1 Web 2.0 in a Virtualized World: Building an Architecture for Growth Presented by: Lori MacVittie Technical Marketing Manager, Application Services.

Slides:



Advertisements
Similar presentations
Deloitte Technology Fast 500 Asia Pacific Winners Accelerating Your Network WACC Technology.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
1 Agregando Inteligencia a la red Patricio Dueñas C. Country Manager F5 Networks - México.
Network Systems Sales LLC
Oracle IDM at First National Bank
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Citrix Partner Update The Citrix Delivery Centre.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Barracuda Networks Steve Scheidegger Commercial Account Manager
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
Internet Vulnerabilities & Criminal Activities 1.2 – 9/12/2011 Structure of Internet Communications 1.2 – 9/12/2011 Structure of Internet Communications.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Access Gateway Operation
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Chapter 4: Core Web Technologies
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Ch 11. Integrated Architecture for Wireless Myungchul Kim
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Exchange Exchange Server Role Architecture in Exchange Server 2013 Server roles in Exchange Server 2013: Client Access Server Mailbox Server Client.
Serveur Internet sous Windows NT Eric Lapaille (c) 1996.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
World Wide Web Aaditya Bhatia CS 147. Agenda History OSI model Hardware IP address DNS Server - Client Peer-to-peer Web-Sites Web programming Search engines.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Building Rich Web Applications with Ajax Linda Dailey Paulson IEEE – Computer, October 05 (Vol.38, No.10) Presented by Jingming Zhang.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Internet Architecture and Governance
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
OpenField Consolidates Stadium Data, Provides CRM and Analysis Functions for an Intelligent, End-to-End Solution COMPANY PROFILE : OPENFIELD Founded by.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
Feeling RESTful? Well, first we’ll define a Web Service –A web page meant to be consumed by a computer via an autonomous program as opposed to a web browser.
Microsoft TMG End of Life. Who is Barracuda? Barracuda Networks Established: 2003 Headquarter: Campell, CA Employees: Customers: Market:
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Presented by: Philippe Bogaerts Sr. Channel Field Systems Engineer Benelux Building an agile IPv6 infrastructure.
1 F5 BIG-IP and NetApp FlexPod F5 is a NetApp Advantage Alliace Partner with continuous engagement across teams in product management, product development,
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
F5 BIGIP V 9 Training.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Forefront Security ISA
Data Networking Fundamentals
IIS.
Introducing ProxyClient
Application Traffic Management Making the Network Intelligent
Route web traffic using Azure CLI
Presentation transcript:

1 Web 2.0 in a Virtualized World: Building an Architecture for Growth Presented by: Lori MacVittie Technical Marketing Manager, Application Services

2 THE WEB 2.0 STACK FORUMS WIKIS COLLABORATION VIDEO SYNDICATION PODCASTS INTERACTION LIVE CHAT C O M M U N I T Y ajax rss rdf rtsp sip http xml soa

3 XML SOAP AJAX JSON SIP RTSP HTTP RSS RDF Oracle OWA IMAP SMTP MAPI OFFICE 2007 SAP POP3 XAML FTP

4 A set of technologies most often associated with AJAX but also including other XML-based dynamic data exchanges –RSS / RDF –Mashups –Tag clouds DOM APPLICATION FRAMEWORK REST POX HTTP WCF JSON HTTP SOAP XMLHTTPRequest Web 2.0 Technologies

5 One-to-one relationship between a “FORM” and a server-side script or application One-to-one relationship between many components and server-side scripts or applications Web 2.0 Traditional Web

6 WWW-URL-ENCODED WWW-URL-ENCODED JSON JSON JSON JSON JSON JSON XML XML XML XML XML XML XML XML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML SOAP SOAP SOAP SOAP SOAP SOAP XML XML XML XML XML XML XML XML Web 2.0 Challenge: More Scripts, More Formats

7 Web 2.0 Challenge: Browser Limitations Connection #1. OK Connection #2. OK Connection #3. TIME OUT. …slows down applications …leads to unresponsive applications

8 Web 2.0 Challenge: Longer Sessions, More Connections, More Requests …supports fewer concurrent users …consumes more server resources Server Resources Please try again later

9 Server sends back response that tricks client into modifying existing behavior of client Client makes a request to load a page Client sends data to server Client is tricked into sending same data to another server ATTACK SUCCESSFUL! Web 2.0 Challenge: JavaScript Execution

10 The Application Delivery Challenge Keeping up with a rapidly evolving set of applications, protocols, and security risks while maintaining existing application availability and security And you can’t make the day longer than 24 hours although you can have an extra day every 4 years* *Disclaimer: Offer prohibited at the turn of the century except when evenly divisible by 4. Some restrictions apply.

11 CRM SFA ERP SFA CRM SFA SSL Acceleration Network Point Solutions Applications Users Server Load Balancer Rate Shaping DoS Protection Application Firewall Content Acceleration Traffic Compression Connection Optimization Custom Application Mobile Phone PDA Laptop Desktop Co-location A Growing Network Problem

12 ROUTERS SWITCHES FIREWALLS Intelligent Applications Intelligent Client Network Plumbing Application Delivery Network

13 A New Level of Intelligence React to a Single Communication, One Direction Packet Based React to a Real Time, Two-Way Conversation Translate Between Parties Flow Based Legacy Approach ADN

14 Web 2.0: Secure. Fast. Available. Available Fast Secure Unified Network/Application Infrastructure Services Web 2.0 Clients AJAX REST POX JSON WS-* POST GET Web 2.0 Services Desktop Unified Architecture

15 Web 2.0 Solution: Application Security DoS and SYN Flood Protection Network Address/Port Translation Application Attack Filtering Certificate Management Resource Cloaking Advanced Client Authentication Application Security Module XSS & SQL Injection Evasion Secure OptimizedAvailable Firewall - Packet Filtering Selective Content Encryption Cookie Encryption AES Encryption Content Protection Protocol Sanitization Basic Firewalling XML Threat Prevention

16 Web 2.0 Solution: Acceleration and Optimization Services SSL Acceleration Quality of Service Connection Pooling Intelligent Compression L7 Rate Shaping Content Spooling Secure OptimizeAvailable Content Buffering TCP Optimization Stack Brokering Content Transformation Dynamic and Static Caching

17 Web 2.0 Solution: Availability Services Comprehensive Load Balancing Advanced Application Switching Customized Health Monitoring Intelligent NAT Intelligent Port Mirroring Universal Persistence Response Error Handling Secure OptimizeAvailable Session / Flow Switching Transformation / Content Rewriting IPv6 Gateway Advanced Routing Connection Management Session Management

18 Web 2.0: Secure, Fast, and Available DOM APPLICATION FRAMEWORK REST POX HTTP WCF JSON HTTP SOAP But…

19 …What about Virtualization? Unified architecture for physical and virtual resources? Dynamic provisioning? Center-less data centers? Reduced costs overall?

20 Access Virtualization The State of Virtualization EMC PC - Home App. Server PC - LAN WLAN Windows file storage Application and Server VirtualizationStorage Virtualization NetApp Cell Remote - WAN Application and Server Virtualization Data Center & Link Virtualization Web Server OS Virtualization Web Server

21 Imagine, If You Will..

22 The Sum of the Virtual Parts Virtual Data Center Data Center Orchestration Unified Access Control Service Policy Management Manage Delivery Service Requests

23 Challenges Ahead! Bureaucratic IT Silos Single-Vendor Solutions No Integration No Management No Sum of the Parts Solution Lack of Focus

24 The Next Steps Break the Barriers Understand the Value/Cost Integration and Management Focus on the End-Game

25 Secure. Fast. Available.