Мы предполагаем, что вам понравилась эта презентация. Чтобы скачать ее, порекомендуйте, пожалуйста, эту презентацию своим друзьям в любой соц. сети. Кнопочки находятся чуть ниже. Спасибо.
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована
2 года назад
Actional Architecture Fundamentals David Bressler Actional Product Evangelist September 2009
© 2009 Progress Software Corporation2 Agenda Actional Benefits Management Architecture Patterns Actional Architecture How Actionals Architecture Provides the Benefits We Just Discussed What It Takes To Deploy
© 2009 Progress Software Corporation3 Actional Architecture Benefits Highly Scalable >1,000 nodes per server >50,000 dependencies per SOA No single point of failure Performant CPU use optimized to
© 2009 Progress Software Corporation4 Agenda Actional Benefits Management Architecture Patterns Actional Architecture How Actionals Architecture Provides the Benefits We Just Discussed What It Takes To Deploy
© 2009 Progress Software Corporation5 Management Design Challenges Performance Optimize performance impact of management on applications Minimize latency added by management tool Cost Reduce cost impact on the application Reduce hardware costs associated with management Costs should map to those receiving the benefit Visibility Create a holistic view across teams and applications Broad visibility across protocols Scalability Meet the needs of enterprise scale deployments Realistic scale-to-enterprise through automatic correlation
© 2009 Progress Software Corporation6 Alerts Distribute Processing to the Managed Nodes Pros: Speed – policy evaluation happens right on box Gain scalability by distributing transaction processing Cons: Heavy CPU load on application host Each node manages independently of others; No over-all view of the SOA Application costs increase due to management overhead Performance Scalability Cost Visibility
© 2009 Progress Software Corporation7 Centralize Processing Pros: Application costs are separated from management costs Server can provide SOA overview Cons: Near doubling of network traffic Significant latency added to message flow Explosion of management servers Management becomes a bottleneck to business execution Raw Data Results Performance Scalability Cost Visibility
© 2009 Progress Software Corporation8 Actionals Combined Approach Pros: Analysis is distributed into the network Virtually unlimited scalability Central server is in the know Provides holistic SOA overview Cons: Integration with each platform requires a greater depth of skill Thats our problem, and one were good at solving! Alerts & Stats Policies Performance Scalability Cost Visibility
© 2009 Progress Software Corporation9 Results of this Approach Leverages existing message processing Low CPU utilization without loss of functionality Leverages existing message flows Global visibility without a central bottleneck Leverages the network effect Proactive issue detection and isolation without costly administration Actional Utilizing 1-3% of CPU in usage by F500 financial service firm Managing >35000 interdependencies among >500 machines with a single Actional server at one of worlds largest universities
© 2009 Progress Software Corporation10 Agenda Actional Benefits Management Architecture Patterns Actional Architecture How Actionals Architecture Provides the Benefits We Just Discussed What It Takes To Deploy
© 2009 Progress Software Corporation11 Actional Server-Agent Communication Actional Management Server Policies Created Centrally 1 2 Policies Provisioned for Distributed Execution Statistics reported back on timing interval; Alerts reported asynchronously 3 3 On alert, when needed, Server asks Agent for additional information SOAP over HTTP(S) or JMS Instrumented Platform 4
© 2009 Progress Software Corporation12 Message Traffic HTTP(s) EJB Servlets JMS SOAP RMI ADO.NET Orbix/IIOP ESB JDBC OpenEdge Protocol Specific Instrumentation Instrumented Platform Components HTTP(s) EJB Servlets JMS SOAP RMI ADO.NET 2.0/3.0 Other ESB JDBC SOA Protocols Supported Uplink.cfg Configuration Info Message Activity Alerts and Stats to Server; Policy from Server Analyzer Flight Data Recorder Statistics Aggregation Policy Evaluation Interceptor
© 2009 Progress Software Corporation13 Tracking Message Flows Interceptors Inserted without modifying the application Actional is invisible to developers Run in the platform protocol stack, not on the app server They become a part of the app server Give visibility one-hop away Dont do anything if analyzer not running
© 2009 Progress Software Corporation14 Interceptors Inject Tracers into the Flow Manifest Inserted in the transport header Message is not modified Ignored by un-instrumented nodes Maintained through local processes, and stitched across multiple hops Enables the capture of exact message sequences and both service and business-process level correlation
© 2009 Progress Software Corporation15 Flight Data Recorder Stores Info in Memory Fight Data Recorder Is never persisted Never sent on the network Size is configurable Will recycle storage space as needed
© 2009 Progress Software Corporation16 Policy Evaluation Detects Abnormal Conditions Policy only needs to be checked at the key checkpoints in the process flow (not at every step). Analyzer notifies Actional Management Server. Actional Management Server
© 2009 Progress Software Corporation17 Server Gathers Relevant Information Actional Management Server gathers, correlates, persists, and visualizes relevant records from each related flight data recorder Actional Management Server
© 2009 Progress Software Corporation18 Flow Map Screen Shot: Root Cause Analysis
© 2009 Progress Software Corporation19 Flow Map Detail Screen Shot: Path Explorer
© 2009 Progress Software Corporation20 Finding the Root Cause
© 2009 Progress Software Corporation21 Why Correlation Matters to Product Selection Highly Beneficial (Elegant) Correlation in-bound and out-bound within each node (not just in-bound request with out-bound reply) Correlate across nodes Done across every message and flow –Even when message content inaccessible/encrypted Spans protocols for end-to-end correlation –Across protocol transitions for all protocols supported Virtually no impact on performance Low Cost of Implementation & Ownership (Simple) No up-front configuration necessary –It works from the first message sent, once the agent is installed No need to manage correlation rules –No need to worry about correlation rule errors! No on-going maintenance of correlation rules necessary
© 2009 Progress Software Corporation22 Actional Agent Architecture Correlator Read and embed context in messages Store and retrieve context in container state Reporter Capture details of messages flowing into and out of application Flight Data Recorder High bandwidth fixed size recorder stores rolling buffer of recently observed traffic Statistics Aggregation Accumulate aggregate statistics about messages (segmented appropriately) Policy Evaluation Evaluate policies against message traffic –Instance policies as records of messages arrive –Aggregate policies on a periodic time schedule Trigger actions based on rule match –Alert, audit, flowmap –Compensation or other custom action Reporter Flight Data Recorder Application Platform Correlator … Interceptor Analyzer Statistics Aggregation Policy Evaluation Processing phases
© 2009 Progress Software Corporation23 Correlation Management No manual correlation mapping need to be defined Automatic discovery of relationships No application level modifications required Can be implemented at any stage of a project 1. Read correlation state from incoming transport-level message header 2. Store correlation state in containers processing context e.g. transaction, session, or process context 3. Allow container to transfer and persist correlation state as necessary 4. Read correlation state from containers processing context 5. Embed correlation state in outgoing transport-level message header Reporter Application Platform Correlator … Benefits
© 2009 Progress Software Corporation24 Agenda Actional Benefits Management Architecture Patterns Actional Architecture How Actionals Architecture Provides the Benefits We Just Discussed What It Takes To Deploy
© 2009 Progress Software Corporation25 Highly Scalable BenefitFeature >1,000 Nodes Per ServerCentralized policy administration, distributed execution No Single Point of FailureServer not involved in the flow of messages Single Product UIOne product end-to-end; Tiered administration integrates with existing role-based infrastructure
© 2009 Progress Software Corporation26 Performant BenefitFeature Very low CPU usage (
© 2009 Progress Software Corporation27 Automatic Discovery BenefitFeature No need to know where your services are in order to find and manage them Automatic Service Discovery; As services are used, in real-time, services, the service consumers, and relationships are tracked, persisted, and visualized in the Actional UI. Visually track all service consumers; dynamically discover consumers Automatically track and police the relationship between services and nodes (dependencies) No need to install an agent on every node Sitting in the stack, the Agent Interceptor has access to information about inbound messages that allow us to discover nodes that are communicating with managed points. Can track/monitor services even on machines where you cannot install an agent
© 2009 Progress Software Corporation28 Policy Inheritance Policy can be written so that it is not service specific Therefore, as services are discovered, policy is applied via meta-data correlation (such as service location) This assures you that rogue services are never un- policed; policy can be written without any knowledge of the service and deployed even before the service Since services are discovered, even if an admin forgets to configure the service, Actional discovers the service, and all relevant policies are inherited and immediately applied
© 2009 Progress Software Corporation29 Multi-Protocol Support BenefitFeature Out-of-the-box support for many different protocols SOAP HTTP EJB JMS ESB Servlets RMI JDBC ADO.NET Orbix/CORBA OpenEdge Interceptor-based architecture is technology agnostic; nothing extra is required, like web services, these protocols are automatic and transparent to policies
© 2009 Progress Software Corporation30 No Application Changes Required Correlation information (Manifest) is added to the message flow via a transport header Actional does NOT change the message, or message content, in any way Therefore, the application is never even aware that it is being managed; either Actional or the Application can be deployed first As a side benefit, customers are not locked into Actional
© 2009 Progress Software Corporation31 Correlation is Automatic As an example, one customer is managing >35,000 interdependencies among >500 machines Manual correlation is a non-starter in any enterprise- class environment The whole point of root-cause analysis and learning what the environment is doing is having the infrastructure discovery and report what is actually happening in the environment
© 2009 Progress Software Corporation32 Correlation Specifics Correlation supports both synchronous and asynchronous flows Correlation is independent of finding a common key in the payload (and the related expense of payload processing) Correlation is specific to an individual flow, and root- cause analysis can use actual individual message stats, not just average stats of a flow
© 2009 Progress Software Corporation33 Policy Enforcement Optimization BenefitFeature Easier to manage policy, as its only in one place Optimized use of CPU, since policy does not need to be evaluated on each node Policy can be more meaningful to users; often policy is OK, but users are unhappy because of IT/Business disconnect Apply policy close to the customer; Dependency tracking enables end-to-end policy enforcement, though policy is only applied close to customer Root cause analysisSnapshot individual transactions for later analysis in the context of SLA violations Complex policy supportSingle user interface for policy creation, regardless of metric or message type
© 2009 Progress Software Corporation34 Summary: Key Actional Architecture Points ActionalAlternatives Automatic correlation within & across nodes YesNo Correlation architecture DistributedCentralized Correlation maintenance Automatic or manual Manually administered Architectural model Memory intensive CPU intensive See every transaction Yes No (sampling or synthetic only) Snapshot transactions in production Yes (low overhead FDR) No (too much overhead) Polices need be defined At entryEverywhere Per-hop overhead MicrosecsMillisecs
© 2009 Progress Software Corporation35 Agenda Actional Benefits Management Architecture Patterns Actional Architecture How Actionals Architecture Provides the Benefits We Just Discussed What It Takes To Deploy
© 2009 Progress Software Corporation36 Where To Start? Broad Visibility Supernode Deployment
© 2009 Progress Software Corporation37 Broad Visibility Deploy Agent in Each Container Gives holistic overview Protects from rogue services Rapid root cause analysis Often done as preventative measure in anticipation of SOA More easily done when infrastructure is controlled by one team Broad Visibility
© 2009 Progress Software Corporation38 Supernode Deployment Deploy Agent in Hot Spots As familiarity with tool increases and wins occur, branch out to other servers More easily done when app servers are owned by distributed application teams (no central control) Used to troubleshoot problems with a particular server/application Provides clear ROI since sharing is more easily demonstrated Supernode Deployment
© 2009 Progress Software Corporation39 Whats the Best Way to Install the Agent? Install everywhere, but dont necessarily run Analyzer Interceptor only works when Analyzer is running Install as part of basic build, so its there when you want it Enable it by turning on the Analyzer What if I have multiple application servers on a single host? You need one Analyzer per box, and one Interceptor per protocol for each application server The Interceptors will find uplink.cfg and know how to communicate to the Analyzer
© 2009 Progress Software Corporation40 Whats the Best Place to Run the Analyzer? Multiple application servers on the same host… where do I put the Analyzer? There is only one Analyzer per box The Analyzer can run standalone, and service each application server equally –If the Analyzer runs in one of the application servers, then a container failure will impact other application servers on that same box (not desired behavior) Failure of the standalone Analyzer will not impact message flow on any app server; though management information will be unavailable
© 2009 Progress Software Corporation41 Development, UAT, Production? In Development Actional provides… Constant monitoring of how services are used, so that developers do not need to wait to a check point (after all development is complete) to find and fix problems. Assurance that developers are not using production services Quickly debug interactions between systems –At a Telco, reduced their debug time to 20% of what it had been prior to Actional implementation Policies can be exported and managed via source control as code is moved from development to UAT to production Tracking consumers of development services to assist with migration towards production as appropriate
© 2009 Progress Software Corporation42 Development, UAT, Production? In UAT Actional provides… Validation that services are used as documented Capacity planning for production deployment Assurance that UAT is not depending upon any development services (unless expected) Assurance that UAT is not depending upon production resources (databases or orchestration, for example) Impact analysis understanding for how this new service usage will affect the existing SOA Rapid debugging of interactions between systems
© 2009 Progress Software Corporation43 Summary Architecture requirements of low impact, broad visibility, and high scalability are a good starting point for evaluating a solution Discussed Actional architecture Automatic Discovery of consumers, services & dependencies Multi-Protocol support includes JDBC, ADO.NET, RMI, EJB, + No application changes required Scalable & Performant Policy Inheritance Flow Mapping for root cause analysis High level deployment guidelines and how to get started Where to deploy agents Best practice for getting agents deployed Benefits to Actional in Development and UAT
© 2009 Progress Software Corporation44
Actional Technical Overview David Bressler Actional Product Evangelist Session 101.
Using Actional with OpenEdge The Zen of Business Transaction Assurance David Cleary Principal Software Engineer – Progress Software Session 116.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v1.24-1.
1 Where is the O(penness) in SaaS? Make sure youre ready for the next wave … Jiri De Jagere Senior Solution Engineer, Progress Software Session 123.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
How to quickly identify and resolve application bottlenecks Johan Forssblad, G4 IT AB Managing Director / Co founder.
The waterfall model is a popular version of the systems development life cycle model for software engineering. Often considered the classic approach to.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary © Wind River Systems, released under EPL 1.0. All logos are TM of their respective.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v3.01-1 Introducing Campus Networks Network Requirements.
WEB SERVICES Mr. P. VASANTH SENA. W EB SERVICES The world before Situation Problems Solutions Motiv. for Web Services Probs. with Curr. sols. Web Services.
Loader Design Options Linkage Editors Dynamic Linking Bootstrap Loaders.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v2.19-1 Managing Your Network Environment Managing Cisco Devices.
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Network Design Methodology ARCH v1.21-1.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.25-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Implementing Changes in BGP Policy.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary November 4, 2014 Copyright © 2006 Eclipse Foundation, Inc., Made available.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.27-1 Optimizing BGP Scalability Implementing BGP Peer Groups.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.06-1 Implementing BGP Explaining BGP Concepts and Terminology.
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, VoiceMail Pro Advanced Functions Module Four – Voicemail Campaigns.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.06-1 Using CSA Analysis Configuring Application Behavior Investigation.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.26-1 Complex MPLS VPNs Introducing Central Services VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. CVOICE v5.01-1 Introduction to VoIP Introducing VoIP Network Technologies.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Three – Exchange 2007.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.06-1 IPv6 Transition Mechanisms Implementing Dual Stack.
© 2007 APC-MGE corporation. APC NetBotz ® Rack Access PX - HID NetBotz Access Control Protecting IT Assets From Physical Threats Network appliance enabling.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.22-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v2.11-1 Building a Simple Serial Network Understanding the OSI Model.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.02-1 Configuring EIGRP Using EIGRP in an Enterprise Network.
© 2006 Cisco Systems, Inc. All rights reserved. SND v2.04-1 Configuring a Cisco IOS Firewall Configuring a Cisco IOS Firewall with the Cisco SDM Wizard.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module One – UMS.
© 2009 Avaya Inc. All rights reserved.1 Chapter Two, VoiceMail Pro Components Module Two – Actions, Variables & Conditions.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.05-1 Administering Events and Generating Reports Managing Events.
Www.ciscopress.com Copyright 2003 CCNA 3 Chapter 4 EIGRP By Your Name.
SPLAY TREE The basic idea of the splay tree is that every time a node is accessed, it is pushed to the root by a series of tree rotations. This series.
Cisco Internetwork Troubleshooting Creating End-System Network Configuration Documentation © 2005 Cisco Systems, Inc. All rights reserved. CIT v5.21-1.
Designing Virtual Private Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing Site-to-Site VPNs ARCH v1.29-1.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.24-1 Route Selection Using Attributes Using AS-Path Prepending.
DRAFTING TECHNIQUES I 136. Here is a basic shape. From here, we will do some advanced drafting once we put this shape on a sheet as a drawing. Select.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v2.14-1 Connecting Networks Exploring How Routing Works.
Lecture # 54 1. Computer Architecture Computer Architecture = ISA + MO ISA stands for instruction set architecture is a logical view of computer system.
"Cloud services" - what it is.. First of all – it is innovative online services. They provide an opportunity to use the enormous potential of the Internet.
BASIC ASSEMBLY DESIGN 79. There is a number of ways to enter ASSEMBLY DESIGN mode. Any ONE way will do it. Click here 80.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v1.04-1 IPsec VPNs Cisco High Availability Options.
XjCharts A C++ / Java Statecharts Tool for Developers Experimental Object Technologies www.xjtek.com.
© 2006 Cisco Systems, Inc. All rights reserved. CIPT1 v5.03-1 Deployment of Cisco Unified CallManager Release 5.0 Endpoints Configuring Cisco Unified CallManager.
Linux Daemons. Agenda What is a daemon What is a daemon What Is It Going To Do? What Is It Going To Do? How much interaction How much interaction Basic.
Comparison of Lotus Notes Designer, Domino Workflow Architect and AdHoc Workflow Builder 2003 (c) AdHoc.
PERT/CPM PROJECT SCHEDULING Allocation of resources. Includes assigning the starting and completion dates to each part (or activity) in such a manner that.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.21-1 MPLS Concepts Identifying MPLS Applications.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.02-1 Configuring Groups and Policies Building an Agent Kit.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.24-1 Route Selection Using Attributes Setting BGP Local Preferences.
© 2009 Avaya Inc. All rights reserved.1 Chapter Seven, Customer Call Reporter (CCR) Module Two – Standard Configuration.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.26-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, VoiceMail Pro in SCN Module Four – Distributed VoiceMail Pro.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v1.04-1 Implement the DiffServ QoS Model Implementing QoS Preclassify.
Evgeniy Krivosheev Andrey Stukalenko Vyacheslav Yakovenko Last update: Nov, 2013 Spring Framework Module 1 - Introduction.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Developing an Enterprise Network Management Strategy ARCH v1.24-1.
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Designing the Internet Connectivity Module ARCH v2.13-1.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.07-1 Implementing Multicast IGMP and Layer 2 Issues.
BSc (Hons) Social Work Working Across Organisations Assessment Event Briefing. An overview of the teaching within this unit and briefing on the assessment.
Www.ciscopress.com Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v1.02-1 Describe Cisco VoIP Implementations Implementing Voice Support in an Enterprise Network.
Call to Action Learn more at SQLServerPrivateCloud BENEFITS o Faster time to market - Automation without compromising control.
Www.ciscopress.com Copyright 2003 CCNA 2 Chapter 17 TCP/IP Suite Error and Control Messages By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.24-1 MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.02-1 Configuring Groups and Policies Managing Hosts and Deploying Software Updates.
Tool: Pareto Charts. The Pareto Principle This is also known as the "80/20 Rule". The rule states that about 80% of the problems are created by 20% of.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v2.19-1 Module Summary The Cisco Discovery Protocol is an information-gathering tool used by network.
11 BASIC DRESS-UP FEATURES. LESSON II : DRESS UP FEATURES 12.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.04-1 Configuring Rules Configuring System Correlation Rules.
Designing QoS © 2004 Cisco Systems, Inc. All rights reserved. Designing QoS for Enterprise Networks ARCH v1.27-1.
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Cisco AVVID Framework ARCH v1.21-1.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.25-1 Customer-to-Provider Connectivity with BGP Understanding Customer-to-Provider Connectivity.
Www.ciscopress.com Copyright 2003 CCNA 4 Chapter 11 Scaling IP Addresses By Your Name.
How does media affect our lives? Elizaveta Michsherina 9 B.
1 Watch Your Production Environment ( while at Exchange ) using OpenEdge Management Libor Laubacher Principal TSE, Progress Software Session 133.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Capacity Manager.
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Designing the Remote Access Module ARCH v1.23-1.
Dynamic Designer Is the easy way for you to cut as much as 80% from the time and cost of getting your new products to market, and improving the old ones.
REFERENCE ELEMENTS 64. If your REFERENCE ELEMENTS toolbar is not in view and not hidden, you can retrieve it from the toolbars menu seen here. 65.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.27-1 Integrating Internet Access with MPLS VPNs Introducing Internet Access Models with MPLS VPNs.
What to expect? How to prepare? What to do? How to win and find a good job? BUSINESS ENGLISH COURSE NOVA KAKHOVKA GUMNASUIM 2012.
© 2006 Cisco Systems, Inc. All rights reserved. CIPT1 v5.02-1 Administration of Cisco Unified CallManager Release 5.0 Implementing Disaster Recovery.
Why do we learn English at schools. (by Kurdina Ekaterina) Learning a new language often begins at a young age and, at some schools, is continued throughout.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.04-1 Configuring Rules Rule Basics.
1 © Luxoft Training 2013 Spring Framework Module 10 JMS & EJB.
© 2005 Cisco Systems, Inc. All rights reserved. IPTX v2.05-1 Configuring Cisco Unity Express Automated Attendant and Voice Mail Understanding Cisco Unity.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, VoiceMail Pro in SCN Module Three – Backup VoiceMail Pro.
Www.ciscopress.com Copyright 2003 CCNA 4 Chapter 22 Developing Network Security and Network Management Strategies By Your Name.
Payment Card Industry (PCI ) - Data Security Standard (DSS): Introduction and Best Practices Michael Jacobs Development Architect - OpenEdge Session 119.
The main problem between generations. There are many problems between parents and their children. It can be differences between the views of the younger.
Strategy / Business Development Technique Communication / Design.
General Packet Radio Service. GPRS GPRS is a packet-based data bearer service for GSM and TDMA networks. GPRS gives mobile users faster data speeds and.
I and society. Plan Aim I in society Friends Classmates Student-teacher Parents and children Brothers and sisters Society in human life Conclusion Source.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.25-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
Computers are a necessary part of modern life. Computers play an important role in the lives of most of us today, whether we realize it or not. Some people,
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v2.05-1 Adaptive Threat Defense Examining Cisco IOS Firewall.
Еще похожие презентации в нашем архиве:
© 2016 MyShared Inc. All rights reserved.