Showing posts with label Network Management. Show all posts
Showing posts with label Network Management. Show all posts

Monday, November 27, 2017

Net Neutrality: Dodging Government Bullets & Disabling The Shooter

Abstract:

The Internet had been an open agreement between various peers, where one organization chooses to allow access from another peer organization if they both provide similar traffic patterns. Mutual organizational agreement with unfettered freedom in the United States had created the most aggressively growing and robust redundant network the world has ever known. Freedom in the United States had changed with the former Presidential appointees producing some 400 pages of regulation on behalf of political donors... and the search for freedom is happening again.

What is The Internet?

The world-wide community of volunteers created the Internet Engineering Task Force (IETF) to perform the care-taking aspects of The Internet. The Internet's stewards define The Internet as:
The Internet: A large, heterogeneous collection of interconnected
systems that can be used for communication of many different types
between any interested parties connected to it.  The term includes
both the "core Internet" (ISP networks) and "edge Internet"
(corporate and private networks, often connected via firewalls,
NAT boxes, application layer gateways and similar devices).  The
Internet is a truly global network, reaching into just about every
country in the world.
 They have declared their support
The IETF community wants the Internet to succeed because we
believe that the existence of the Internet, and its influence on
economics, communication, and education, will help us to build a
better human society.
  Ultimately, The Internet has been a self-regulating body. They define their scope as:
The Internet isn't value-neutral, and neither is the IETF.  We want
the Internet to be useful for communities that share our commitment
to openness and fairness.  We embrace technical concepts such as
decentralized control, edge-user empowerment and sharing of
resources, because those concepts resonate with the core values of
the IETF community.  These concepts have little to do with the
technology that's possible, and much to do with the technology that
we choose to create.
 The "concepts" embraced by The Internet's Stewards have experienced some difficulty, lately.

[1995-2010 Internet Usage Trend, courtesy tubularinsights]

Protecting The Internet For Fair Use and From Abuse

There is NEVER enough bandwidth on a telecommunication carrier's network to provide peak possible bandwidth for all customers at the same time. Customers are over-provisioned and share resources at different points along the entire way. This becomes especially noticeable during peak times, like breakfast, lunch, students coming home from school, adults getting home from work. Most people want to be able to check email, check voice mail, check social media accounts, do homework, submit papers from home, get the news, etc. Normally, these are interactive protocols, where user experience suffers the most during peak times.

The U.S. Government protected legitimate application providers, who compete with the carriers. (i.e. Vonage vs Madison River in 2005), while allowing carriers to protect normal interactive web surfing customers from a few heavy network bandwidth non-interactive [mostly illegal] bulk file tools (i.e. peer-to-peer transfers 2007.) Most people complain about traffic being sporadically blocked. Carriers maintain heuristics of the traffic volumes, times, and when they get the most trouble ticket calls in from their customers. Reducing trouble calls from a majority of paying customers is a high priority, with shared resources... especially when bulk transfers can resend data with little impact when people's usage of interactive usage diminishes. As time progresses, the percentage of interactive web traffic (and "other" traffic) is getting increasingly squeezed by Video.

[Indigenous peoples protecting from Viking Invaders, courtesy IFTN ]

Protecting The Internet from Attack

Recently, the Internet Engineering Task Force (IETF) has come out against intrusion into Privacy by Hacking by various Government and Criminal Organizations. The Internet's care-takers had released a clear public memo regarding privacy in 2014 - RFC7258:
Abstract

Pervasive monitoring is a technical attack that should be mitigated
in the design of IETF protocols, where possible.
 
Status of This Memo

This memo documents an Internet Best Current Practice.

This document is a product of the Internet Engineering Task Force
(IETF).  It represents the consensus of the IETF community.  It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG).
This 2014 decision placed the Internet's Care-Taker in direct competition with: Criminal Organizations, trying to steal identification information for nefarious purposes; Terrorist Organizations, trying to kill, maim, and destroy the lives of civilians; Government Organizations, trying to monitor terrorist activity in order to fulfill their role in protecting citizens.


[Ethernet Cable, courtesy The Register]

Government Attacks The Internet

Soon after The Internet Engineering Task Force suggests government was a hostile actor through "pervasive monitoring" (along with organized crime, terrorists and criminals, one might suppose), government regulators proved they were.

[Funny Video Entertainment, courtesy The Archive]

Net Neutrality: Pretext for Bondage Required

People do not normally give up their freedom, without a fight, and people do not normally successfully take away freedom without a pretext. The 2015 FCC rules for Government to constrain The Internet did not occur in a vacuum.

[Kowtow or bowing image, courtesy Wikipedia]

Net Neutrality: Failed Election Results & Campaign Donors 

January 2014, a federal appeals court struck down FCC’s first Internet Regulation attempt.

After an election year beating, November 2014, the former U.S. President demanded regulation of the Internet. The Crony Capitalists the former President kowtowed to, in order to reward them for their campaign dollars during a horrible Democratic election season, had their demands revealed by the New York Times:
Etsy, Kickstarter and Vimeo, among others, met with Megan J. Smith, Mr. Obama’s chief technology officer, and other senior officials to ask the president to lean on the F.C.C. to impose the stricter rules
When the big campaign donors come, one can be sure that politicians listen, and the poor political showing became the pretext for the government assault on The Internet. Retribution begins.

The former President used phrases appealing to voters selfishness and populism, with a modern re-branding of Red Communism ideology, declaring that "fast lanes" should not exist for the Internet. (The irony is people buy "fast lanes" to the internet, all the time, when they purchase bandwidth.)


[Bound in Chains image, courtesy Candid Kerry]

Net Neutrality: Binding the Freeman:

In 2015, the U.S. Government published their 400 page Regulation of the U.S. Internet. Some foreign technical journals have tried to put a "positive spin" on American Government putting shackles on previously unfettered Internet, but reciting the Government's suggestion that "400 pages" of regulation is a “light-touch” is preposterous.

Comparing the first (400 page) Internet Rule to ~100 years of "more than 700 codified rules and statutory provisions" placed on the former U.S. Telecommunications Monopoly is deceptive, at best. This is the beginning of a never-ending cycle of regulation, which will not stop, as demonstrated by decades of history and millions of pages of regulation.


[Formerly Free: Inexpensive Voice Service]

Net Neutrality: Impact the Freeman

As already discussed, The Internet Engineering Task Force caretakers wrote in their mission that the Internet is "used for communication of many different types". Not all communication is equal.

One type of traffic, Voice over IP communication for example, is HIGHLY dependent upon Quality of Service. This means that your voice will sound crackly may echo if the traffic is not prioritized to run faster than other traffic (like a web page loading, a pirated movie download, or movie streaming.) In the past, companies were able to pay for their traffic protocol to be prioritized for timely service (consuming no additional bandwidth), but that has now been made illegal.


[Man being whipped, courtesy Citizen Warrior]

Net Neutrality: VoIP - The First Whipping Boy

Reading through the 400 page Executive Branch Edict document shows one of the very first victims:
18. No Paid Prioritization.
Paid prioritization occurs when a broadband provider accepts payment (monetary or otherwise) to manage its network in a way that benefits particular content, applications, services, or devices. To protect against “fast lanes,” this Order adopts a rule that establishes that:
A person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not engage in paid prioritization. “Paid prioritization” refers to the management of a broadband provider’s network to directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, resource reservation, or other forms of preferential traffic management, either (a) in exchange for consideration (monetary or otherwise) from a third party, or (b) to benefit an affiliated entity.18
The underlining was for clarity. The IETF clearly understands that "communications of many different types" requires different treatment. The technical mechanisms of achieving these communications include what was just made "illegal", without Congress even writing a law! What does footnote 18 say?
18. Unlike the no-blocking and no-throttling rules, there is no “reasonable network management” exception to the paid prioritization rule because paid prioritization is inherently a business practice rather than a network management practice.
VoIP traffic was certainly in the cross-hairs, when this rule was made. Any protections designed by groups of "smart people" over man years had been made illegal, through the stroke of a pen. This appears to be a "Crony Capitalism" move, by the former Administration appointees, eliminating competition with those who are not one of the big three carrier types (i.e. wireless, wire-line, and cable.)

Any college drop-out who took Telecommunications 101 understands the need for different types of service, such as Voice over IP. There is a cost, to manually create the rules, manually check the rules, and provision such rules. Requesting reimbursement for manual processes of unique customer traffic with special timeliness needs, to implement IETF engineering solutions, is certainly reasonable. If it were not "reasonable" - the industry would not have invested thousands of man-hours solving the technical problem. The politicians were clearly unreasonable.


[Remote Surgical Robot, courtesy Wikipedia]

Net Neutrality: Medicine - Killing Lifesaving Innovation

Voice over IP is not the only type of service which could require prioritization. Prioritization is only one of the methodologies now illegal to use on The Internet, to guarantee Quality of Service, through minimizing latency and optimizing connectivity. Highly skilled surgeons performing remote control operations via robots to small hospitals in remote rural areas in a nation or third world countries require Quality of Service.
The first true and complete remote surgery was conducted on 7 September 2001 across the Atlantic Ocean, with French surgeon (Dr. Jacques Marescaux) in New York performing a cholecystectomy on a 68-year-old female patient 6,230 km away in Strasbourg, France. It was named Operation Lindbergh.[5] after Charles Lindbergh’s pioneering transatlantic flight from New York to Paris. France Telecom provided the redundant fiberoptic ATM lines to minimize latency and optimize connectivity, and Computer Motion provided a modified Zeus robotic system. After clinical evaluation of the complete solution in July 2001, the human operation was successfully completed on 9/7/2001.
This life saving technology, dating back ~15 years, has been conducted over The Internet, reducing costs.
To date Dr. Anvari, a laparoscopic surgeon in Hamilton, Canada, has conducted numerous remote surgeries on patients in North Bay, a city 400 kilometres from Hamilton.[citation needed] Even though he uses a VPN over a non-dedicated fiberoptic connection that shares bandwidth with regular telecommunications data, Dr. Anvari has not had any connection problems during his procedures.
Requesting to pay to ensure internet traffic for life-saving medical treatment get priority over people watching movies or pirating illegal content at home is now illegal, in the United States... unless one wants to purchase dedicated network bandwidth [a "fast lane"] bypassing The Internet, at a significant premium to the hospitals (and patients) involved.

The cynic might suggest that this was also political payback, negatively impacting the health care of people in rural areas, since these citizens often did not vote for the former Administration or his political party. (The faster the contrary citizens die off, the more quickly political power can be re-consolidated)


[Neo from The Matrix image courtesy DailyPop.in]

Net Neutrality: Fast Lanes Created - Dodging Government Bullets

About a year later in 2016, The Internet has quietly been changing. The Register sums up the issue:
"Today's Problem... Latency and jitter are very real problems for real-time applications like voice and video, and anything over the public internet will experience spikes and variations in both. Peering spats between ISPs can and do cause throughput problems when different locations are on different ISPs. In short, unmanaged public internet is not really a great choice when reliable connectivity..."

Since providers in the United States can no longer prioritize network traffic over the public internet, a redundant network is built along side the Internet connections, and a new case for routing is executed.
...an emerging technology called Dynamic Path Selection (DPS). DPS actually looks at what types of traffic are in use (for example, by looking at destination port numbers) and chooses different paths for the traffic based on that.
...latency-sensitive applications can be fired over managed WAN connections for some or all of the journey. These can ride the MPLS connectivity all the way to the destination, or merely take advantage of the lower latency in order to get to an internet breakout point that is geographically (or logically) closer to the destination.
A similar solution to the Executive Order items made illegal, a little more expensive, but the solution is no longer available for regular consumers and hidden behind the complexity of "cheap internet".


[Self Driving Car Fatality picture, courtesy USA Today]

Net Neutrality: Automobiles - Avoiding Road Deaths

In 2017, a new application appeared, commonly referred to as "self driving cars". Prioritizing real-time network traffic over The Internet, could offer fewer risks to the hundreds of millions of citizens who would be at-risk from a few network packets not reaching their destination in a timely fashion when dealing with road conditions (i.e. obstacles, sudden bad weather, road failures, crashes, etc.)

Of course, just as businesses have always done, if the Net Neutrality rule is not lifted, the Automobile Industry will just build parallel "fast lanes", pass the higher cost down to the wealthier consumer who is able to pay for the cost uplift for safety... or pass the traffic over The Internet [without prioritization] and Americans would suffer the [possibly fatal] consequences of dropped or late packets because of Internet video-on-demand programming, pirating, and porn.


[Russian Jaeger Mark-1 "Cherno Alpha" model from Pacific Rim courtesy GoodSmile]

Net Neutrality: Million Russian Robots to Defend

In 2017, when it became apparent that the previous Government Executive appointees made the only workable solutions [for United States telecommunications, medical, and businesses with other time-sensitive traffic], was to build parallel "fast lanes" everywhere, the call for canceling Net Neutrality became more aggressive.

The call was answered unusually - by millions of Robots, often Robots from Russia, to fight for & against American Citizen interests. The politicization by technically inept decision-makers, to make illegal many man-years of IETF efforts to solve technical problems plaguing common Americans, was bad enough. Calling in robots, to help facilitate even more technically ignorant, to stop the rollback of horrible policy which negatively impacted Americans most vulnerable [who could not afford to buy their own "fast lanes", like the wealthy & businesses could] was completely unreasonable.


[North American Internet Usage by Type as of March 2016, courtesy Statista]

The Changing Face of The Internet

As time goes on, usage on The Internet has changed. The downward trend with pirated copyright material continues declining, with low cost streaming options readily available. Bulk buffered video streaming now dominates the usage, with interactive buffered video streaming as a distant second. All other TCP/IP protocols are now considered marginal, by volume. Peak usage time is becoming evenings, as people passively stream to their televisions at home.

New and innovative protocols will be so small, by volume in comparison, that they will not even be quantifiable on a "Top Usage" graph. These protocols will be heavily impacted during peak congestion times by network traffic far protocols consuming far greater bandwidth. There is a true danger for innovation in the realm of low bandwidth but time sensitive applications, such as real-time IoT applications, which have the potential to greatly enhance the lives of American Citizens, not to mention the world.

Conclusion

December 15th in 2017 is the date for the Net Neutrality showdown. Beware of "Appeals to Selfishness" by those who proclaim a "Noble Cause". All should hope for a simple document, eliminating government coercion, and a return to the IETF to provide technological solutions to technology problems... a disabling of "the shooter."  It is time to end the experiment called "Net Neutrality", end Obama Era "Fast Lanes", add a half-decade's worth of previously over provisioned private "Fast Lane" bandwidth for normal every day Americans on The Internet, and innovate by re-legalizing the offering of Quality of Service guarantees on The Internet for lower bandwidth protocols requiring real-time responsiveness.

Friday, August 21, 2015

Coming Soon: OracleWorld 2015 for Remote Management

[San Francisco California, courtesy Oracle Corporation]

Coming Soon: OpenWorld 2015 (for Remote Management)

The place to be will be Oracle OpenWorld in San Francisco, California during October 25-29.OpenWorld will offer many seminars to attend, but there is also JavaOne! Register & Fly to one of the most anticipated conferences of 2015. Why is this so anticipated?

Seminars & Sessions

There are a variety of seminars, conferences, and hands-on lab activities for just about everything imaginable. For people who are involved in Network, Systems, Database, and Application Management - the most applicable items are listed below. If you find some of these interesting, then you don't want to miss it!

For the Network, Operating System, Database, and Application Management staff:
Way Beyond the Basics: Oracle Enterprise Manager Monitoring Best Practices [CON9721]
Ana Maria Mccollum, Director of Product Management, Oracle
Oracle Enterprise Manager monitoring plays a critical role in enabling IT to provide highly available services to its business. As enterprises optimize their monitoring processes and evolve to adopt Oracle Cloud Platform services, Oracle Enterprise Manager continues to meet these new requirements with significant planned enhancements in monitoring. These include enhancements to metric extensions, adaptive thresholds, user-defined target properties, and corrective actions as well as new capabilities such as the incident manager dashboard, auto event grouping, the export/import of rule sets, and brownouts for planned/unplanned outages. In addition to new features, this session reviews best practices for implementing an effective and scalable monitoring solution.
Conference Session
Oracle Enterprise Manager: One Manager to Rule Them All - Ops Center and Oracle VM Manager.
Upgrading Oracle Enterprise Manager: Why and How [CON9729]
Akanksha Sheoran Kaler, Principal Product Manager, Oracle
The upcoming release of Oracle Enterprise Manager brings, for the first time, a converged management for Oracle hardware and software. It also includes exciting new enhancements to uninterrupted monitoring, hybrid cloud management, and engineered systems management that make the upgrade worth it. This session outlines the new capabilities and provides best practices to seamlessly upgrade your existing environment to the upcoming release of Oracle Enterprise Manager.
Conference Session
Do you use Oracle Middleware? Oracle offers Middleware as a Service with Oracle Enterprise Manager.
Realizing MWaaS on the Private Cloud Using Oracle Enterprise Manager [CON4627]
David Nims, UNIX Platform Architect, Fiserv
Umesh Panwar, Sr. Platform Engineer, Fiserv
Wojciech Serafin, Oracle
Provisioning a large number of middleware assets across multiple environments in a homogeneous way could be a challenging task for the IT organization. Enterprises are looking for an automated process for provisioning these assets within their data center and managing all application lifecycle management tasks using prebuilt flows. This session discusses how Fiserv, a worldwide provider of financial services technology, leveraged Oracle Enterprise Manager to provision and manage more than 500 middleware domains. The solution provided enterprise capabilities for automated, fast, simple, flexible, and reliable deployments based on the Oracle Enterprise Deployment Guide and significantly reduced time to market to provision new applications on its private cloud.
Conference Session
Security for Network Management on your mind? Oracle Solaris 11 with Security Auditing Framework.
Assessing, Reporting, and Customizing the Security Compliance in Oracle Solaris 11.2 [HOL4645]
Qianqian Chen, Oracle
Ling-yun Li, Principal Software Engineer, Oracle
Richard Liu, Senior Software Engineer, Oracle
Report Compliance is one of the new security features introduced in Oracle Solaris 11.2 that provides a framework for assessing and reporting the compliance of an Oracle Solaris system to a given security benchmark. In this lab, learn how to install the Report Compliance tool, run an assessment on the hosting Oracle Solaris against the Oracle Solaris baseline benchmark, generate an HTML report for review, and rerun the assessment after a quick remediation. And last, learn how to customize the benchmark by adding a user-defined check. After this lab, you will understand what Report Compliance is and how to use it to audit the security compliance of an Oracle Solaris system, and have an overall idea of how to customize a benchmark in case of need.
HOL (Hands-on Lab) Session
Use Java for Network & Systems Management (NSM)? Optimize using Solaris 11 with DTrace.
Uncover JDK 8 Secrets Using DTrace on Oracle Solaris 11 [HOL6427]
Gary Wang, Manager, Oracle
Yu Wang, Software Engineer, Oracle
Xiao-song Zhu, Principal Software Engineer, Oracle
JDK 8 is the most innovative version of Java ever. It brings many new features to the Java platform, such as Lambda Expressions, Streams, and Functional Interfaces. For the programmers, these features are easy to use; however, it is hard to understand their internal mechanisms. In this lab, learn how to use the Oracle Solaris 11 DTrace feature to find out how a Java Virtual Machine (JVM) implements these new features, including Streams Pipeline, Lambda Parallelism, Lazy Evaluation, and Recursion Optimizing.
HOL (Hands-on Lab) Session
How big can you make your Java based NSM? Scaling success stories by other applications.
Scaling to 1,000,000 Concurrent Users on the JVM [CON7220]
Jo Voordeckers, Senior Software Engineer, Livefyre
Livefyre built a platform that powers real-time comments and curated social media for some of the largest websites, such as CNN, Fox, Sky, CBS, Coca-Cola, HBO, CNET, Universal Music Group, and Break. On average it deals with one million concurrent users on its systems. Java EE will get you a long way, but with these numbers, the company needed to resort to some often-overlooked computer science tricks and techniques to scale its microservices architecture to handle as many as 100,000 active concurrent connections per JVM. This session covers some of the data structures, patterns, best practices, and datastores that Livefyre uses to make this all happen and keep it running. If you’re in a company with growing scalability pains, this session is for you.
Conference Session
Got Engineered Systems? Take care of them.
Monitor Engineered Systems from a Single Pane of Glass: Oracle Enterprise Manager 12c [UGF10288]
Alfredo Krieg, Sr. Oracle Enterprise Cloud Administrator, The Sherwin Williams Company
Oracle Enterprise Manger 12c provides comprehensive and centralized monitoring capabilities for Oracle engineered systems including Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud, and Oracle Exalytics In-Memory Machine. This presentation outlines the steps required to discover and monitor Oracle engineered systems, as well as the challenges faced and the benefits of using Oracle Enterprise Manager Cloud Control 12c to provide Oracle Exadata health-check reports.
User Group Forum Session
Got Databases? Best practices for managing hundreds or thousands.
How to Upgrade Hundreds or Thousands of Databases in a Reasonable Amount of Time [CON8375]
Mike Dietrich, Master Product Manager, Oracle
Roy Swonger, Sr Director, Software Development, Oracle
Many customers now have database environments numbering in the hundreds or even thousands. This session addresses the challenge of maintaining technical currency of such an environment while also containing upgrade and migration costs at a reasonable level. Learn from Oracle Database upgrade experts about product features, options, tools, techniques, and services that can help you maintain control of your database environment. You will also see examples of how real customers are successfully meeting this challenge today.
Conference Session
Network & Systems Management: The Future of Oracle Enterprise Manager.
The Future of Oracle Enterprise Manager: What’s Next? [CON9708]
Sudip Datta, Vice President of Product Management, Oracle
Oracle has been hard at work on the next major release of Oracle Enterprise Manager, and in this session the speakers are excited to give you a sneak preview of what’s coming. Learn about top new features including Integrated Hardware Management and Federated Enterprise Manager, upcoming Oracle Cloud integrations, and improvements across private cloud and stack management capabilities. Join this session for a glimpse of the future of Oracle’s on-premises private and hybrid cloud management capabilities.
Conference Session
Network & Systems Management: Best Practices with High Availability for Oracle Enterprise Manager
Practical Tips for Oracle Enterprise Manager High Availability and Diagnostics [CON9726]
Angeline Dhanarani, Senior Product Manager, Oracle
Many data centers have come to rely on Oracle Enterprise Manager as their management tool for mission-critical Oracle infrastructure and applications. As such, it is critical to ensure that the Oracle Enterprise Manager deployment is highly available and secure and performs optimally. This session shares best practices for managing an Oracle Enterprise Manager deployment with reduced effort while still ensuring that objectives are met. Strategies include configuring highly available deployments, migrating to a replication-based disaster recovery solution, deploying across networks using a new multiproxy server feature, monitoring and diagnostics of critical subsystems, and securing the Oracle Enterprise Manager infrastructure.
Conference Session
Network & Systems Management: From hundreds to hundreds of thousands of assets using OEM.
Scaling the Limits of the Cloud with the New Oracle Enterprise Manager [CON9731]
Mithun Shankar, Senior Principal Product Manager, Oracle
The cloud is BIG. The cloud is VAST. With cloud computing, the scale of IT has changed from a few hundred assets to hundreds of thousands of assets. This necessitates a newly engineered monitoring, automation, and reporting framework that is nimble, scalable, and real time. The new release of Oracle Enterprise Manager introduces real-time monitoring, a scalable job system that can integrate with the industry’s leading automation frameworks like Chef, and a comprehensive reporting infrastructure. This session covers these new enhancements along with anecdotal experiences from Oracle’s own cloud operations.
Conference Session
Building your own embedded Network Management probe in Java?
Alexander Belokrylov, Principal Product Manager, Oracle
This how-to session demonstrates a develop/build/deploy/debug/execute cycle set from scratch. It is based on Java ME Embedded in combination with various boards, such as the Raspberry Pi, the Freescale K64, and a device emulator. The session includes guidelines and tips on installing the Java ME Embedded SDK and runtime. It also touches on the key aspects of application development and troubleshooting in a simple demo that involves the basic concepts of working with various I/O devices.
Tutorial
Oracle Enterprise Manager: Provisioning Databases, without DBA'
Gustavo Rene Antunez, DBA Team Lead, Pythian
With the newest version of Oracle Database 12c and its multitenant option, we are moving toward an era of provisioning databases to our clients faster than we ever could, even leaving out the DBA and allowing the developers and project leads to provision themselves the database that they need. This presentation guides you through the different ways you can provision data from one Oracle Database to another using Oracle Enterprise Manager 12c.
User Group Forum Session
Oracle Enterprise Manager: Database as a Service
PDBaaS: Oracle Database 12c, Multitenant, and Oracle Enterprise Manager 12c [CON4628]
Krishna Kapa, Pepsico
Malla Santosh, Manager, GCSI, EM Foundation, Oracle
Database as a service (DBaaS) offers organizations accelerated deployment, elastic capacity, greater consolidation efficiency, higher availability, and lower overall operational cost and complexity. Oracle Database 12c provides an innovative multitenant architecture featuring pluggable databases that make it easy to offer DBaaS and consolidate databases in the clouds. This session showcases the implementation of pluggable database as a service (PDBaaS) using Oracle Enterprise Manager 12c and the benefits of consolidating databases into the Oracle Database 12c multitenant architecture, rapid provisioning of pluggable databases using the self-service portal, and maintenance of the pluggable databases.
Conference Session
Oracle Enterprise Manager OpsCenter, My Oracle Support, Maintenance, Upgrades, Patching.
Best Practices for Oracle Solaris Maintenance and Upgrades [CON8705]
David Buxton, Principal Technical Support Engineer, Oracle
Raphy Pallikunnath, Manager, Solaris & Network Technology Service Center, Oracle
Unleash the potential of Oracle Solaris, with an insight into technical resources and proactive support tools. This session looks at best practices for maintaining and upgrading Oracle Solaris. See how to leverage the My Oracle Support portal for both reactive and proactive issues, along with how the My Oracle Support Community can put you in touch with a wealth of knowledge. Enjoy a voyage of discovery to see the benefits and possibilities of using Oracle Enterprise Manager Ops Center features to help maintain and support your data center assets.
Conference Session
Oracle Enterprise Manager: Managing MySQL
Oracle Enterprise Manager for MySQL Database—Latest Features [CON4507]
Carlos Proal Aguilar, Senior Software Developer, Oracle
This session provides an overview of how to use the latest Oracle Enterprise Manager plugin release for MySQL Database to monitor database connections, index usage, replication status, compliance scores, and other key configuration and performance metrics.
Conference Session
Oracle Enterprise Manager: Hands-On for MySQL
Practical Overview of the Latest Features of Oracle Enterprise Manager for MySQL [HOL4522]
Carlos Proal Aguilar, Senior Software Developer, Oracle
In this hands-on lab, participants install and use the Oracle Enterprise Manager plugin release for MySQL to monitor database connections, index usage, replication status, compliance scores, and other key configuration and performance metrics.
HOL (Hands-on Lab) Session
Oracle Enterprise Manager: Monitoring Exadata
Oracle Exadata Monitoring and Management Best Practices [CON9727]
Ashish Agrawal, Group Product Manager, Oracle
Oracle Enterprise Manager uses a holistic approach to manage Oracle Exadata Database Machine, providing comprehensive performance and lifecycle management from testing and deployment to proactive monitoring and ongoing maintenance across the entire engineered system. In this session, hear about new capabilities in the upcoming Oracle Enterprise Manager plugin for Oracle Exadata that includes Oracle Exadata virtualization provisioning and monitoring, the ability to monitor the latest Oracle Exadata hardware, Exacheck (ORAchk), Exadata Sparse Cloning, and the Automatic Service Request capability for Oracle Exadata hardware targets in Oracle Enterprise Manager.
Conference Session
Software Defined Networks with Security and The Cloud
Network and Security Function with Oracle SDN Virtual Network Services [HOL10372]
With cloud data center architectures requiring agility and flexibility in deploying on-demand network services, the traditional approach with purpose-built physical network appliances does not meet the requirements. The Virtual Network Services feature of Oracle SDN (Software Defined Networking) provides the ability to deploy on-demand network services such as firewall, router, load balancer, virtual private network (VPN), and network address translation (NAT) in a single virtual appliance, eliminating the need for proprietary fixed function devices. With centralized management, secure multitenancy, and on-demand provisioning, this allows cloud-enabled data centers to be agile and elastic.
HOL (Hands-on Lab) Session
Monitoring Oracle Exadata Platforms
Get Under the Hood with Oracle Exadata Monitoring [CON10169]
Farouk Abushaban, Senior Principal Technical Analyst, Oracle
In this session, learn how to quickly set up complete monitoring for your Oracle Exadata Database Machine. Our subject matter expert and global technical lead in Oracle Enterprise Manager and Oracle Exadata support shares knowledge gained from working with customer deployments worldwide. Specific topics covered include common challenges, best practices, and new features to get your complete Oracle Exadata Database Machine stack monitored using Oracle Enterprise Manager Cloud Control.
Conference Session
Oracle Enterprise Manager Demonstrations and Features
Oracle Enterprise Manager: The Complete Solution and Oracle’s Best-Kept Secrets [CON9715]
Amit Ganesh, Vice President Enterprise Manager, Oracle
Come to this informative session to learn about the breadth of capabilities in Oracle Enterprise Manager from the head of Oracle Enterprise Manager Product Development. Through a series of product demonstrations, you’ll gain exposure to some of the most powerful features in the Oracle Enterprise Manager product family and see how they work together as a solution. Learn how to get the most out of the features you already use every day as well as how to leverage features you might not yet know about. Finally, receive expert guidance on how to maximize your Oracle OpenWorld experience to understand all that Oracle Enterprise Manager has to offer.
Conference Session
Maintaining and Supporting Oracle Enterprise Manager
Best Practices for Maintaining and Supporting Oracle Enterprise Manager [CON8671]
Rachel Bridden, Principal Technical Support Engineer, Oracle
Marilyn Roncati, Director of Lifecycle Management, Oracle
In this session, learn about best practices, tips, and tools for maintaining and getting the most out of Oracle Enterprise Manager. Experts from Oracle Support offer knowledge gained from working with Oracle customers worldwide. They look at patching, upgrades, issue resolution, and more. Specific topics covered include Oracle Enterprise Manager metrics and health checks, remote diagnostics, communities, and how to receive priority service request handling.
Conference Session
Managing Security with Oracle Enterprise Manager
Raising the Ante on Security with Oracle Enterprise Manager [CON9719]
Angeline Dhanarani, Senior Product Manager, Oracle
Ana Maria Mccollum, Director of Product Management, Oracle
In today’s highly connected world, security is a critical area of concern for both IT and the business. Security teams demand compliance with security best practices and corporate security standards. In this session, learn practical strategies to help you adhere to these standards using Oracle Enterprise Manager. Topics include external authentication, authorization, user management, public and private roles, managing passwords, privilege delegation providers, and secure communications, with a focus on key upcoming Oracle Enterprise Manager enhancements, such as managing DBSNMP accounts, new privileges to manage users, new fine-grained database access privileges, and Transport Layer Security-based communications between Oracle Enterprise Manager components.
Conference Session
Automating Solaris Management with Puppet
Automating Oracle Solaris Administration with Puppet [HOL10359]
Geoffrey Gardella, Senior Quality Assurance Engineer, Oracle
Cindy Swearingen, Senior Product Manager, Oracle
Oracle Solaris 11 integrates Puppet, a configuration management solution that you can use to automate Oracle Solaris administration tasks. In this lab session, learn how to use Puppet to automate Oracle Solaris lifecycle management tasks.
HOL (Hands-on Lab) Session

Sunday, June 24, 2012

Network Management Basics: SNMP

Network Management Basics: SNMP

Abstract:
From the dawning days of The Internet, the network grew from hosts on a wire, to hosts on a wire joined by a bridge to extend electrical signals, to a logical group of hosts on wires being defined as a network and joined to other networks via routers. Throughout these periods, there was always a need for a way to manage the infrastructure, and SNMP is The Internet Standard. The SNMP Internet Standard is a critical piece of total management business requirements.


The Network:
Every device on The Internet has a physical Hardware Address, to facilitate communications on it's own wire, and a logical Internet Protocol (IP) Address, to facilitate communications to other locations, provided through Routers. Someone on that network has to provide the logical IP Addresses, this person is normally some kind of network administrator. This person has some kind of responsibility to manage the network.

[ARPANET diagram, courtesy wikipedia]

The Creation:
Networks were traditionally circuit switched, driven by a telephone company. In 1969, Steve Crocker developed a system to track agreed upon standards, called RFC's (Request for Comments), to facilitate interconnection of networks. The worlds first operational packet switching network came into existence, known as ARPANET (the Advanced Research Projects Agency Network) in 1977.

Ping:
As The Internet started to grow, basic diagnosis utilities were needed. Mike Muuss created a utility called Ping in December 1983. The most important function of this tool was the use of the ICMP Echo Request  (type 8) network packet to another IP Address and the observation of the returned value.

The Manager may send an Echo Request or Ping to a remote device's logical IP Address to see if there is connectivity. If there is no connectivity, no packet is returned, or sometimes an Router in the path may return a message such as "Host Unreachable" or "TTL Exceeded" (packet time-to-live.) The manager may receive additional information such as the time it took for the packet to make the round trip.

Traceroute:
As networks continued to get more complex, the management requirements grew. Traceroute was born, attributed to Van Jacobson in 1987. Now, the manager could send a packet to an agent and receive a path of each router which the packet would traverse, bundling in the round trip times.

The Problem:
Such tools like "ping" and "traceroute" were critical for an individual manager to understand network connectivity - but neither provided in-depth information about the target agent device. A "ping" not being returned did not necessarily mean that the agent or target device is "down". A “ping” returning does not necessarily mean that the agent did not go down a few minutes earlier. A "traceroute" response to another location does not necessarily mean there is a problem with the agent or target device. These tools did not do much to allow a manager to understand history of a device or the intermediate network devices.
SNMPv1:
In 1988, SNMP (now referred to as Version 1) was born, through a variety of published RFC's. SNMP retained many of the advantages of ICMP and Traceroute (light-weight, avoided use of heavy TCP protocol), but brought to the world:
  • programmable name for a device agent
  • programmable location field for a device agent
  • a description of the hardware and firmware on the device agent
  • last-reboot counter of the device agent
  • configuration, fault, and performance knowledge of interfaces (Interface Table)
  • other physical hardware devices connected on the network (ARP Table)
  • other neighboring logical devices connected on the network (Routing Table)
  • passwords (called community strings) for basic protection
  • framework for vendors to extend the management capabilities
This information is held in the MIB (Management Information Base) of the device - a database of information that each device holds regarding the health of the hardware, firmware, operating system, and applications.)

[MIB2 tree illustration courtesy O'Reilly Essential SNMP]

SNMPv1 was made up of RFC 1065, 1066, 1067. Updates included 1155, 1156, 1157. RFC 1213 (called MIB-1) was later updated 1156 (called MIB-2.)

SNMPv2:
In 1993, SNMP Version 2 was created through RFC's 1141-1452. Security was updated, but not widely adopted. Introduced was an efficient way to transfer information (GetBulkRequest) - which was readily adopted, to alleviate concerns of the protocol being "overly chatty".

SNMPv2c:
In 1996, SNMPv2c (Community-Based Simple Network Management Protocol Version 2) was introduced in RFC 1901-1908. The most important added the capability was to encrypt the password (community string) in transit, alleviating the concerns of the protocol being "insecure".

[SNMPv3 message format, courtesy TCP/IP Guide]
SNMPv3:
In December 2002, SNMPv3 was released, comprised of RFC's 3411-3418. In 2004, the IETF (Internet Engineering Task Force) designated SNMPv3 as STD0062 or a Full Internet Standard. Practically speaking, SNMPv3 adds encryption of the payload, to completely secure the protocol.

Modern Computing:
Today, nearly every modern equipment vendor, who instruments their internet equipment for management, bundles SNMP in their standard packaging - since SNMPv3 is The Internet Standard. This means that most equipment that plugs into a network via ethernet or wireless can be managed in an "agentless" manor (i.e. without loading any special additional components.)

Most Internet Infrastructure (i.e. computers, servers, routers, switches, etc.) allow for the following basic capabilities (sometimes using an internet standard, sometimes using vendor extension):
  • Interface Configuration (administratively up, down; interface capacity) 
  • Interface Fault Status (Up, Down, Testing, Last-Change Time-stamp))
  • Interface Performance Statistics (packets, bytes, errors, etc.)
  • SNMP Agent Last-Reboot Timestamp
  • Memory and/or Buffer Usage; Buffer Allocation Errors
  • Flash and/or Disk Capacity and Usage
  • Running Processes
  • Installed Software
  • CPU Usage
  • Alert to a Manager when an Agent detects a problem
Customer Benefit:
Since SNMPv3 is The IETF Internet Standard, most equipment on a network can be reasonably managed without ever adding software to an end device. This means a service provider can provide greater insight into the health and performance of a customer estate with proper management software, especially historical trends when data is captured and stored in a database.

Difficulties:
SNMP is only a piece of the puzzle for managing a network.
  • Business Processes
    A customer must know what business services are traversing a device to understand the impact of an outage or what business processes are at risk when assets in the estate are performing poorly.
  • Security / End-of-Life Management
    A customer must know the version of the hardware and firmware is in the estate in order to understand when a security vulnerability or end-of-life equipment may place their business at risk.
  • Logistics / Asset Management
    A customer must know what assets make up their network estate and where the assets are located in order to understand where impacts originate during faults or where security risks exist.
  • Configuration Management
    A customer must know how to update the firmware on managed devices in the estate when defects in the software may be impacting business processes or creating security risks due to vulnerabilities.
  • Performance Management
    A customer must know what "normal" operation of their estate is, collecting this data over time, in order to predict when faults will arise, so impacts to business processes are minimized.
  • Fault Management
    A customer must know when faults occurred in the past, where they occured, when they occurred, what the problem was, and what the solution was - in order to understand the business impacts and create a strategy to mitigate future similar business impacts.

SNMP is a single skill, which can be leveraged to manage any number of device vendor, types, and model numbers. Network Management requires an expertise in all of the above areas, in addition to understanding SNMP.

This open up a prime opportunity for service providers with experience to assist customers since customers may only have experience with a particular device vendor/model/type or not have experience in SNMP.