1 / 47

Labman

Labman. Trash To Treasure Presenter: Shayne Cardwell. What We Do. Promote the mutual understanding and bonds among students, faculty and staff. Coordinate learning and awareness events regarding computers and technology. Provide educational and technical assistance to members in need.

lavender
Download Presentation

Labman

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Labman Trash To Treasure Presenter: Shayne Cardwell

  2. What We Do • Promote the mutual understanding and bonds among students, faculty and staff. • Coordinate learning and awareness events regarding computers and technology. • Provide educational and technical assistance to members in need. • Promote the awareness of alternative operating systems. • Work with the community to expand our understanding of technology.

  3. Recycled Machines

  4. What Can Be Done • Cluster Technology • Rendering Farm • Simultaneous Task Completion • Security Auditing For Research • Storage Farm • Open Source Routing • Smoothwall • Vyatta

  5. Big Intimidating Task Computation Hybrid pictures

  6. Big Intimidating Task Computation Hybrid pictures continued

  7. Big Intimidating Task Computation Hybrid pictures continued

  8. Big Intimidating Task Computation Hybrid pictures continued

  9. Big Intimidating Task Computation Hybrid pictures continued

  10. ClusterKnoppix Clustering with Linux

  11. ClusterKnoppix • ClusterKnoppix is a derivative of Knoppix, based on Debian • ClusterKnoppix aims to provide the same core features and software as Knoppix, but adds the openMosix clustering capabilities also • Designed to be a complete Linux distribution, running the largest possible array of desktop user applications. • Knoppix provides this facility without actually “installing” the operating system onto local storage media

  12. CHAOS • CHAOS is not intended to be fully-laden with application software; • CHAOS is designed to be a compact Linux and openMosix distribution that is secure and highly distributable. • CHAOS does not interfere with the host operating system, running entirely from RAM it also frees the CDROM boot media • Well suited as a minimized “drone node” distribution. • Biggest advantage of using CHAOS is its focus on security and deployment methodology

  13. CHAOS • CHAOS is the first Linux and openMosix distribution to add native network security to the cluster deployment • Every node in the cluster does its own packet filtering, and establishes IPSEC tunnels as required • This is performed transparently, requiring no user intervention. • CHAOS is capable of PXE booting new nodes

  14. Gluster Storage Platform Storage Systems

  15. Gluster Storage Platform • A complete storage operating system/platform built on GlusterFS cluster file system that can be easily installed on industry standard commodity hardware • Efficient installer that enables quick install and boot of first server, with disk formatting done post install, and supports remote install of subsequent servers • Integrated easy to use and feature rich web-based management UI that makes installation and configuration of large clustered storage systems quick and simple. Key management interface features are: • Volume manager • Resource manager • Server/disk manager • Log viewer • Built in, pre-configured support for 10GigE and Infiniband (Open Fabrics) making it easy to utilize these hi-speed server interconnects

  16. Advantages Of Gluster Storage Platform • Open Source Petabyte-Scale Clustered Storage • Scalability • Performance • High Availability • Easy Deployment & Management • Optimized for Virtual Servers • Kernel Independent • Quick, Flexible Setup • Flexible Modular Design

  17. Minimum Requirements for Gluster Storage Platform • 1GB USB Disk as Install Media • 1 or more storage servers (or virtual machines) with minimum configuration as follows: • Disk 8GB • Memory 1GB • Intel/AMD 64bit hardware • 1GigE or 10GigE or Infiniband

  18. Mirror Visual Example

  19. Open Source Routing

  20. Smoothwall Express Open-Source Firewall Project

  21. Capabilities • Supports LAN, DMZ, and Wireless networks, plus External. • External connectivity via: Static Ethernet, DHCP Ethernet, PPPoE • Port forwards, DMZ pin-holes • Outbound filtering • Timed access • Simple to use Quality-of-Service (QoS) • Traffic statistics • Per interface • Per IP • totals for weeks and months • IDS via automatically updated Snort rules • UPnP support • Blacklist

  22. CLI Support

  23. VPN Setup

  24. Vyatta Open-Source Routing

  25. Vyatta • Who or What is Vyatta? • Why consider Vyatta?

  26. An Epic Battle Cisco vs.

  27. Cost

  28. Cost

  29. Virtualization • optimized to run in virtual environments to manage traffic and enforce policies • Examples • Consolidation - Inter-VM Security • Hypervisor / Platform Protection • Consolidation - SMB/Branch Resource Maximization • Consolidation - Datacenter Resource Maximization • Live Migration - Redundancy, Failover & Testing • Application Density - Horizontal Virtualization • Cloud Security - Datacenter to Cloud VPN  • Cloud Security - Cloud to Cloud VPN & Routing

  30. Consolidation - Inter-VM Security

  31. Hypervisor / Platform Protection

  32. Branch Office Application Virtualization

  33. Consolidation - Datacenter Resource Maximization

  34. Live Migration - XenMotion and VMotion for Redundancy, Failover & Testing

  35. Application Density - Multiple vRouter, vFirewalls in a Single Device

  36. Cloud Security - Vyatta VPN from Datacenter to Cloud

  37. Cloud Security - Vyatta for Cloud to Cloud VPN & Routing

  38. An Epic Battle Cisco vs

  39. The end

More Related