From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
This document discusses the concept of a Science DMZ, which consists of three key components: 1) a dedicated "friction-free" network path with high-performance networking devices located near the site perimeter to facilitate science data transfer, 2) dedicated high-performance data transfer nodes optimized for data transfer tools, and 3) a performance measurement/test node. It contrasts this approach with the typical ad-hoc deployment of a data transfer node wherever space allows, which often fails to provide necessary performance. Details of an example Science DMZ deployment at Lawrence Berkeley National Laboratory are provided.
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Impact of Grid Computing on Network Operators and HW VendorsTal Lavian Ph.D.
The “Network” is a Prime Resource for Large- Scale Distributed System.
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
This document discusses the concept of a Science DMZ, which consists of three key components: 1) a dedicated "friction-free" network path with high-performance networking devices located near the site perimeter to facilitate science data transfer, 2) dedicated high-performance data transfer nodes optimized for data transfer tools, and 3) a performance measurement/test node. It contrasts this approach with the typical ad-hoc deployment of a data transfer node wherever space allows, which often fails to provide necessary performance. Details of an example Science DMZ deployment at Lawrence Berkeley National Laboratory are provided.
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Impact of Grid Computing on Network Operators and HW VendorsTal Lavian Ph.D.
The “Network” is a Prime Resource for Large- Scale Distributed System.
Integrated SW System Provide the “Glue”
Dynamic optical network as a fundamental Grid service in data-intensive Grid application, to be scheduled, to be managed and coordinated to support collaborative operations
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...SURFnet
This document discusses using dedicated servers called data transfer nodes (DTNs) to improve data transfer speeds between research institutions. DTNs are part of a network architecture called a Science DMZ that optimizes high-speed transfers. The document recommends:
- Deploying high-performance DTNs with fast storage in a separate network zone dedicated to research data and services.
- Configuring lossless connections and security policies that don't impede transfers between DTNs and research networks.
- Educating IT departments on maintaining and supporting the infrastructure to improve end-user performance for data-intensive research collaborations.
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
Jisc is developing a replacement for its existing Netsight network monitoring system called Janetview. The replacement is currently in pre-alpha testing and will have features like federated login, modular design, and ability to access raw network data. Jisc is seeking alpha and beta testers for Janetview and demonstrated some of its capabilities.
Dave Tinkler and Tony Hacche lead engineering teams for various regional networks that are part of Janet, the UK education and research network. They provide support for layer 2 and layer 3 services on Janet, including BGP, resilient site connections, private wire services, lightpath services, private LAN, and optical circuits. They were giving a presentation to take questions from attendees about engineering issues on Janet.
This document discusses DevOps practices and infrastructure management. It notes that traditional infrastructure practices have not changed enough and modern requirements include being declarative, repeatable, testable, and code-based. It provides examples of using Puppet, PowerShell, and Ansible to manage infrastructure and notes the benefits of treating infrastructure as code including enabling change, repeatability and velocity. It concludes by encouraging learning Python and Ansible.
The document provides an overview of networking and storage concepts, including:
- Defining the differences between networking and storage considerations such as information movement vs. repository and data over distance vs. time.
- Explaining basic storage network technologies like direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SAN).
- Describing how virtual SCSI cables work over different connection types like SCSI, Fibre Channel, SAS, and iSCSI to connect initiators and targets.
IPv6 experience from a large enterprise - Networkshop44Jisc
This document summarizes Microsoft's experience transitioning to IPv6 over many years, including enabling IPv6 on their corporate network, data centers, and internet access. It discusses operational issues encountered and solutions implemented. It also outlines Microsoft's plans to further expand IPv6 usage and eventually transition away from IPv4, such as piloting IPv6-only networks and deploying NAT64/DNS64 to allow IPv6-only client access.
This presentation clearly explains how the network evolved till now.
this will be helpful to explore the internet world. How do we connect over the internet?
what's the beginning of the network.
More about OSI Models, TCP models protocols, and frame relay concepts.
if you have any queries/suggestions please visit: https://sabarish.techcodes.in/
This document outlines a presentation on policy-based validation of SAN (storage area network) configurations. It introduces SANs and compares them to NAS (network-attached storage). It then discusses factors like global access, economics, issues, and challenges in SAN management. It covers relevant data structures, protocols, components like HBAs. The future work section outlines an architecture for policy-based validation including a policy evaluator, request generator, and action handler.
The document discusses disk I/O performance in SQL Server 2005. It begins with some questions about which queries and RAID configurations would affect disk I/O the most. It then covers the basics of I/O and different RAID levels, their pros and cons. The document provides an overview of monitoring physical and logical disk performance, and offers tips on tuning disk I/O performance when bottlenecks occur. It concludes with resources for further information.
Challenges and Issues of Next Cloud Computing PlatformsFrederic Desprez
Cloud computing has now crossed the frontiers of research to reach industry. It is used every day , whether to exchange emails or make
reservations on web sites. However, many research works remain to be done to improve the performance and functionality of these platforms of tomorrow. In this talk, I will do an overview of some these theoretical and appliead researches done at INRIA and particularly around Clouds distribution, energy monitoring and management, massive data processing and exchange, and resource management.
C2MON - A highly scalable monitoring platform for Big Data scenarios @CERN by...J On The Beach
Developing reliable data acquisition, processing and control modules for mission critical systems - as they run at CERN - has always been challenging. As both data volumes and rates increase, non-functional requirements such as performance, availability, and maintainability are getting more important than ever. C2MON is a modular Open Source Java framework for realising highly available, large industrial monitoring and control solutions. It has been initially developed for CERN’s demanding infrastructure monitoring needs and is based on more than 10 years of experience with the Technical Infrastructure Monitoring (TIM) systems at CERN. Combining maintainability and high-availability within a portable architecture is the focus of this work. Making use of standard Java libraries for in-memory data management, clustering and data persistence, the platform becomes interesting for many Big Data scenarios.
This one-day course provides an overview of the Open Compute Project (OCP) and its disruptive impact on traditional enterprise data centers. The course consists of sessions covering OCP background, data center subsystems and technologies, network technology, server technology, storage technology, hardware management and metrics, and the disruptive effects of OCP. Participants will learn about OCP fundamentals, components, differences from conventional data centers, and how OCP aims to lower costs through open collaboration and simplified designs. The goal is for participants to understand how OCP approaches can transform enterprise data center operations and infrastructure.
Active Nets Technology Transfer through High-Performance Network DevicesTal Lavian Ph.D.
Deploying commercial high performance network devices to construct a programmable AN platform
Supporting customizable network intelligences
Supporting excellent AN-specific research projects
Addressing AN and optical networking issues
A “meta‑cloud” for building clouds
Build your own cloud on our hardware resources
Agnostic to specific cloud software
Run existing cloud software stacks (like OpenStack, Hadoop, etc.)
... or new ones built from the ground up
Control and visibility all the way to the bare metal
“Sliceable” for multiple, isolated experiments at once
The CMS openstack, opportunistic, overlay, online-cluster Cloud (CMSooooCloud)Jose Antonio Coarasa Perez
The CMS online cluster consists of more than 3000 computers. It has been exclusively used for the Data Acquisition of the CMS experiment at CERN, archiving around 20Tbytes of data per day.
An openstack cloud layer has been deployed on part of the cluster (totalling more than 13000 cores) as a minimal overlay so as to leave the primary role of the computers untouched while allowing an opportunistic usage of the cluster. This allows running offline computing jobs on the online infrastructure while it is not (fully) used.
We will present the architectural choices made to deploy an unusual, as opposed to dedicated, "overlaid cloud infrastructure". These architectural choices ensured a minimal impact on the running cluster configuration while giving a maximal segregation of the overlaid virtual computer infrastructure. Openvswitch was chosen during the proof of concept phase in order to avoid changes on the network infrastructure. Its use will be illustrated as well as the final networking configuration used. The design and performance of the openstack cloud controlling layer will be also presented together with new developments and experience from the first year of usage.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document defines storage area networks (SANs) and discusses their architecture, technologies, management, security and benefits. A SAN consists of storage devices connected via a dedicated network that allows servers to access storage independently. Fibre Channel is the most widely used technology but iSCSI and FCIP allow block storage over IP networks. Effective SAN management requires coordination across storage, network and system levels. Security measures like authentication, authorization and encryption help protect data in this shared storage environment.
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
Solving Network Throughput Problems at the Diamond Light SourceJisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Research data zone: veilige en geoptimaliseerde netwerkomgeving voor onderzoe...SURFnet
This document discusses using dedicated servers called data transfer nodes (DTNs) to improve data transfer speeds between research institutions. DTNs are part of a network architecture called a Science DMZ that optimizes high-speed transfers. The document recommends:
- Deploying high-performance DTNs with fast storage in a separate network zone dedicated to research data and services.
- Configuring lossless connections and security policies that don't impede transfers between DTNs and research networks.
- Educating IT departments on maintaining and supporting the infrastructure to improve end-user performance for data-intensive research collaborations.
Common Design Elements for Data Movement Eli DartEd Dodds
Eli Dart, Network Engineer ESnet Science Engagement Lawrence Berkeley National Laboratory Cosmology CrossConnects Workshop Berkeley, CA February 11, 2015
Jisc is developing a replacement for its existing Netsight network monitoring system called Janetview. The replacement is currently in pre-alpha testing and will have features like federated login, modular design, and ability to access raw network data. Jisc is seeking alpha and beta testers for Janetview and demonstrated some of its capabilities.
Dave Tinkler and Tony Hacche lead engineering teams for various regional networks that are part of Janet, the UK education and research network. They provide support for layer 2 and layer 3 services on Janet, including BGP, resilient site connections, private wire services, lightpath services, private LAN, and optical circuits. They were giving a presentation to take questions from attendees about engineering issues on Janet.
This document discusses DevOps practices and infrastructure management. It notes that traditional infrastructure practices have not changed enough and modern requirements include being declarative, repeatable, testable, and code-based. It provides examples of using Puppet, PowerShell, and Ansible to manage infrastructure and notes the benefits of treating infrastructure as code including enabling change, repeatability and velocity. It concludes by encouraging learning Python and Ansible.
The document provides an overview of networking and storage concepts, including:
- Defining the differences between networking and storage considerations such as information movement vs. repository and data over distance vs. time.
- Explaining basic storage network technologies like direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SAN).
- Describing how virtual SCSI cables work over different connection types like SCSI, Fibre Channel, SAS, and iSCSI to connect initiators and targets.
IPv6 experience from a large enterprise - Networkshop44Jisc
This document summarizes Microsoft's experience transitioning to IPv6 over many years, including enabling IPv6 on their corporate network, data centers, and internet access. It discusses operational issues encountered and solutions implemented. It also outlines Microsoft's plans to further expand IPv6 usage and eventually transition away from IPv4, such as piloting IPv6-only networks and deploying NAT64/DNS64 to allow IPv6-only client access.
This presentation clearly explains how the network evolved till now.
this will be helpful to explore the internet world. How do we connect over the internet?
what's the beginning of the network.
More about OSI Models, TCP models protocols, and frame relay concepts.
if you have any queries/suggestions please visit: https://sabarish.techcodes.in/
This document outlines a presentation on policy-based validation of SAN (storage area network) configurations. It introduces SANs and compares them to NAS (network-attached storage). It then discusses factors like global access, economics, issues, and challenges in SAN management. It covers relevant data structures, protocols, components like HBAs. The future work section outlines an architecture for policy-based validation including a policy evaluator, request generator, and action handler.
The document discusses disk I/O performance in SQL Server 2005. It begins with some questions about which queries and RAID configurations would affect disk I/O the most. It then covers the basics of I/O and different RAID levels, their pros and cons. The document provides an overview of monitoring physical and logical disk performance, and offers tips on tuning disk I/O performance when bottlenecks occur. It concludes with resources for further information.
Challenges and Issues of Next Cloud Computing PlatformsFrederic Desprez
Cloud computing has now crossed the frontiers of research to reach industry. It is used every day , whether to exchange emails or make
reservations on web sites. However, many research works remain to be done to improve the performance and functionality of these platforms of tomorrow. In this talk, I will do an overview of some these theoretical and appliead researches done at INRIA and particularly around Clouds distribution, energy monitoring and management, massive data processing and exchange, and resource management.
C2MON - A highly scalable monitoring platform for Big Data scenarios @CERN by...J On The Beach
Developing reliable data acquisition, processing and control modules for mission critical systems - as they run at CERN - has always been challenging. As both data volumes and rates increase, non-functional requirements such as performance, availability, and maintainability are getting more important than ever. C2MON is a modular Open Source Java framework for realising highly available, large industrial monitoring and control solutions. It has been initially developed for CERN’s demanding infrastructure monitoring needs and is based on more than 10 years of experience with the Technical Infrastructure Monitoring (TIM) systems at CERN. Combining maintainability and high-availability within a portable architecture is the focus of this work. Making use of standard Java libraries for in-memory data management, clustering and data persistence, the platform becomes interesting for many Big Data scenarios.
This one-day course provides an overview of the Open Compute Project (OCP) and its disruptive impact on traditional enterprise data centers. The course consists of sessions covering OCP background, data center subsystems and technologies, network technology, server technology, storage technology, hardware management and metrics, and the disruptive effects of OCP. Participants will learn about OCP fundamentals, components, differences from conventional data centers, and how OCP aims to lower costs through open collaboration and simplified designs. The goal is for participants to understand how OCP approaches can transform enterprise data center operations and infrastructure.
Active Nets Technology Transfer through High-Performance Network DevicesTal Lavian Ph.D.
Deploying commercial high performance network devices to construct a programmable AN platform
Supporting customizable network intelligences
Supporting excellent AN-specific research projects
Addressing AN and optical networking issues
A “meta‑cloud” for building clouds
Build your own cloud on our hardware resources
Agnostic to specific cloud software
Run existing cloud software stacks (like OpenStack, Hadoop, etc.)
... or new ones built from the ground up
Control and visibility all the way to the bare metal
“Sliceable” for multiple, isolated experiments at once
The CMS openstack, opportunistic, overlay, online-cluster Cloud (CMSooooCloud)Jose Antonio Coarasa Perez
The CMS online cluster consists of more than 3000 computers. It has been exclusively used for the Data Acquisition of the CMS experiment at CERN, archiving around 20Tbytes of data per day.
An openstack cloud layer has been deployed on part of the cluster (totalling more than 13000 cores) as a minimal overlay so as to leave the primary role of the computers untouched while allowing an opportunistic usage of the cluster. This allows running offline computing jobs on the online infrastructure while it is not (fully) used.
We will present the architectural choices made to deploy an unusual, as opposed to dedicated, "overlaid cloud infrastructure". These architectural choices ensured a minimal impact on the running cluster configuration while giving a maximal segregation of the overlaid virtual computer infrastructure. Openvswitch was chosen during the proof of concept phase in order to avoid changes on the network infrastructure. Its use will be illustrated as well as the final networking configuration used. The design and performance of the openstack cloud controlling layer will be also presented together with new developments and experience from the first year of usage.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document defines storage area networks (SANs) and discusses their architecture, technologies, management, security and benefits. A SAN consists of storage devices connected via a dedicated network that allows servers to access storage independently. Fibre Channel is the most widely used technology but iSCSI and FCIP allow block storage over IP networks. Effective SAN management requires coordination across storage, network and system levels. Security measures like authentication, authorization and encryption help protect data in this shared storage environment.
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
Solving Network Throughput Problems at the Diamond Light SourceJisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
Electron Microscopy Between OPIC, Oxford and eBICJisc
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
BT Security provides protection for customers by monitoring for potential security incidents and threats. They review BTID operations proactively to prevent incidents from occurring. The talk discussed reactive monitoring, blocking IP addresses temporarily due to reallocation issues, and intelligence scanning to identify ways to improve security processes. BT Security recommends choosing strong, unique passwords and changing them regularly to help protect customer accounts and information.
Data and information governance: getting this right to support an information...Jisc
This document discusses establishing data and information governance to support an information security program. It outlines establishing frameworks for information security and data management with defined roles, policies, procedures and tools. This includes classifying data, establishing data management principles, oversight groups and governance bodies to define strategies, manage risks and ensure compliance. The goal is to understand and promote the value of data assets while protecting confidentiality, integrity and availability. It also describes applying these frameworks and changing roles and responsibilities to better manage information assets.
Cyber crime is increasing in sophistication, impact, and frequency according to a presentation by Charlie McMurdie of PwC. A wide range of threat actors carry out attacks including organized criminals, nation states, hackers, and insiders. Common motivations include financial gain, hacktivism, and espionage. High profile breaches have stolen personal and payment details impacting millions. Companies face direct costs like investigation, indirect costs like loss of customers, and intangible costs like damage to brand. Cyber attacks are now conducted on an industrial scale by organized criminal networks. Recent news reports highlight teenage hackers operating underground forums and groups like Anonymous targeting financial institutions. McMurdie argues a network approach is needed to counter
The document discusses the role of the Chief Information Security Officer (CISO) at the University of Edinburgh. It outlines that the CISO was appointed to provide central leadership on information security risks across the university. The CISO's main responsibilities include leading the information security strategy, managing information security risks from internal and external threats, advising on security threats, and developing security policies and governance. Initial priorities for the CISO included recruiting a security team, focusing on users, overhauling risk governance, and supporting strategic projects. Keys to success are aligning with the university's digital transformation strategy, gaining buy-in from colleges, ensuring business areas own their risks, and providing supporting services through collaboration.
The document discusses cyber incident handling and reporting. It notes that 65% of large firms and 1 in 4 businesses experienced a cyber breach or attack in the past year. It outlines steps for businesses to take to prepare for and handle cyber incidents, including having an incident response plan, understanding network topology, and ensuring key points of contact. It provides details on where to report historic or ongoing cyber incidents and crimes. It also describes the Cyber Information Sharing Partnership (CiSP), a platform for sharing cyber threat information between government and industry.
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
The document discusses the certification and securing of a trusted environment for health informatics research data at the University of Dundee. It provides an overview of the Health Informatics Centre, its research data management platform, safe haven architecture, and ISO27001 certification. The platform standardizes data extraction and release, adds metadata and quality checks. A safe haven uses pseudonymized data and virtual environments prevent data from leaving. ISO27001 certification provides governance and reduces documentation through standardized information security practices.
Nick Moore discusses working with students at the University of Gloucestershire on ISO27001, an international information security standard. He proposes involving computing students who are now in the industry to provide a real-life scenario that builds links between students and staff while developing IT Services' defensive capabilities with a managed risk profile. The key is maintaining balance between business goals, student expectations, and quantified risks.
Closing plenary and keynote from Lauren Sager WeinsteinJisc
Host: Andy McGregor, deputy chief innovation officer, Jisc.
Keynote speaker: Lauren Seger Weinstein, chief data officer at Transport for London.
In our final plenary, we'll hear from Lauren Sager Weinstein.
We'll also be announcing the winners of our edtech start-up competition, as we bring Digifest to a close.
This document summarizes Gareth Llewellyn's experience redesigning the network architecture at DataSift to improve performance and scalability. The initial Cisco-based design suffered from issues like buffering, head of line blocking, and oversubscription of uplinks. Gareth considered moving to an Arista leaf-spine architecture with Arista 7050 core switches and 7048 top-of-rack switches, which would provide better redundancy, scalability, and throughput while reducing complexity compared to the mesh design. Questions are welcomed about the new design.
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)GLC Networks
This document contains the slides for a webinar on networking in telecommunications presented by Achmad Mardiansyah from GLC Networks in Indonesia. The webinar covers the history of telecommunications networking from early systems using wires and human operators to modern digital networks using protocols like SS7, TCP, and IP. It reviews prerequisite knowledge on networking layers and protocols. The webinar demonstrates how signalling works over IP networks and includes a live practice session. Attendees are invited to ask questions. Additional training events are announced and contact information is provided.
100G networking technology is becoming more mature and widely adopted to handle increasing bandwidth demands. It provides significantly higher speeds than 10G networking, with lower latency and higher packet processing capabilities. Key technologies include 100G Ethernet, InfiniBand EDR, and Intel's OmniPath. These support a variety of form factors and can be split into lower speeds. While 100G NICs and switches are available, software and operating systems need improvements to fully leverage the capabilities and handle the throughput, such as integrating RDMA for high performance.
- James Blessing is the Deputy Director of Network Architecture at Future Services. He discussed Ciena's MCP network management software, the need for automation of network provisioning through APIs, and the JiscMail NETWORK-AUTOMATION mailing list as a resource.
- The document then covered topics like Netpath services, layer 2 and 3 VPNs, network function virtualization, IPv6 adoption, the Janet end-to-end performance initiative, science DMZ principles, network performance monitoring with perfSONAR, and working with the GÉANT project.
40 Powers of 10 - Simulating the Universe with the DiRAC HPC Facilityinside-BigData.com
In this deck from the Swiss HPC Conference, Mark Wilkinson presents: 40 Powers of 10 - Simulating the Universe with the DiRAC HPC Facility.
"DiRAC is the integrated supercomputing facility for theoretical modeling and HPC-based research in particle physics, and astrophysics, cosmology, and nuclear physics, all areas in which the UK is world-leading. DiRAC provides a variety of compute resources, matching machine architecture to the algorithm design and requirements of the research problems to be solved. As a single federated Facility, DiRAC allows more effective and efficient use of computing resources, supporting the delivery of the science programs across the STFC research communities. It provides a common training and consultation framework and, crucially, provides critical mass and a coordinating structure for both small- and large-scale cross-discipline science projects, the technical support needed to run and develop a distributed HPC service, and a pool of expertise to support knowledge transfer and industrial partnership projects. The on-going development and sharing of best-practice for the delivery of productive, national HPC services with DiRAC enables STFC researchers to produce world-leading science across the entire STFC science theory program."
Watch the video: https://wp.me/p3RLHQ-k94
Learn more: https://dirac.ac.uk/
and
http://hpcadvisorycouncil.com/events/2019/swiss-workshop/agenda.php
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Datacenters have unique characteristics including massive scale, limited geographic scope, and regular topologies. Their goals include providing extreme bisection bandwidth, low latency, predictable performance, and differentiation between tenants. Traditional network designs do not meet these goals, requiring new approaches that leverage single administration, control over endpoints and traffic placement, and commodity hardware.
Alexis Dacquay – is CCIE with over 10 years experience in the networking industry. He has in the past been designing, deploying, and supporting some large corporate LAN/WAN networks. He has in the last 4 years specialised in high performance datacenter networking to satisfy the needs of cloud providers, web2.0, big data, HPC, HFT, and any other enterprise for which high performing network is critical to their business. Originally from Bretagne, privately a huge fan of polish cuisine.
Topic of Presentation: Handling high-bandwidth-consumption applications in a modern DC design
Language: English
Abstract: Modern Data Centre requires proper handling of high-bandwidth consuming applications, like BigData or IP Storage. To achieve this, next generation Ethernet speeds of 25, 50 and 100Gbps are being pursued. We are to show _why_ these new Ethernet speeds are vital from technology standpoint and _how_ to cope with the those sparkling new requirements by networking hardware enablements. We are to share ethernet switches’ design considerations, with the biggest emphasis put on the importance of big buffers and how they accommodate this bursty traffic. Throughout the presentation we will additionally elaborate on the evolution of variety of modern applications, and how we can handle those with the properly designed hardware, software, and Data Centre itself.
Presentation by Kevin Smith, Vodafone & Chair ETSI NGP (Next Generation Protocols) at the URLLC 2017 conference on Nov. 14, 2017.
*** Shared with Permission ***
Tech 2 tech low latency networking on Janet presentationJisc
This event took place on 27 October 2021.
In this Tech 2 Tech session, we considered questions such as:
- Which types of applications need low latency, and what are their specific requirements for both latency and jitter?
- What levels of latency might you expect across Janet?
- What can you do to optimise latency for your networked applications?
- How can we measure latency and jitter?
Named Data Networking Operational Aspects - IoT as a Use-caseRute C. Sofia
The document discusses Named Data Networking (NDN) and its operational aspects, including:
1. NDN claims several gains over IP such as lower latency, reduced congestion, and intrinsic security, but also has challenges like requiring router caches and upgrades.
2. NDN has been tested on experimental testbeds for both fixed and wireless environments, as well as for IoT applications using the NDN-RIOT implementation.
3. Performance evaluations show NDN can forward traffic at rates over 20Gbps but routing approaches need more study, especially for wireless networks. The FIT IoT Lab provides an experimental facility for further IoT research.
This document provides an overview of computer networks, including definitions, components, models, and transmission modes. It defines a computer network as a group of connected devices that share communication channels and resources. The key points are:
- Computer networks use protocols to organize traffic transmitted over wired or wireless pathways between devices.
- The two main network technologies are peer-to-peer and client-server models. Client-server has dedicated servers and clients, while peer-to-peer allows any device to serve or request resources.
- Network topologies include bus, ring, star, mesh, tree and hybrid configurations. Transmission modes are simplex, half-duplex and full-duplex.
- Thunderbolt is a high-speed I/O technology developed by Intel that provides data transfer speeds of 10Gbps per channel (20Gbps total). It supports DisplayPort and PCIe protocols over a single cable.
- Key features include high speeds, support for daisy-chaining up to 6 devices, and the ability to carry both data and video on a single cable. It also supports power delivery for bus-powered devices.
- The protocol uses a dual channel architecture with PCIe and DisplayPort protocols mapped onto the transport layer. Controllers contain a switch to connect multiple ports and protocols.
This document provides a summary of network security concepts covered in Week 7 of a CISSP training course. It discusses authentication protocols like RADIUS and SNMP, as well as remote access services such as Telnet and protocols like TCP/IP. It also covers network device types, topologies, and common network attacks such as denial of service, spoofing, and session hijacking. Countermeasures discussed include network segmentation, firewalls, patching, and log monitoring.
The document announces a community launch event for digital storytelling in January 2024. It discusses using digital storytelling in higher education to support learning and teaching. Examples include using digital stories for formative assessment, reflective exercises, and research dissemination across various disciplines. Feedback from students and staff who participated in digital storytelling workshops was very positive and found it to be transformative and help give voice to their experiences. The document also profiles speakers who will discuss using digital stories to explore difficult concepts, hear the student voice, and facilitate staff reflections. It emphasizes that digital storytelling can introduce humanity and creativity into pedagogy and help develop core skills. Attendees will participate in a Miro activity to discuss benefits, applications,
This document summarizes a Jisc strategy forum that took place in Northern Ireland on December 14, 2023. It outlines Jisc's planned services and initiatives for 2023-2024, including expanding network access and launching new cybersecurity, analytics, and equipment services. It discusses feedback received from further and higher education members on how Jisc can better deliver solutions, empower communities, and provide vision/strategy. Activities at the forum focused on understanding members' needs/challenges and discussing how Jisc can better support key priorities in Northern Ireland, such as affordable infrastructure, digital skills, and cybersecurity for FE and efficiency, student experience, and collaboration for HE.
This document summarizes a Jisc Scotland strategy forum that took place on December 12, 2023. It outlines Jisc's planned solutions and services for 2023-2024 including deploying resilient Janet access, IT health checks, online surveys, SD-WAN services, and more. The document discusses how Jisc engages stakeholders through relationship management, research, communities, training and events. It summarizes feedback from further education and higher education members on how Jisc can improve advocacy by delivering the right solutions, empowering communities, and having a clear vision and strategy. Finally, it outlines activities for the forum, including understanding members' needs and priorities and discussing how Jisc supports national priorities in Scotland.
The Jisc provided a strategic update to stakeholders. Key highlights included:
- Achievements from the last year like data collection and analysis following the HESA merger, digital transformation support, and cost savings from licensing deals.
- Customer testimonials from Bridgend College on extending eduroam and from the University of Northampton on curriculum design support from Jisc.
- Priorities for the coming year like connectivity upgrades, new cybersecurity services, and improved customer experience.
- A financial summary showing income sources like membership fees and expenditures on areas like connectivity and cybersecurity.
This document summarizes VirtualSpeech, a company that provides virtual reality (VR) and artificial intelligence (AI) powered professional development training. It offers over 150 online courses covering topics like public speaking, leadership, and sales. Users can practice skills in immersive VR scenarios and receive feedback from conversational AI. The training is used by over 450,000 individuals across 130 countries and 150 universities. VirtualSpeech aims to enhance traditional learning with interactive VR practice sessions and real-time feedback to boost skills retention.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
Science DMZ at Imperial
1. Science DMZ at Imperial
Phil Mayers, Campus network engineering workshop
19/10/2016
1
2. Science DMZ at Imperial
Phil Mayers <p.mayers@imperial.ac.uk>
3. About Imperial
● 14,700 students, 8,000 staff
● Focused on science, engineering, medicine and business
● 6 major campuses in London, also Silwood Park, and medical sites
● Perhaps more centralised IT than many universities?
● Dual 2x10G connections to JANET
● Various sponsored a.k.a. BCE customers (NHM, Science Museum, NHS trust)
● GridPP / HEP work - close relationship with researchers
4. Campus network
● Decent size network - ~2400 switches, ~2300 APs, 15k simultaneous wifi users,
>60k devices on-net including PCs, wifi/BYOD, SCADA, VoIP, etc.
● Campus to internet throughput ~2Gbit/s average, ~6Gbit/s peak (Oct 2016)
● Fully dual-stack network - 20-40% IPv6 by throughput, 15% by flows
● Typical architecture - switch, dist, router, core, firewall, wan
5. HEP group
● Main HEP grid cluster processes data for the LHC experiments, other
physics experiments/projects & non-physics communities
○ CMS, LHCb, ATLAS, LZ, COMET, biomed & pheno are the main users
● 275 compute nodes (~4000 cores) connected on 1GbE
● 55 storage nodes (~3.7PB of disk) connected on 10GbE
● Simple stacked top-of-rack switches for connectivity
● Majority of WAN traffic is CMS local-storage <-> remote-storage
○ Popular datasets are automatically placed at CMS sites
○ Users can also request data: 50TB+ dataset requests not uncommon
● Local compute nodes can read remote storage over WAN (and vice versa)
○ Generally low rates compared to storage-storage transfers
9. Issues faced
● Firewalls
○ Straight throughput
○ TCP window checking and other stateful inspection
○ Latency and jitter interfering with throughput
○ Impact on other traffic e.g. Office 365 is quite latency-sensitive with the Outlook client
● Equipment costs
○ Need the right size pipe at every forwarding hop
○ Building edge -> dist -> router -> core -> firewall -> WAN edge
○ A lot of those devices are of a class where fast ports are disproportionately costly
■ “Typical” campus router - approx. £1-2k for a 10gig port
■ 1U 48-port 10G switch - approx. £200 for a 10gig port
10. Solution - Science DMZ
● Had no idea it had a name when we built it!
● Separate L3 switch, outside firewall, routes HEP traffic straight onto core and
onward to JANET
● Simple stateless ACLs for outer tier of security
● Fewer hops, shallower buffers, cheaper kit, wider pipes
● HEP @ Imperial - 4x10G ports to HEP, dual 2x10G ECMP to JANET
○ Split HEP into two subnets, use BGP communities outbound to split inbound traffic
○ Necessitates HEP managing which node IPs are used for transfer
11. Results - recent past
● Quite capable of driving 4x10G at >99.5% utilisation
● Apologies for the graph - low resolution and hourly averages hiding peaks
○ Don’t be fooled - 30-second and 5-minute averages on all 4 10G links to JANET were >99% load
13. Benefits
● Works - capable of driving campus connectivity to capacity
● Cheap - equipment cost on our side manageable
○ As long as upstream connectivity exists, of course
● Easy - no need to poke at firewalls or building edge to improve throughput
14. Issues
● Works too well!
● At capacity, it can drive other traffic off the campus links
○ 64 bytes from ...: icmp_seq=856 ttl=49 time=104 ms
○ from a typical 2ms to the same site
○ Have seen 10gig links running at essentially 100% for >1 hour
● Need to ensure enough spare capacity for other uses
○ Rate-limiting port channels (shudder)
○ Rate-limit $here - sure it’ll be hashed to the same bundle members at $nexthop?
15. Results - Thu 13 Oct
Latency across one leg of default route, versus throughput on same
Noticeable to customers… not great. But very impressive throughput!
16. Issues - Mark 2
● Cheap switches are cheap for a reason
● Doesn’t solve distance and fibre issues
○ Want to run in excess of 10G at distances of >10km? Get ready for a lot of zeroes
○ Fibre capacity on inter-site links (install & recurrent costs)
○ Or use DWDM (skills & training, tools, monitoring) - we do this
● Question mark over dual-use systems - is it appropriate to attach to DMZ
○ Can you do a windows domain login from a DMZ?
● Our implementation requires HEP team to split transfer nodes across two
subnets, to make use of both inbound paths
● Security policy - speak to your IT Security team first!
17. Thoughts
● We are considering making Science DMZ a core part of network architecture
○ 100G still not cost-effective for widespread campus deployment - particularly if you are
geographically distributed
○ Build parallel cheap/fast DMZ network, hook together at JANET & datacentre?
○ Present DMZ where needed (distance & fibre issues though…)
● Considerations
○ Equipment in normal office/lab locations e.g. high-throughput gene sequencers
○ Separate switches in wiring closets - have to manage patching, labelling, training
○ Spurious requests - people think they can drive 10gig and cannot
● Only applicable for mature research efforts with good tooling, IMO
○ Took GridPP community many years to be able to drive these speeds
18. Recommendations
● Speak to researchers!
● Consider appropriate cost/benefit of implementation
○ Cheap vs. high-end routers
○ Fixed versus expandable
● How will you scale, monitor, manage
○ Counters, API, routing/switching capability
● Consider your upstream capacity
19. LHCONE - if we have time
● Overlay L3VPN - used to steer HEP traffic down separate links
○ Funding reasons
● Imperial already do L3VPN internally for network segmentation
○ JANET presented LHCONE as 802.1q-tagged subint & BGP peering, into L3VPN on core
○ Core presents as 2x “peerings” (internet & LHCONE) to Science DMZ router
○ DMZ router follows routing table (401 IPv4 & 146 IPv6 BGP routes)
● Basically works
○ Very impressive throughput
● Reservations internally about ultimate scalability of this model
○ If we had a multi-researcher Science DMZ - how would that work?
○ Policy routing? Shoot me now please...