SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
CLOUD COMPUTING FOR NATIONAL SECURITY APPLICATIONS
                                                                         A DATALINE WHITE PAPER

INTRODUCTION

Through collaboration with leading industry partners, Dataline is integrating an end-to-end
solution for secure cloud computing. Called Service Oriented Architecture – Real Time (SOA-
R), this solution integrates:
•   Real-time services oriented architecture;
•   Multi-tiered, high-performance storage;
•   Event driven automated workflows;
•   Mission specific applications and web services;
•   Highly reliable, virtualized, hardware infrastructure;
•   Efficient wide area networking with accelerate geosynchronous satellite IP throughput; and
•   Information access through secure Mobile Adhoc Networking.
SOA-R provides the benefits of cloud computing and secure ad-hoc mobility in a modular,
standards-based implementation framework. By exploiting the advantages of a service oriented
approach, web services and interfaces specific to the national security business domain are being
developed and enhanced for deployment from and interface with a cloud computing
infrastructure. By doing this, Dataline, in concert with its partners, can provide leading edge
solutions without the risk typically associated with early adoption of leading edge technologies.
Like cloud computing, SOA-R has dual meanings. Whereas cloud computing refers to both a
platform and type of application, SOA-R refers to a solution framework and domain specific
solutions. To help understand these twin dualities consider the following descriptions:
•   A cloud computing platform dynamically provisions, configures, reconfigures, and de-
    provisions servers as needed. In a SOA-R framework, the provisioning, configuring,
    reconfiguring and de-provisioning of servers is driven by national security domain specific
    rules, metrics and mission guidelines
•   Cloud applications are applications that are extended to be accessible through the Internet
    from large datacenters and powerful servers that host Web applications and Web services.
    SOA-R applications are extended to be accessible through highly secure virtual private
    networks (VPN) tunnels and secure private networks (e.g. NIPRnet and SIPRnet). SOA-R
    applications are typically composite applications, served from powerful servers, and
    provided through Web Services from multiple organizations and datacenters.




 P a g e | 1 of 9
The SOA-R framework uses event-driven workflows to provide:
    •   Intra-workflow component reuse;
    •   Faster workflow execution;
    •   Distributed/parallel workflow execution;
    •   Normalizes workflow design;
    •   Enhanced business process interoperability;
    •   Enhanced information sharing;
    •   Ability to implement more sophisticated IT architectures;
    •   Reduces ad-hoc workflows; and
    •   Easier business process redefinition.




Figure 1 - SOA-R leverages the Event Driven Services Oriented Architecture first developed and deployed by
                                       Great-Circle Technologies 1




SOA-R Solution Framework


The deployment of a secure cloud computing platform to support national security missions
requires an integrated solution across the following specific functional areas:
    •   Secure and highly scalable datacenters (Northrop Grumman, Dataline)
    •   Services Oriented Architecture and Mission Relevant Applications (GCT, IBM, Dataline)
    •   Hardware and software virtualization (IBM, Google, VMware) 2
    •   Secure Global and regional networks
    •   Secure wireless ad-hoc networking and network clients (Harris, L-3, Cisco, Dataline)


1
    “Merlin and Minerva Story Map”, Great-Circle Technologies, 2007
2
    We are including middleware, input/output and network virtualization in this requirement as well.


    P a g e | 2 of 9
Northrop Grumman’s Mission Systems sector is one of the premier integrators of complex,
mission-critical systems. The sector develops and sustains systems that enable the Department of
Defense, Department of Homeland Security and the intelligence community to execute missions
at all levels: tactical, operational and strategic. Northrop Grumman is also the industry leader in
secure messaging systems, providing accreditable systems that process the most sensitive data of
the defense and intelligence communities. Northrop Grumman is the only company that can
deliver systems that send secure messages from one source to many addresses located across
multiple security enclaves. As an example of their capability, as the prime contractor for the
Army's Force XXI Battle Command Brigade and Below (FBCB2) program, Mission Systems is
replacing paper maps and voice radio communications with digital capabilities. As a large-scale
integrator, Northrop can provide its ability to design, deliver and operate mission critical end-to-
end IT infrastructures to the SOA-R team.
As an IBM Premier Partner, Dataline serves as the server, storage and middleware technology
integrator for SOA-R implementations. In this role, Dataline provides the server hardware,
storage technology, virtualization technology, SOA middleware and infrastructure management
middleware for the core cloud computing platform. In collaboration with Great-Circle
Technologies, Dataline designs and implements the enterprise service bus, all required storage
tiers and the cloud hardware and application provisioning strategy.




                            Figure 2 - Example high level cloud architecture
SOA-R also features an IBM WebSphere DataStage based Real Time Integration Architecture
(RTIA). This solution component features an event-driven, message-based and trigger based
infrastructure for the cost-effective integration of multiple applications. WebSphere DataStage
can operate in real-time, capturing messages or extracting data at a moment's notice on the same
platform that also integrates bulk data. This provides a key advantage over implementations that
require the use of two separate products to achieve the same functionality. This architecture
facilitates:
•   Real-time performance.
•   Scalability (number of nodes, communicating applications and fault tolerance).
 P a g e | 3 of 9
•   Construction of integration objects across applications, databases and systems without
        generating or having to manage code separately.
    •   Elimination of any requirement of altering or compromising the modularity of existing
        system by decoupling.
    •   Users and owners of applications / systems retaining control of their systems by not placing
        Real Time Integration (RTI) functionality in line with their application code.
    •   Easy maintenance on production front.
    •   Low cost rework at the end of the development cycle. 3
Great-Circle Technologies serves as the subject matter lead on most SOA-R implementations. In
this crucial position, GCT designs all domain area workflows and selects specific applications
for use within the event-driven SOA architecture. GCT’s core expertise is in providing
innovative solutions that bridge the “best value” of standards-based commercial off-the-shelf
technologies (COTS/SCOTS) with existing government-owned technologies (GOTS). Key to
their success has been an ability to tailor pragmatic mission-oriented solutions that utilize
advanced geospatial intelligence technologies.
In cloud implementations, Hadoop, an open source implementation of the Google File System, is
the SOA-R preferred framework for running large data processing applications. This approach
allows the creation and execution of applications using Google’s MapReduce programming
paradigm, which divides the application into small fragments of work that can be executed on
any node in the cloud computing cluster. It also transparently supports reliability and data
migration through the use of a distributed file system. Using Hadoop, the cloud can execute
parallel applications on a massive data set in a reasonable amount of time, enabling
computationally-intensive services such as retrieving information efficiently, customizing user
sessions based on past history, or generating results based on Monte Carlo (probabilistic)
algorithms. SOA-R Team implementations are also well positioned to leverage any innovations
flowing from the IBM-Google cloud computing collaboration. 4
Since the SOA-R framework is designed to support national security missions, SOA-R solutions
typically leverage government provided global and regional communications networks. To do
this efficiently, SOA-R uses two key Dataline technologies: SkipWare® and SCPS-M™. These
technologies accelerate IP throughput over a geosynchronous satellite by a minimum of 17x the
rate of standard TCP. Improvement ratios increase significantly when run over errored and
asymmetric links. These protocols also achieve bandwidth efficiencies in excess of 90%, before
payload compression. Because SkipWare® and SCPS-M™ are designed to operate in a gateway
model, it is not necessary to deploy them on every remote client machine. A single gateway
serves the entire LAN, allowing for simple, unobtrusive integration into the network. Smart
congestion controls and transparent bridging features make these protocols true plug-and-play
technologies. SkipWare and SCPS-M are also designed to interoperate with other common


3
  “Real Time Integration / SOA using IBM WebSpher Datastage”, Joshy George, IBM,
http://hosteddocs.ittoolbox.com/JG071807.pdf,
4
  “Cloud Computing”, IBM High Performance On Demand Solutions (HiPODS)Greg Boss, Padma Malladi, Dennis
Quan, Linda Legregni, Harold Hall, 8 October 2007


    P a g e | 4 of 9
networking protocols, including TCP, DVB and SCPS-TP. Because SkipWare and SCPS-M are
based on IETF-standard TCP, all community experience and diagnostic tools associated with
TCP can be also applied to SkipWare.
Dataline has years of experience leveraging these global networks through its Data
Communication Device. With the addition of NSA approved Type 1 encryption, classified IP
connectivity can be provided through Ethernet, serial, wireless, cellular or satellite uplink within
an IPSEC VPN tunnel. This Everything on IP (EoIP) infrastructure provides direct email, IP-
based voice or video, mapping, network drive access and “behind-the-firewall” Internet access as
necessary.5 Access to web services also provides mash-up capability as well. Information can
also be pushed via subscriptions or event-driven SOA workflow processes.
SOA-R solutions can also leverage the CISCO mobile ad hoc networking solution as a
component. These networks are emerging as a means for delivering the benefits of IP networking
to users operating beyond the reach of a fixed network. In ad hoc networks mobile nodes
associate on an extemporaneous or ad hoc basis. Ad hoc networks have a number of
distinguishing characteristics when compared to conventional networking solutions:
    •   Self Forming: nodes that come within radio range of each other can establish a network
        association without any pre-configuration or manual intervention
    •   Self Healing: nodes can join or leave on a rapid basis without impacting operation of the
        remaining nodes
    •   No Infrastructure: in an ad hoc network, mobile nodes form their own network, and
        essentially become their own infrastructure
    •   Peer to Peer: traditional networks typically support end systems operating in client-server
        mode. In an ad hoc network, mobile nodes can communicate and exchange information
        without prior arrangement and without reliance on centralized resources
    •   Predominantly Wireless: historically networks have been mostly wired, and enhanced or
        extended through wireless access. The ad hoc environment is essentially wireless, but can be
        extended to support wired resources
    •   Highly Dynamic: mobile nodes are in continuous motion and ad hoc networking topologies
        are constantly changing.
Collectively, these characteristics will enable ad hoc networks to deliver timely information to a
new and under-served class of users. Ad hoc networking solutions can be applied to virtually any
scenario that involves a cadre of highly mobile users or platforms (which may include stationary
devices as well), a strong need to share IP-based information, and an environment in which fixed
infrastructure is impractical, impaired, or impossible. SOA-R ad hoc networking uses the Cisco
RFC 4938 extensions for Ethernet-based communications between a router and a device such as
a mobile radio that operates in a variable bandwidth environment and has limited buffering
capabilities. These extensions provide a point-to-point over Ethernet (PPPoE) session-based
mechanism for sharing radio network status such as link quality metrics and establishing flow
control between a router and an RFC 4938-capable radio. An RFC 4938 radio initiates a Layer 2


5
    “Data Communications Device - VIP Communications”, Dataline, 2008


    P a g e | 5 of 9
PPPoE session with its adjacent RFC 4938 router on behalf of every router/radio neighbor
discovered in the network. These Layer 2 sessions are the means by which radio network status
for each neighbor link gets reported to the router. The radio establishes the correspondence
between each PPPoE session and each link to a neighbor. Cisco’s RFC 4938 solution enables
network-based applications and information to be quickly and reliably transported over
directional radio links. Fast convergence and optimal route selection ensure satisfactory delivery
of mission-critical, delay-sensitive traffic. 6




                                Figure 3 - AN RFC 4938-based Ad Hoc Network




6
    “Radio Aware Routing in Mobile Ad Hoc Networks”, Cisco, 2008


    P a g e | 6 of 9
National Security Mission Relevance

According to Google CEO Eric Schmidt "Cloud computing is the story of our
lifetime….Eventually all devices will be on the network." He also, however, stated that with the
exception of security requirements, "there's not that much difference between the enterprise
cloud and the consumer cloud" 7 . SOA-R addresses that important difference.


Cloud computing advantages include:
    •   Location of infrastructure in areas with lower costs of real estate and electricity
    •   Sharing of peak-load capacity among a large pool of users, improving overall utilization
    •   Separation of infrastructure maintenance duties from domain-specific application
        development
    •   Separation of application code from physical resources
    •   Ability to use external assets to handle peak loads (no requirement to engineer for highest
        possible load levels)
    •   No requirement to purchase assets for one-time or infrequent intensive computing tasks 8


In today’s operational, fiscal, and environmentally friendly environment, all national security
agencies are being driven to look at the advantages offered by cloud computing. SOA-R answers
that need. When the SOA-R framework is engineered into a domain-specific solution, all
technical, operational, procedural and environmentally friendly agency information technology
requirements can be addressed in a service oriented, event-driven, globally networked, secure
infrastructure. Defense, homeland security, justice and intelligence agencies all can benefit by
considering SOA-R as the core of their transition to cloud computing.




7
  “Google, IBM Join Forces To Dominate ‘Cloud Computing”, Information Week, May 1, 2008,
http://www.informationweek.com/news/services/data/showArticle.jhtml?articleID=207404265
8
  “Cloud Computing”, Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, June 14,2008


    P a g e | 7 of 9
SOA-R Team


Dataline, LLC is a leading transformational technology solutions provider to Department of
Defense (DoD) and federal customers. Since 1990, our focus has been to integrate best-in-class
technologies to provide robust, cost-effective Information Technology (IT) solutions for
organizations of all sizes and missions of all criticalities. In partnership with our customers, we
are accelerating the rate of change in the DoD’s transformation to Net-Centric Warfare and
progressing America’s capability for total Information Dominance.
Great-Circle Technologies, Inc. (GCT) specializes in the design, development, and deployment
of multi-INT enabled geospatial intelligence solutions. Established in 2000, GCT is
headquartered in Chantilly, VA with offices in St. Louis, MO and supporting customers
throughout the Washington DC metro area.
Northrop Grumman’s Mission Systems sector is one of the premier integrators of complex,
mission-critical systems. The sector develops and sustains systems that enable the Department of
Defense and the intelligence community to execute missions at all levels of command: tactical,
operational and strategic. Internationally, our defense, security and air traffic control solutions
offer technology and expertise that few companies can equal.
International Business Machines Corporation (IBM) develops and manufactures information
technologies, including computer systems, software, networking systems, storage devices, and
microelectronics worldwide. IBM's Software segment primarily offers middleware and operating
systems software comprising information management software for database, content
management, and information integration; Lotus software for collaboration, messaging, and
social networking; rational software, a process automation tool; Tivoli software for infrastructure
management, including security and storage management; WebSphere software for Web-enabled
applications; and product lifecycle management software.
Google, Inc., a technology company, maintains index of Web sites and other online content for
users, advertisers, Google network members, and other content providers. Its automated search
technology helps users to obtain instant access to relevant information from its online index. The
company's solutions provide targeted advertising and Internet search solutions, as well as intranet
solutions via an enterprise search appliance. Google, Inc. was founded in 1998 and is
headquartered in Mountain View, California.
Cisco enables people to make powerful connections-whether in business, education,
philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the
Internet solutions that make networks possible-providing easy access to information anywhere, at
any time. Since the company's inception, Cisco engineers have been leaders in the development
of Internet Protocol (IP)-based networking technologies. Today, with more than 65,225
employees worldwide, this tradition of innovation continues with industry-leading products and
solutions in the company's core development areas of routing and switching and other advanced
technologies.



 P a g e | 8 of 9
Additional Information


For further information on cloud computing and SOA-R please register and attend
the Dataline educational series entitled “Cloud Computing in a Net-Centric
Environment”. The series will feature speakers from Subject Matter Experts from
the SOA-R Team companies. Together we are leading the way to true
interoperability.


                    The series is being held from 9:00am – 1:00 pm at:
                                 The Tower Club, Tyson’s Corner
                                   8000 Towers Crescent Drive
                                      Vienna, VA, 22182.

Series topics and dates are as follows:

TOPIC                                                                                                DATE
What is Cloud Computing?                                                                     Wed 7/16/08

Global Information Access                                                                    Wed 8/13/08

Increased Efficiency, Reduced Cost                                                            Thu 9/11/08

Event Driven Information                                                                     Wed 10/8/08

Information Availability                                                                    Wed 10/29/08

Mission Relevance                                                                           Wed 11/12/08


          Online registration is available at http://www.dataline.com/soar.htm




“Cloud Musings”, a blog by Kevin L. Jackson containing personal comments and insight on cloud computing and its
relationship to net-centric warfare, is also available at http://kevinljackson.blogspot.com/



 P a g e | 9 of 9

Weitere ähnliche Inhalte

Was ist angesagt?

Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...Juniper Networks
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...csandit
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewallingJustin Cletus
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...IRJET Journal
 
A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...Soumya Kanti Datta
 
8 Reasons To Choose True Scale
8 Reasons To Choose True Scale8 Reasons To Choose True Scale
8 Reasons To Choose True Scaleseiland
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)Marc Jadoul
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Service Provider
 
Mobile edge computing an important step to a virtual world!
Mobile edge computing an important step to a virtual world!Mobile edge computing an important step to a virtual world!
Mobile edge computing an important step to a virtual world!Sophia Lorenn
 

Was ist angesagt? (18)

inmation Presentation_2017
inmation Presentation_2017inmation Presentation_2017
inmation Presentation_2017
 
Royal Saudi Air Force - RSAF
Royal Saudi Air Force - RSAFRoyal Saudi Air Force - RSAF
Royal Saudi Air Force - RSAF
 
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Custom...
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewalling
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Report-SDN
Report-SDNReport-SDN
Report-SDN
 
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
 
A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...A lightweight framework for efficient m2m device management in onem2m archite...
A lightweight framework for efficient m2m device management in onem2m archite...
 
DDS Best Practices
DDS Best PracticesDDS Best Practices
DDS Best Practices
 
8 Reasons To Choose True Scale
8 Reasons To Choose True Scale8 Reasons To Choose True Scale
8 Reasons To Choose True Scale
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...
 
Mobile edge computing an important step to a virtual world!
Mobile edge computing an important step to a virtual world!Mobile edge computing an important step to a virtual world!
Mobile edge computing an important step to a virtual world!
 

Ähnlich wie Cloud Computing for National Security

Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
 
Planet Cloud Datasheet | Infovista
Planet Cloud Datasheet | InfovistaPlanet Cloud Datasheet | Infovista
Planet Cloud Datasheet | InfovistaInfovista
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory CouncilDESMOND YUEN
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloudEricsson Latin America
 
RSA_Insurance_Case_Study.pdf
RSA_Insurance_Case_Study.pdfRSA_Insurance_Case_Study.pdf
RSA_Insurance_Case_Study.pdfAbhinav Gupta
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Juniper Networks UKI
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 

Ähnlich wie Cloud Computing for National Security (20)

Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Cloud
CloudCloud
Cloud
 
Mobile gis
Mobile gisMobile gis
Mobile gis
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Planet Cloud Datasheet | Infovista
Planet Cloud Datasheet | InfovistaPlanet Cloud Datasheet | Infovista
Planet Cloud Datasheet | Infovista
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
CLOUD
CLOUDCLOUD
CLOUD
 
RSA_Insurance_Case_Study.pdf
RSA_Insurance_Case_Study.pdfRSA_Insurance_Case_Study.pdf
RSA_Insurance_Case_Study.pdf
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

Mehr von white paper

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Javawhite paper
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overviewwhite paper
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guidewhite paper
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performancewhite paper
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machinewhite paper
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Changewhite paper
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paperwhite paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applicationswhite paper
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIwhite paper
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...white paper
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platformwhite paper
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overviewwhite paper
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systemswhite paper
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarkswhite paper
 

Mehr von white paper (20)

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
 
Java Web Start
Java Web StartJava Web Start
Java Web Start
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
 

Kürzlich hochgeladen

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 

Kürzlich hochgeladen (20)

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Cloud Computing for National Security

  • 1. CLOUD COMPUTING FOR NATIONAL SECURITY APPLICATIONS A DATALINE WHITE PAPER INTRODUCTION Through collaboration with leading industry partners, Dataline is integrating an end-to-end solution for secure cloud computing. Called Service Oriented Architecture – Real Time (SOA- R), this solution integrates: • Real-time services oriented architecture; • Multi-tiered, high-performance storage; • Event driven automated workflows; • Mission specific applications and web services; • Highly reliable, virtualized, hardware infrastructure; • Efficient wide area networking with accelerate geosynchronous satellite IP throughput; and • Information access through secure Mobile Adhoc Networking. SOA-R provides the benefits of cloud computing and secure ad-hoc mobility in a modular, standards-based implementation framework. By exploiting the advantages of a service oriented approach, web services and interfaces specific to the national security business domain are being developed and enhanced for deployment from and interface with a cloud computing infrastructure. By doing this, Dataline, in concert with its partners, can provide leading edge solutions without the risk typically associated with early adoption of leading edge technologies. Like cloud computing, SOA-R has dual meanings. Whereas cloud computing refers to both a platform and type of application, SOA-R refers to a solution framework and domain specific solutions. To help understand these twin dualities consider the following descriptions: • A cloud computing platform dynamically provisions, configures, reconfigures, and de- provisions servers as needed. In a SOA-R framework, the provisioning, configuring, reconfiguring and de-provisioning of servers is driven by national security domain specific rules, metrics and mission guidelines • Cloud applications are applications that are extended to be accessible through the Internet from large datacenters and powerful servers that host Web applications and Web services. SOA-R applications are extended to be accessible through highly secure virtual private networks (VPN) tunnels and secure private networks (e.g. NIPRnet and SIPRnet). SOA-R applications are typically composite applications, served from powerful servers, and provided through Web Services from multiple organizations and datacenters. P a g e | 1 of 9
  • 2. The SOA-R framework uses event-driven workflows to provide: • Intra-workflow component reuse; • Faster workflow execution; • Distributed/parallel workflow execution; • Normalizes workflow design; • Enhanced business process interoperability; • Enhanced information sharing; • Ability to implement more sophisticated IT architectures; • Reduces ad-hoc workflows; and • Easier business process redefinition. Figure 1 - SOA-R leverages the Event Driven Services Oriented Architecture first developed and deployed by Great-Circle Technologies 1 SOA-R Solution Framework The deployment of a secure cloud computing platform to support national security missions requires an integrated solution across the following specific functional areas: • Secure and highly scalable datacenters (Northrop Grumman, Dataline) • Services Oriented Architecture and Mission Relevant Applications (GCT, IBM, Dataline) • Hardware and software virtualization (IBM, Google, VMware) 2 • Secure Global and regional networks • Secure wireless ad-hoc networking and network clients (Harris, L-3, Cisco, Dataline) 1 “Merlin and Minerva Story Map”, Great-Circle Technologies, 2007 2 We are including middleware, input/output and network virtualization in this requirement as well. P a g e | 2 of 9
  • 3. Northrop Grumman’s Mission Systems sector is one of the premier integrators of complex, mission-critical systems. The sector develops and sustains systems that enable the Department of Defense, Department of Homeland Security and the intelligence community to execute missions at all levels: tactical, operational and strategic. Northrop Grumman is also the industry leader in secure messaging systems, providing accreditable systems that process the most sensitive data of the defense and intelligence communities. Northrop Grumman is the only company that can deliver systems that send secure messages from one source to many addresses located across multiple security enclaves. As an example of their capability, as the prime contractor for the Army's Force XXI Battle Command Brigade and Below (FBCB2) program, Mission Systems is replacing paper maps and voice radio communications with digital capabilities. As a large-scale integrator, Northrop can provide its ability to design, deliver and operate mission critical end-to- end IT infrastructures to the SOA-R team. As an IBM Premier Partner, Dataline serves as the server, storage and middleware technology integrator for SOA-R implementations. In this role, Dataline provides the server hardware, storage technology, virtualization technology, SOA middleware and infrastructure management middleware for the core cloud computing platform. In collaboration with Great-Circle Technologies, Dataline designs and implements the enterprise service bus, all required storage tiers and the cloud hardware and application provisioning strategy. Figure 2 - Example high level cloud architecture SOA-R also features an IBM WebSphere DataStage based Real Time Integration Architecture (RTIA). This solution component features an event-driven, message-based and trigger based infrastructure for the cost-effective integration of multiple applications. WebSphere DataStage can operate in real-time, capturing messages or extracting data at a moment's notice on the same platform that also integrates bulk data. This provides a key advantage over implementations that require the use of two separate products to achieve the same functionality. This architecture facilitates: • Real-time performance. • Scalability (number of nodes, communicating applications and fault tolerance). P a g e | 3 of 9
  • 4. Construction of integration objects across applications, databases and systems without generating or having to manage code separately. • Elimination of any requirement of altering or compromising the modularity of existing system by decoupling. • Users and owners of applications / systems retaining control of their systems by not placing Real Time Integration (RTI) functionality in line with their application code. • Easy maintenance on production front. • Low cost rework at the end of the development cycle. 3 Great-Circle Technologies serves as the subject matter lead on most SOA-R implementations. In this crucial position, GCT designs all domain area workflows and selects specific applications for use within the event-driven SOA architecture. GCT’s core expertise is in providing innovative solutions that bridge the “best value” of standards-based commercial off-the-shelf technologies (COTS/SCOTS) with existing government-owned technologies (GOTS). Key to their success has been an ability to tailor pragmatic mission-oriented solutions that utilize advanced geospatial intelligence technologies. In cloud implementations, Hadoop, an open source implementation of the Google File System, is the SOA-R preferred framework for running large data processing applications. This approach allows the creation and execution of applications using Google’s MapReduce programming paradigm, which divides the application into small fragments of work that can be executed on any node in the cloud computing cluster. It also transparently supports reliability and data migration through the use of a distributed file system. Using Hadoop, the cloud can execute parallel applications on a massive data set in a reasonable amount of time, enabling computationally-intensive services such as retrieving information efficiently, customizing user sessions based on past history, or generating results based on Monte Carlo (probabilistic) algorithms. SOA-R Team implementations are also well positioned to leverage any innovations flowing from the IBM-Google cloud computing collaboration. 4 Since the SOA-R framework is designed to support national security missions, SOA-R solutions typically leverage government provided global and regional communications networks. To do this efficiently, SOA-R uses two key Dataline technologies: SkipWare® and SCPS-M™. These technologies accelerate IP throughput over a geosynchronous satellite by a minimum of 17x the rate of standard TCP. Improvement ratios increase significantly when run over errored and asymmetric links. These protocols also achieve bandwidth efficiencies in excess of 90%, before payload compression. Because SkipWare® and SCPS-M™ are designed to operate in a gateway model, it is not necessary to deploy them on every remote client machine. A single gateway serves the entire LAN, allowing for simple, unobtrusive integration into the network. Smart congestion controls and transparent bridging features make these protocols true plug-and-play technologies. SkipWare and SCPS-M are also designed to interoperate with other common 3 “Real Time Integration / SOA using IBM WebSpher Datastage”, Joshy George, IBM, http://hosteddocs.ittoolbox.com/JG071807.pdf, 4 “Cloud Computing”, IBM High Performance On Demand Solutions (HiPODS)Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni, Harold Hall, 8 October 2007 P a g e | 4 of 9
  • 5. networking protocols, including TCP, DVB and SCPS-TP. Because SkipWare and SCPS-M are based on IETF-standard TCP, all community experience and diagnostic tools associated with TCP can be also applied to SkipWare. Dataline has years of experience leveraging these global networks through its Data Communication Device. With the addition of NSA approved Type 1 encryption, classified IP connectivity can be provided through Ethernet, serial, wireless, cellular or satellite uplink within an IPSEC VPN tunnel. This Everything on IP (EoIP) infrastructure provides direct email, IP- based voice or video, mapping, network drive access and “behind-the-firewall” Internet access as necessary.5 Access to web services also provides mash-up capability as well. Information can also be pushed via subscriptions or event-driven SOA workflow processes. SOA-R solutions can also leverage the CISCO mobile ad hoc networking solution as a component. These networks are emerging as a means for delivering the benefits of IP networking to users operating beyond the reach of a fixed network. In ad hoc networks mobile nodes associate on an extemporaneous or ad hoc basis. Ad hoc networks have a number of distinguishing characteristics when compared to conventional networking solutions: • Self Forming: nodes that come within radio range of each other can establish a network association without any pre-configuration or manual intervention • Self Healing: nodes can join or leave on a rapid basis without impacting operation of the remaining nodes • No Infrastructure: in an ad hoc network, mobile nodes form their own network, and essentially become their own infrastructure • Peer to Peer: traditional networks typically support end systems operating in client-server mode. In an ad hoc network, mobile nodes can communicate and exchange information without prior arrangement and without reliance on centralized resources • Predominantly Wireless: historically networks have been mostly wired, and enhanced or extended through wireless access. The ad hoc environment is essentially wireless, but can be extended to support wired resources • Highly Dynamic: mobile nodes are in continuous motion and ad hoc networking topologies are constantly changing. Collectively, these characteristics will enable ad hoc networks to deliver timely information to a new and under-served class of users. Ad hoc networking solutions can be applied to virtually any scenario that involves a cadre of highly mobile users or platforms (which may include stationary devices as well), a strong need to share IP-based information, and an environment in which fixed infrastructure is impractical, impaired, or impossible. SOA-R ad hoc networking uses the Cisco RFC 4938 extensions for Ethernet-based communications between a router and a device such as a mobile radio that operates in a variable bandwidth environment and has limited buffering capabilities. These extensions provide a point-to-point over Ethernet (PPPoE) session-based mechanism for sharing radio network status such as link quality metrics and establishing flow control between a router and an RFC 4938-capable radio. An RFC 4938 radio initiates a Layer 2 5 “Data Communications Device - VIP Communications”, Dataline, 2008 P a g e | 5 of 9
  • 6. PPPoE session with its adjacent RFC 4938 router on behalf of every router/radio neighbor discovered in the network. These Layer 2 sessions are the means by which radio network status for each neighbor link gets reported to the router. The radio establishes the correspondence between each PPPoE session and each link to a neighbor. Cisco’s RFC 4938 solution enables network-based applications and information to be quickly and reliably transported over directional radio links. Fast convergence and optimal route selection ensure satisfactory delivery of mission-critical, delay-sensitive traffic. 6 Figure 3 - AN RFC 4938-based Ad Hoc Network 6 “Radio Aware Routing in Mobile Ad Hoc Networks”, Cisco, 2008 P a g e | 6 of 9
  • 7. National Security Mission Relevance According to Google CEO Eric Schmidt "Cloud computing is the story of our lifetime….Eventually all devices will be on the network." He also, however, stated that with the exception of security requirements, "there's not that much difference between the enterprise cloud and the consumer cloud" 7 . SOA-R addresses that important difference. Cloud computing advantages include: • Location of infrastructure in areas with lower costs of real estate and electricity • Sharing of peak-load capacity among a large pool of users, improving overall utilization • Separation of infrastructure maintenance duties from domain-specific application development • Separation of application code from physical resources • Ability to use external assets to handle peak loads (no requirement to engineer for highest possible load levels) • No requirement to purchase assets for one-time or infrequent intensive computing tasks 8 In today’s operational, fiscal, and environmentally friendly environment, all national security agencies are being driven to look at the advantages offered by cloud computing. SOA-R answers that need. When the SOA-R framework is engineered into a domain-specific solution, all technical, operational, procedural and environmentally friendly agency information technology requirements can be addressed in a service oriented, event-driven, globally networked, secure infrastructure. Defense, homeland security, justice and intelligence agencies all can benefit by considering SOA-R as the core of their transition to cloud computing. 7 “Google, IBM Join Forces To Dominate ‘Cloud Computing”, Information Week, May 1, 2008, http://www.informationweek.com/news/services/data/showArticle.jhtml?articleID=207404265 8 “Cloud Computing”, Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, June 14,2008 P a g e | 7 of 9
  • 8. SOA-R Team Dataline, LLC is a leading transformational technology solutions provider to Department of Defense (DoD) and federal customers. Since 1990, our focus has been to integrate best-in-class technologies to provide robust, cost-effective Information Technology (IT) solutions for organizations of all sizes and missions of all criticalities. In partnership with our customers, we are accelerating the rate of change in the DoD’s transformation to Net-Centric Warfare and progressing America’s capability for total Information Dominance. Great-Circle Technologies, Inc. (GCT) specializes in the design, development, and deployment of multi-INT enabled geospatial intelligence solutions. Established in 2000, GCT is headquartered in Chantilly, VA with offices in St. Louis, MO and supporting customers throughout the Washington DC metro area. Northrop Grumman’s Mission Systems sector is one of the premier integrators of complex, mission-critical systems. The sector develops and sustains systems that enable the Department of Defense and the intelligence community to execute missions at all levels of command: tactical, operational and strategic. Internationally, our defense, security and air traffic control solutions offer technology and expertise that few companies can equal. International Business Machines Corporation (IBM) develops and manufactures information technologies, including computer systems, software, networking systems, storage devices, and microelectronics worldwide. IBM's Software segment primarily offers middleware and operating systems software comprising information management software for database, content management, and information integration; Lotus software for collaboration, messaging, and social networking; rational software, a process automation tool; Tivoli software for infrastructure management, including security and storage management; WebSphere software for Web-enabled applications; and product lifecycle management software. Google, Inc., a technology company, maintains index of Web sites and other online content for users, advertisers, Google network members, and other content providers. Its automated search technology helps users to obtain instant access to relevant information from its online index. The company's solutions provide targeted advertising and Internet search solutions, as well as intranet solutions via an enterprise search appliance. Google, Inc. was founded in 1998 and is headquartered in Mountain View, California. Cisco enables people to make powerful connections-whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible-providing easy access to information anywhere, at any time. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 65,225 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching and other advanced technologies. P a g e | 8 of 9
  • 9. Additional Information For further information on cloud computing and SOA-R please register and attend the Dataline educational series entitled “Cloud Computing in a Net-Centric Environment”. The series will feature speakers from Subject Matter Experts from the SOA-R Team companies. Together we are leading the way to true interoperability. The series is being held from 9:00am – 1:00 pm at: The Tower Club, Tyson’s Corner 8000 Towers Crescent Drive Vienna, VA, 22182. Series topics and dates are as follows: TOPIC DATE What is Cloud Computing? Wed 7/16/08 Global Information Access Wed 8/13/08 Increased Efficiency, Reduced Cost Thu 9/11/08 Event Driven Information Wed 10/8/08 Information Availability Wed 10/29/08 Mission Relevance Wed 11/12/08 Online registration is available at http://www.dataline.com/soar.htm “Cloud Musings”, a blog by Kevin L. Jackson containing personal comments and insight on cloud computing and its relationship to net-centric warfare, is also available at http://kevinljackson.blogspot.com/ P a g e | 9 of 9