Issue OverviewNetwork Evolution - November 2010 Vol. 1, No. 1
This issue of the Network Evolution E-Zine will cover the road to flat Data Center network architecture. Learn about how to design a high-performance network with virtualization in mind. We'll help you understand virtualization security, virtual cluster switching, and more. Get your biggest ATA over Ethernet questions answered, and find out if it's a good solution for converged data center networks. We'll help you weed through the vendor hype, and explore ways to build a flatter converged data center network. Finally, read a case study about The New Mexico Human Services Department, and how they implemented a virtualization security plan that had all core applications running on virtual machines. Access >>>
Premium Content for Free.
ATA over Ethernet for converged data center networks? No way
ATA over Ethernet is pitched as a solution for converged data center networks, but ATAoE has a host of technology shortcomings, including a lack of packet loss recovery and shaky security, according to Fast Packet blogger Ivan Pepelnjak. So why bother?
Virtual cluster switching: Finding management in a flat network
by Michael Brandenburg, Technical Editor
Using virtual cluster switching, the UCLA Laboratory of Neuro Imaging manages dozens of switches as one switch in a flat Layer 2 network for high-performance computing.
- ATA over Ethernet for converged data center networks? No way
Navigating the road to flatter, converged data center networks
by Shamus McGillicuddy
IT professionals explore the process of building converged data center networks based on expectations of vendors’ promises, as well as their reservations, the benefits and technicalities of this technology.
- Navigating the road to flatter, converged data center networks by Shamus McGillicuddy
Virtualization security plan: Replacing physical separation
by Rivka Gewirtz Little, Senior Site Editor
The New Mexico Human Services Department implemented a virtualization security plan that ensures security of core applications running on virtual machines.
- Virtualization security plan: Replacing physical separation by Rivka Gewirtz Little, Senior Site Editor
More Premium Content Accessible For Free
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...
Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...
Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, ...