralized management, monitoring, high availability, and scalability.
Virtualization allows multiple operating systems and applications to run on the same physical server at the same time. This increases hardware utilization and flexibility while reducing IT costs. VMware virtualization solutions can reduce energy costs by 80% through server consolidation and powering down unused servers without affecting applications or users. Virtualization makes hardware resources independent of operating systems and applications, treating them as single unified units that can be more easily deployed, maintained, and supported.
Redundant Arrays of independent disks is a family of techniques that use multiple disks that are organized to provide high performance and/or reliability
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
NVMe over Fabrics (NVMe-oF) allows NVMe-based storage to be shared across multiple servers over a network. It provides better utilization of resources and scalability compared to directly attached storage. NVMe-oF maintains NVMe performance by transferring commands and data end-to-end over the fabric using technologies like RDMA that bypass legacy storage stacks. It enables applications like composable infrastructure with remote direct memory access (RDMA) providing near-local performance. While NVMe-oF can use different transports, RDMA has been most common due to low latency it provides.
Learn how to setup Samba and NFS in ubuntu server-ubuntu client and ubuntu server-windows client. Also, comparsion of NAS vs SAN, NAS vs DAS, why we are using NAS, its comonents and challanges with actual real world scenario that what if we use NAS and what if we not use NAS.
Disk and File System Management in LinuxHenry Osborne
This document discusses disk and file system management in Linux. It covers MBR and GPT partition schemes, logical volume management, common file systems like ext4 and XFS, mounting file systems, and file system maintenance tools. It also discusses disk quotas, file ownership, permissions, and the umask command for setting default permissions.
This document discusses KVM virtualization and why it is considered the best platform. It states that KVM provides high performance, strong security through EAL4+ certification and SE Linux, and can save customers up to 70% on costs compared to other solutions. It also supports various operating systems and works with Red Hat products like OpenStack and Red Hat Enterprise Virtualization for managing virtualization. Charts are included showing KVM outperforming VMware on benchmark tests using different CPU core counts.
This document provides an introduction and overview of storage concepts including direct attached storage (DAS), network attached storage (NAS), storage area networks (SANs), and iSCSI. It defines these storage types and differentiates between them. Specifically, it describes how DAS uses internal or external disk drives and controllers directly attached to a computer system, while NAS and SANs utilize network protocols and dedicated network infrastructures to connect storage to multiple servers.
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6David Pasek
We are observing different network throughputs on Intel X710 NICs and QLogic FastLinQ QL41xxx NIC. ESXi hardware supports NIC hardware offloading and queueing on 10Gb, 25Gb, 40Gb and 100Gb NIC adapters. Multiple hardware queues per NIC interface (vmnic) and multiple software threads on ESXi VMkernel is depicted and documented in this paper which may or may not be the root cause of the observed problem. The key objective of this document is to clearly document and collect NIC information on two specific Network Adapters and do a comparison to find the difference or at least root cause hypothesis for further troubleshooting.
This document summarizes Marian Marinov's testing and experience with various distributed filesystems including CephFS, GlusterFS, MooseFS, OrangeFS, and BeeGFS. Some key findings are:
- CephFS requires significant resources but lacks redundancy for small clusters. GlusterFS offers redundancy but can have high CPU usage.
- MooseFS and OrangeFS were easy to setup but MooseFS offered better reliability and stats.
- Performance testing found MooseFS and NFS+Ceph to have better small file creation times than GlusterFS and OrangeFS. Network latency was identified as a major factor impacting distributed filesystem performance.
- Tuning efforts focused on NFS
This document discusses virtualization and VMware virtualization solutions. It states that virtualization allows multiple operating systems and applications to run on the same physical server at the same time, increasing hardware utilization and flexibility. It highlights three key benefits of VMware solutions: reducing downtime through high availability and disaster recovery, lowering datacenter operating costs through consolidation and containment, and reducing physical infrastructure costs. The document provides an overview of VMware virtualization capabilities and features.
The document discusses a mid-evaluation of a major project comparing several hypervisors. It will compare Xen, KVM, VMware, and VirtualBox based on their technical differences and performance benchmarks. The benchmarks will test CPU speed, network speed, I/O speed, and performance running various server workloads. This comparison will help determine the best hypervisor for a given virtualization situation. Key factors that will be compared include OS support, security, CPU speed, network speed, I/O speed, and response times.
Server virtualization concepts allow partitioning of physical servers into multiple virtual servers using virtualization software and hardware techniques. This improves resource utilization by running multiple virtual machines on a single physical server. Server virtualization provides benefits like reduced costs, higher efficiency, lower power consumption, and improved availability compared to running each application on its own physical server. Key components of server virtualization include virtual machines, hypervisors, CPU virtualization using techniques like Intel VT-x or AMD-V, memory virtualization, and I/O virtualization through methods like emulated, paravirtualized or direct I/O. KVM and QEMU are popular open source virtualization solutions, with KVM providing kernel-level virtualization support and Q
This document provides an introduction to storage concepts and the history of disk and tape storage. It discusses how storage has evolved from the earliest mainframes using punched cards and magnetic tape, to the introduction of disk drives and disk arrays. The key developments covered include the transition from tape to disk drives for faster direct access storage, the benefits of RAID technology for performance and redundancy, and how storage architectures continue advancing with higher capacity and faster disks.
Storage virtualization seminar discusses breaking connections between physical and logical storage through virtualization. It covers volume management, file systems, virtualizing the SAN and NAS, and polling attendees on their virtualization usage. Benefits discussed include pooling for efficiency and scalability, improved performance and availability through technologies like snapshots and replication, and enabling disaster recovery of virtual machine images. Downsides and costs are considered.
The document provides details about installation, upgrade, hardware requirements, supported operating systems and databases for VMware ESX Server 3.0.1 and Virtual Center 2.0.1. It discusses the major components, minimum hardware requirements for VirtualCenter Server and Virtual Infrastructure Client. It also lists the supported databases, file extensions, differences between ESX and GSX, current ESX hardware version and various virtualization products.
The document provides an overview of the Red Hat Certified Engineer certification courses, including the objectives and topics covered in each course. The first course, RH033 Red Hat Linux Essentials, covers basic Linux commands, file navigation, text editing, and administration. The second course, RH133 Red Hat System Administration, focuses on system installation, hardware administration, users/groups, and networking. The third course, RH253 Red Hat Networking and Security Administration, teaches network services configuration and security topics.
This presentation gives an overview of physical storage technologies and the various ways of accessing storage on a computer or a server. Presented at School of Engineering and Applied Science, Ahmedabad University as a part of Software Engineering course.
QNAP NAS Presentation The New Era of NAS Hernan Lopez
The document provides an overview of QNAP NAS products and services. It summarizes QNAP's position as the number one supplier of standalone NAS products, its new TS-x51 and TS-x53 Pro Turbo NAS series with Intel processors, and its comprehensive QTS 4.1 operating system. It also highlights key applications like virtualization, media streaming, surveillance, backup and more that transform the NAS into a powerful private cloud solution for homes and businesses.
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
This document provides an introduction and overview of VMware vSphere: Install, Configure, Manage training course. It discusses how the course aligns with the VCP-Core certification exam blueprint and objectives. It also provides definitions of key data center concepts like tiers and an overview of the evolution of data centers. Finally, it discusses the history and benefits of data center virtualization using VMware technologies like ESXi, virtual machines, and vCenter Server.
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
The document summarizes storage area network (SAN) architectures and protocols. It discusses:
- SAN components including switches, host bus adapters (HBAs), fabrics, and storage arrays.
- Protocols such as Fibre Channel (FC), iSCSI, Fibre Channel over Ethernet (FCoE), and Frame Inspection Protocol (FIP). FC provides faster speeds up to 16Gbps while iSCSI uses Ethernet.
- Benefits of FC SANs including robustness, hot-swappable components, and centralized storage management. IP-based SANs like iSCSI reduce costs by unifying FC and Ethernet.
The document summarizes storage area network (SAN) architectures and protocols. It discusses:
- SAN components including switches, host bus adapters (HBAs), fabrics, and storage arrays.
- Protocols such as Fibre Channel (FC), iSCSI, Fibre Channel over Ethernet (FCoE), and Frame Inspection Protocol (FIP). FC provides faster speeds up to 16Gbps while iSCSI uses Ethernet.
- Benefits of FC SANs including robustness, hot-swappable components, and centralized storage management. IP-based SANs like iSCSI reduce costs by unifying FC and Ethernet.
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
NVMe over Fabrics (NVMe-oF) allows NVMe-based storage to be shared across multiple servers over a network. It provides better utilization of resources and scalability compared to directly attached storage. NVMe-oF maintains NVMe performance by transferring commands and data end-to-end over the fabric using technologies like RDMA that bypass legacy storage stacks. It enables applications like composable infrastructure with remote direct memory access (RDMA) providing near-local performance. While NVMe-oF can use different transports, RDMA has been most common due to low latency it provides.
Learn how to setup Samba and NFS in ubuntu server-ubuntu client and ubuntu server-windows client. Also, comparsion of NAS vs SAN, NAS vs DAS, why we are using NAS, its comonents and challanges with actual real world scenario that what if we use NAS and what if we not use NAS.
Disk and File System Management in LinuxHenry Osborne
This document discusses disk and file system management in Linux. It covers MBR and GPT partition schemes, logical volume management, common file systems like ext4 and XFS, mounting file systems, and file system maintenance tools. It also discusses disk quotas, file ownership, permissions, and the umask command for setting default permissions.
This document discusses KVM virtualization and why it is considered the best platform. It states that KVM provides high performance, strong security through EAL4+ certification and SE Linux, and can save customers up to 70% on costs compared to other solutions. It also supports various operating systems and works with Red Hat products like OpenStack and Red Hat Enterprise Virtualization for managing virtualization. Charts are included showing KVM outperforming VMware on benchmark tests using different CPU core counts.
This document provides an introduction and overview of storage concepts including direct attached storage (DAS), network attached storage (NAS), storage area networks (SANs), and iSCSI. It defines these storage types and differentiates between them. Specifically, it describes how DAS uses internal or external disk drives and controllers directly attached to a computer system, while NAS and SANs utilize network protocols and dedicated network infrastructures to connect storage to multiple servers.
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6David Pasek
We are observing different network throughputs on Intel X710 NICs and QLogic FastLinQ QL41xxx NIC. ESXi hardware supports NIC hardware offloading and queueing on 10Gb, 25Gb, 40Gb and 100Gb NIC adapters. Multiple hardware queues per NIC interface (vmnic) and multiple software threads on ESXi VMkernel is depicted and documented in this paper which may or may not be the root cause of the observed problem. The key objective of this document is to clearly document and collect NIC information on two specific Network Adapters and do a comparison to find the difference or at least root cause hypothesis for further troubleshooting.
This document summarizes Marian Marinov's testing and experience with various distributed filesystems including CephFS, GlusterFS, MooseFS, OrangeFS, and BeeGFS. Some key findings are:
- CephFS requires significant resources but lacks redundancy for small clusters. GlusterFS offers redundancy but can have high CPU usage.
- MooseFS and OrangeFS were easy to setup but MooseFS offered better reliability and stats.
- Performance testing found MooseFS and NFS+Ceph to have better small file creation times than GlusterFS and OrangeFS. Network latency was identified as a major factor impacting distributed filesystem performance.
- Tuning efforts focused on NFS
This document discusses virtualization and VMware virtualization solutions. It states that virtualization allows multiple operating systems and applications to run on the same physical server at the same time, increasing hardware utilization and flexibility. It highlights three key benefits of VMware solutions: reducing downtime through high availability and disaster recovery, lowering datacenter operating costs through consolidation and containment, and reducing physical infrastructure costs. The document provides an overview of VMware virtualization capabilities and features.
The document discusses a mid-evaluation of a major project comparing several hypervisors. It will compare Xen, KVM, VMware, and VirtualBox based on their technical differences and performance benchmarks. The benchmarks will test CPU speed, network speed, I/O speed, and performance running various server workloads. This comparison will help determine the best hypervisor for a given virtualization situation. Key factors that will be compared include OS support, security, CPU speed, network speed, I/O speed, and response times.
Server virtualization concepts allow partitioning of physical servers into multiple virtual servers using virtualization software and hardware techniques. This improves resource utilization by running multiple virtual machines on a single physical server. Server virtualization provides benefits like reduced costs, higher efficiency, lower power consumption, and improved availability compared to running each application on its own physical server. Key components of server virtualization include virtual machines, hypervisors, CPU virtualization using techniques like Intel VT-x or AMD-V, memory virtualization, and I/O virtualization through methods like emulated, paravirtualized or direct I/O. KVM and QEMU are popular open source virtualization solutions, with KVM providing kernel-level virtualization support and Q
This document provides an introduction to storage concepts and the history of disk and tape storage. It discusses how storage has evolved from the earliest mainframes using punched cards and magnetic tape, to the introduction of disk drives and disk arrays. The key developments covered include the transition from tape to disk drives for faster direct access storage, the benefits of RAID technology for performance and redundancy, and how storage architectures continue advancing with higher capacity and faster disks.
Storage virtualization seminar discusses breaking connections between physical and logical storage through virtualization. It covers volume management, file systems, virtualizing the SAN and NAS, and polling attendees on their virtualization usage. Benefits discussed include pooling for efficiency and scalability, improved performance and availability through technologies like snapshots and replication, and enabling disaster recovery of virtual machine images. Downsides and costs are considered.
The document provides details about installation, upgrade, hardware requirements, supported operating systems and databases for VMware ESX Server 3.0.1 and Virtual Center 2.0.1. It discusses the major components, minimum hardware requirements for VirtualCenter Server and Virtual Infrastructure Client. It also lists the supported databases, file extensions, differences between ESX and GSX, current ESX hardware version and various virtualization products.
The document provides an overview of the Red Hat Certified Engineer certification courses, including the objectives and topics covered in each course. The first course, RH033 Red Hat Linux Essentials, covers basic Linux commands, file navigation, text editing, and administration. The second course, RH133 Red Hat System Administration, focuses on system installation, hardware administration, users/groups, and networking. The third course, RH253 Red Hat Networking and Security Administration, teaches network services configuration and security topics.
This presentation gives an overview of physical storage technologies and the various ways of accessing storage on a computer or a server. Presented at School of Engineering and Applied Science, Ahmedabad University as a part of Software Engineering course.
QNAP NAS Presentation The New Era of NAS Hernan Lopez
The document provides an overview of QNAP NAS products and services. It summarizes QNAP's position as the number one supplier of standalone NAS products, its new TS-x51 and TS-x53 Pro Turbo NAS series with Intel processors, and its comprehensive QTS 4.1 operating system. It also highlights key applications like virtualization, media streaming, surveillance, backup and more that transform the NAS into a powerful private cloud solution for homes and businesses.
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
This document provides an introduction and overview of VMware vSphere: Install, Configure, Manage training course. It discusses how the course aligns with the VCP-Core certification exam blueprint and objectives. It also provides definitions of key data center concepts like tiers and an overview of the evolution of data centers. Finally, it discusses the history and benefits of data center virtualization using VMware technologies like ESXi, virtual machines, and vCenter Server.
LibVirt and KVM provide virtualization capabilities on Linux systems. LibVirt uses a standardized API to manage different hypervisors like KVM. KVM allows running virtual machines at native speeds by using hardware virtualization extensions. It provides high density and portability compared to running systems directly on hardware. LibVirt handles tasks like networking, storage, and interfaces through tools like Virsh and Virt-Manager, and advanced topics include security with SELinux, bridged networking, and remote access.
The document summarizes storage area network (SAN) architectures and protocols. It discusses:
- SAN components including switches, host bus adapters (HBAs), fabrics, and storage arrays.
- Protocols such as Fibre Channel (FC), iSCSI, Fibre Channel over Ethernet (FCoE), and Frame Inspection Protocol (FIP). FC provides faster speeds up to 16Gbps while iSCSI uses Ethernet.
- Benefits of FC SANs including robustness, hot-swappable components, and centralized storage management. IP-based SANs like iSCSI reduce costs by unifying FC and Ethernet.
The document summarizes storage area network (SAN) architectures and protocols. It discusses:
- SAN components including switches, host bus adapters (HBAs), fabrics, and storage arrays.
- Protocols such as Fibre Channel (FC), iSCSI, Fibre Channel over Ethernet (FCoE), and Frame Inspection Protocol (FIP). FC provides faster speeds up to 16Gbps while iSCSI uses Ethernet.
- Benefits of FC SANs including robustness, hot-swappable components, and centralized storage management. IP-based SANs like iSCSI reduce costs by unifying FC and Ethernet.
The document describes a system called Libra, formerly known as PROSE, which aims to run applications in isolated partitions for improved control, reliability and performance. It allows creating specialized kernels as easily as applications. Resources are shared between partitions using the 9P2000 protocol over a unified file namespace. This allows finer-grained control over system services while maintaining simplicity and reliability.
This document provides an overview of SCSI drives and file systems. It describes SCSI interfaces and cables, how SCSI devices are connected in a daisy chain configuration, and SCSI standards including SCSI-1, SCSI-2, and SCSI-3. It also summarizes the FAT and NTFS file systems used in Windows, how they allocate disk space and store file information differently, and the advantages of NTFS. The document concludes with a brief explanation of how disk compression works to save space.
A Storage Area Network (SAN) provides block-level access to shared storage pools through high-speed fiber connections, allowing multiple servers to access storage. A SAN consists of hosts, logical unit numbers (LUNs), host bus adapters (HBAs), storage controllers, and multipathing input/output (MPIO). iSCSI allows SCSI commands to be transmitted over IP networks as an alternative to fiber channel, consisting of iSCSI qualified names (IQNs), software initiators, and extended unique identifiers (EUIs).
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...rjain51
Class lecture by Prof. Raj Jain on LAN Extension and Virtualization using Layer 3 Protocols. The talk covers Network Virtualization Techniques, Geographic Clusters of Data Centers, Data Center Interconnection (DCI), Challenges of LAN Extension, TRILL, TRILL Architecture, TRILL Encapsulation Format, TRILL Features, Locator ID Separation Protocol (LISP), Locator ID Separation Protocol (LISP), LISP Terminology, LISP Example, LISP Applications, VM Migration Using LISP, References. Video recording available in YouTube.
This document provides an overview of storage technologies, including direct attached storage (DAS), network attached storage (NAS), iSCSI, and storage area networks (SAN). It defines key components like RAID controllers and host bus adapters, compares internal and external storage, and describes protocols like Fibre Channel and iSCSI. The benefits of SANs are consolidated storage and reduced costs. Fibre Channel is designed for high performance while iSCSI offers moderate performance at a lower cost.
This document provides an overview of administering a storage area network (SAN) using IBM and Cisco equipment. It discusses SAN concepts like zoning, fabrics, multi-pathing, and installing operating systems from the SAN. The specific setup includes an IBM DS4400 storage subsystem with expansion units, a Cisco 9216 fabric switch, and two IBM blade centers with internal QLogic switches. The document aims to educate IT staff on maintaining this SAN configuration using IBM Storage Manager and Cisco Fabric Manager software.
Osnove: DAS,Trdi disk, SCSI protokol
SAN in NAS
-s protokoli, ki nastopajo v okoljih
-z napravami, katere nastopajo pri izgradnji tako osnovnih in enostavnih, kot tudi kompleksnih okolji
-topologije
Strežniki
Povezljivost
Krmilniki in gonilniki
Diskovna polja
RAID
IOPS (teorija)
Razno
"FCoE vs. iSCSI - Making the Choice" from Interop Las Vegas 2011Stephen Foskett
The notion that Fibre Channel is for data centers and iSCSI is for SMB’s and workgroups is outdated. Increases in LAN speeds and the coming of lossless Ethernet position iSCSI as a good fit for the data center. Whether your organization adopts FC or iSCSI depends on many factors like current product set, future application demands, organizational skill-set and budget. In this session we will discuss the different conditions where FC or IsCSI are the right fit, why you should use one and when to kick either to the curb.
This document provides an overview of IEEE 802.11 wireless LAN standards and WiFi. It discusses key features such as physical layers, MAC protocols, and priority schemes. The first part defines IEEE 802.11 and differentiates it from WiFi. It also covers the IEEE standards numbering system and licensed-exempt spectrum bands used. The second part describes the CSMA/CA protocol, hidden node problem, and how RTS/CTS handles it. It also discusses priorities, backoff algorithms, and examples of the distributed coordination function in operation.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
The document provides information on various topics for the CompTIA CASP exam, including:
1. Virtual Trusted Platform Modules (vTPM) which provide secure storage and cryptographic functions to virtual machines.
2. SELinux which added Mandatory Access Control to the Linux kernel to control access between subjects and objects.
3. Differences between common storage protocols like iSCSI, Fibre Channel over Ethernet, and NFS vs CIFS.
It also covers topics like dynamic disk pools vs RAID, Microsoft Group Policies, and differences between network attached storage and storage area networks.
This document provides an overview of Bluetooth and Bluetooth Smart (Low Energy) wireless protocols. It discusses the history and development of Bluetooth, describes the Bluetooth specifications and versions. It explains the Bluetooth protocol stack and various operational states. It also covers Bluetooth Smart PHY and MAC layers, and how they differ from classic Bluetooth to enable lower power communication between devices. The document is intended as lecture material for a class on wireless personal area networks.
Unified Fabric: Data Centre Bridging and FCoE ImplementationCSCJournals
In the past decade cloud computing has become the buzzword in IT world. The implementation of cloud based computing and storage technology changed the way of how network infrastructure is built inside an enterprise. As technology has improved and the cloud based storage systems become more affordable, a number of enterprises started outsourcing their data management due to a number of reasons. But still a majority of large enterprises and SMB (small medium businesses) prefer to manage their own in-house data centers and storage area networks. The reason being is the control, security and integrity of stored data on cloud storage servers. In this paper, we will discuss the most commonly implemented SAN technology, fibre channel (FC) in comparison with the new technology called Fibre Channel over Ethernet (FCoE). These results will help SAN engineers and designers select the best technology between the two in terms of performance, scalability, cost, maintenance, space, cooling, equipment, cabling, management, adapters, labor cost and manpower. Implementation of FC and FCoE has been done to explore the different features of both technologies. Furthermore, how to build a reliable, scalable and secure storage area network has been demonstrated. This study has been carried out on Cisco Nexus, Cisco MDS and Cisco UCS platform.
Class lecture by Prof. Raj Jain on Networking Issues For Big Data. The talk covers Big Data Enabled by Networking, MapReduce, Hadoop, Networking Requirements for Big Data, Recent Developments in Networking, 1. Virtualizing Computation, 2. Virtualizing Storage, 3. Virtualizing Rack Storage Connectivity, Multi-Root IOV, 4. Virtualizing Data Center Storage, 5. Virtualizing Metro Storage, Virtualizing the Global Storage, Software Defined Networking, Network Function Virtualization (NFV), Big Data for Networking. Video recording available in YouTube.
This document discusses direct-attached storage (DAS), which connects storage devices directly to servers. It describes the internal and external DAS architectures, with internal DAS having the storage device inside the host and external DAS connecting the storage device externally via interfaces like SCSI. DAS has benefits like lower cost and simpler setup than networked storage but lacks scalability and can be limited by bus bandwidth and distance restrictions. Performance depends on factors like disk utilization, cache memory, RAID configuration, and controller protocols.
Class lecture by Prof. Raj Jain on Introduction to OpenFlow. The talk covers Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities, Introduction to OpenFlow, Planes of Networking, Data vs. Control Logic, OpenFlow: Key Ideas, History of OpenFlow, Separation of Control and Data Plane, OpenFlow V1.0, Matching, Counters, Actions, Hardware OpenFlow Switches, Software OpenFlow Switches, Open vSwitch, Open vSwitch Features, OVSDB, OpenFlow V1.1, OpenFlow Hardware Implementation, OpenFlow V1.2, OpenFlow 1.3, OpenFlow V1.4, Implementation Issues, Current Limitations of OpenFlow, OpenFlow Current Activities. Video recording available in YouTube.
The document discusses storage networking technologies and virtualization. It covers direct-attached storage (DAS) and introduces the Small Computer System Interface (SCSI) standard. Chapter 5 details the two types of DAS (internal and external), their benefits and limitations, and disk drive interfaces like IDE/ATA, SATA, SAS, SCSI, and Fibre Channel. It also provides an introduction to parallel SCSI, including its evolution and architecture.
IEEE CS Keynote at 20th Annual Conference on Advanced Computing and Communications (ADCOM 2014), Bangaluru, India, September 19, 2014 by Prof. Raj Jain. The talk covers What are Things?, Internet of Things, Sample IoT Applications, What’s Smart?, 4 Levels of Smartness, Internet of Brains, Why IoT Now?, Funding, Google Trends, Research Funding for IoT, Business Opportunities, Venture Activities in IoT, Recent IoT Products, IoT Research Challenges, Internet of Harmful Things, Beacons, Power per MB, Datalink Issues, Ant-Sized IoT Passive Radios, Networking Issues, Last 100m Protocols, Recent Protocols for IoT, Legacy IoT Protocols, Standardization, Fog Computing, Micro-Clouds on Cell-Towers, The Problem Statement, Services in a Cloud of Clouds.
SDN and NFV: Facts, Extensions, and Carrier Opportunitiesrjain51
Slides of a seminar talk by Prof. Raj Jain to AT&T SDN Forum, April 10, 2014.
It is well known that software defined networking and network function virtualization are key to the future of carriers. What may not be well known is the contentious debate among the industry leaders on approaches to these. In this talk, both sides of these arguments will be presented followed by an extension to the NFV idea that should be of interest to carriers.
The second part of the talk describes our current research in the area of service chaining of globally distributed VNFs. In this presentation we describe OpenADN (Open Application Delivery Network) which allows multiple providers to chain both application-level and network-level services via VNFs distributed globally on several private/public clouds. This is similar to the "Cloud of Clouds" idea currently developing in the industry. There is immense opportunity for carriers to play the key role in this space.
This document provides an introduction to the Internet of Things (IoT). It defines IoT as connecting everyday objects like refrigerators, cars, and home appliances to the Internet. Currently only 1% of objects are connected, but that number is expected to grow to 50 billion connected devices by 2020. The document discusses the importance of IoT and provides examples of applications like smart grids, healthcare devices, and industrial control systems. It also summarizes several protocols that enable IoT communication over power lines and wireless networks.
Introduction to Network Function Virtualization (NFV)rjain51
Class lecture by Prof. Raj Jain on Introduction to Network Function Virtualization (NFV). The talk covers Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline, Introduction to, Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline. Video recording available in YouTube.
Introduction to Software Defined Networking (SDN)rjain51
Class lecture by Prof. Raj Jain on Introduction to . The talk covers Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites, Hierarchy of Operations, Introduction to, Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on OpenFlow Controllers and Tools. The talk covers OpenFlow Controllers, OpenFlow Controllers, NOX, POX, SNAC, Beacon, Onix, Trema, Maestro, Floodlight, Open Source Routing Software, Key OpenFlow Related Software, FlowVisor, Mininet, Ryu, RouteFlow, Other OpenFlow Related Projects. Video recording available in YouTube.
Network Virtualization in Cloud Data Centersrjain51
Class lecture by Prof. Raj Jain on Network Virtualization in Cloud Data Centers. The talk covers Network Virtualization, Network Virtualization Techniques, NVO3, NVO3 Goals, NVO3 Terminology, NVO3 Components, Current NVO Technologies, GRE, EoMPLSoGRE, NVGRE, VXLAN, VXLAN Architecture, VXLAN Deployment Example, VXLAN Encapsulation Format, Stateless Transport Tunneling Protocol (STT), LSO and LRO, STT Optimizations, STT Frame Format, TCP-Like Header in STT. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on Big Data. The talk covers Why Big Data Now?, Big Data Applications, ACID Requirements, Terminology, Google File System, BigTable, MapReduce, MapReduce Optimization, Story of Hadoop, Hadoop, Apache Hadoop Tools, Apache Other Big Data Tools, Other Big Data Tools, Analytics, Types of Databases, Relational Databases and SQL, Non-relational Databases, NewSQL Databases, Columnar Databases. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on Application Delivery Networking. The talk covers Application Delivery in a Data Center, Application Delivery Controllers (ADCs), Load Balancing Concepts, Load Balancing Using DNS, Global Server Load Balancing (GSLB), Load Balancing Modes, Network Address Translation (NAT), NAT Example, NAT64 and NAT46, Carrier Grade NAT, Dual NAT, Server NAT, Transparent Mode, Firewall Load Balancing, Reverse Proxy Load Balancing, SSL Offload, TCP Multiplexing ADC, HTTP Compression, ADC Proliferation in Data Centers, Virtual ADCs, Multi-Function ADCs. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on Carrier Ethernet. The talk covers Options to Connect Two Data Centers?, Plesiochronous Digital Hierarchy (PDH), SONET/SDH, Multiprotocol Label Switching (MPLS), Label Switching Example, IP over MPLS over Ethernet, Martini Draft, Pseudo Wire: L2 Circuits over IP, Ethernet over PWE3 over MPLS, Virtual Private LAN Service (VPLS), Differentiated Services, Carriers vs. Enterprise, Issue: UNI vs Peer-to-Peer Signaling, UNI vs. ENNI, Operator Virtual Connection (OVC), Metro Access Ethernet Private Line, End-to-End Metro Ethernet Connection, Ethernet Virtual Connections (EVCs), Metro Ethernet Service Attributes, Metro Ethernet OAM, Metro Ethernet OAM Messages, Metro Ethernet Use Cases, Ethernet Provider Bridge (PB), Provider Backbone Network (PBB), MAC-in-MAC Frame Format, PBB Service Instance, Connection Oriented Ethernet, VLAN Cross-Connect, PBB-TE, PBB-TE QoS, Ethernet Tagged Frame Format Evolution, Comparison of Technologies. Video recording available in YouTube.
This document discusses server virtualization concepts including the advantages of virtualization, different types of virtualization, and virtualization products. It begins with an overview of server virtualization and defines virtualization. It then covers reasons for virtualization, virtualization concepts including hypervisor types, and advantages. It discusses different types of virtualization including operating system, desktop, application, service, and user virtualization. Finally, it provides examples of popular virtualization products and technologies including VMware ESX/ESXi, vMotion, and vSphere.
A LAN, or local area network, connects computers and devices in a limited geographic area such as a home, school, office building, or group of buildings. Key characteristics of a LAN include:
- Covers a small physical area, such as a building or group of buildings. Distances are typically less than 2 kilometers.
- Uses high-speed connections to connect nodes. Common technologies are Ethernet and Wi-Fi.
- All nodes can communicate directly with all other nodes on the same LAN through hardware addressing (MAC addresses). Broadcasts reach all nodes.
- May use bridges or switches to segment the LAN into multiple collision domains for improved performance and administration, but all segments are part of the
Networking Protocols for Internet of Thingsrjain51
This document discusses networking protocols for internet of things (IoT) devices, focusing on 6LoWPAN and RPL. 6LoWPAN is described as adapting IPv6 for use over IEEE 802.15.4 low-power wireless networks through header compression and new addressing schemes. RPL is introduced as the routing protocol for low-power and lossy networks, using a directed acyclic graph structure to route packets towards a root node in a way that optimizes objectives like energy efficiency. Key concepts for both protocols like addressing formats, header types, and control messages are outlined at a high level.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.