Combined Enterprise Regional Information Exchange System Introduction.

Slides:



Advertisements
Similar presentations
© 2008 Tata Communications Transformation Services, Ltd. All Rights Reserved. TRANSFORMATION SERVICES Business Transformation Solution for Carriers May.
Advertisements

My Two Cats Are a Community of Interest Dr. Scott Renner
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Test test Please press the F5 key to begin. (Then, press the Page Up or Page Down keys to move through the following 3 slides.)
Minimising IT costs, maximising operational efficiency minimising IT costs, maximising operational efficiency Balance.
REMOTE VIDEO GUARD SERVICES.. THE CURRENT GUARD SERVICES BUSINESS MODEL.
Communication and Networking Services Networking Services.
Web Page Design Chapter 1 Introducing Networks and the Internet.
BlueRedGreenPurpleOrange.
CENTRIXS: “Interconnecting Coalition Networks”
GETS Transformation Kick Off Active Directory and Blackberry Migration Firewall and Network Changes 04/21/
Nem.con Grandeur Pvt Ltd. Communication solution – CASE STUDY 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Toolbox Mirror -Overview Effective Distributed Learning.
Common Operational Picture
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
BY Zoher & Mahmoud. What is WAMP?  - Acronym for Windows/Apache/MySQL/PHP, Python, (and/or) PERL  - WAMP refers to a set of free open source applications,
ThruLink™ Fixed or mobile security systems Streaming secure, live video over a public network Replacement for leased lines Transmitting data securely from.
Internet.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Computer Networks All you need to know. What is a computer network? Two or more computers connected together so that they can communicate with each other.
NETWORK Topologies An Introduction.
Voice Solutions.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
Network+ Guide to Networks, Fourth Edition
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Feasibility Study of a Wiki Collaboration Platform for Systematic Review Eileen Erinoff AHRQ Annual Meeting September 15, 2009.
A Combat Support Agency Defense Information Systems Agency Multinational Information Sharing (MNIS) August 2011.
1 Information Systems CS-507 Lecture Critical Success Factors (CSF). Critical Success Factor (CSF) is a business term for an element which is necessary.
Information Availability Brett Paulson Sr. VP and Chief Information Officer Board of Trade Clearing Corporation FIA – November 7, 2002.
Chapter 7 Networks and the Internet Networks Sharing resources among multiple computers (workstations) Local Area Networks Wide Area Networks.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Internet Architecture and Governance
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
MX Groups. Page 2 Multiple Sites – What Most are Offering Centralized Intelligence Survivable Gateways at remote sites DISASTER AT MAIN SITE ONLY BASIC.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
NTC 249 edu Experience Tradition/ntc249edudotcom FOR MORE CLASSES VISIT
Administering Windows Server 2012 Question Answer.
SURENDRA INSTITUTE OF ENGINEERING & MANAGEMENT PRESENTED BY : Md. Mubarak Hussain DEPT-CSE ROLL
Basics of Networking & Internet Services Prof. Sadique Khan.
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
WEB APPLICATION Diagram Template
Edited by : Noor Al-Hareqi
Providing Teleworker Services
[Company Name] Veeam Offerings
SAMMS Secure Authorized Monitored Messaging System
Edited by : Noor Al-Hareqi
IS 4506 Server Configuration (HTTP Server)
Providing Teleworker Services
Providing Teleworker Services
CHAPTER Introduction to LANs
Edited by : Noor Al-Hareqi
By Hussein Alhashimi.
Providing Teleworker Services
Presentation transcript:

Combined Enterprise Regional Information Exchange System Introduction

CENTRIXS Background Enclaves Replication Summary

Background We operate in a multi-national coalition environment 24X7. It is incumbent upon us to ensure we can communicate as efficiently and seamlessly as possible. CENTRIXS was designed for that purpose.

Background Incremental advances: RIMPAC 98 – to coalition ships via dial- up to NCTAMSPAC RIMPAC 2000 – RIMPAC web site established, coalition ships received data via Secure Mail Guard (SMG) and web pages Tandem Thrust 2001 – , CAS, Common Operational Picture (COP) & chat services 2003 – CENTRIXS becomes predominant real world coalition communications network

Enclaves There are two Coalition CENTRIXS enclaves: CFE GCTF CENTRIXS FOUR EYES GLOBAL COUNTER-TERROR FORCE ENCLAVE A ENCLAVE C VPN Communities of Interest (COI) such as CNFC and CMFP tunnel through existing enclaves. These COI connections can be established as needed in support of regional or global situations CENTRIXS operates at the SECRET HIGH level within each enclave

Replication Replication is the key to element of CENTRIXS information management and sharing capability A copy of the entire SG web site resides on local servers Users locally access and modify information via CENTRIXS workstations Only changes are replicated from the local server to the master hub server The master hub server then replicates with all other enclave servers

Replication Master hub server replicates via the WAN Benefits include: Reduced bandwidth usage Only changes are replicated Changes are made locally, not via access to a remote server Continuous access to local data, even when off ship connectivity is unavailable

Summary History Enclaves Replication Summary

Questions / Comments