16/04/2010 1 Gerenciamento Gerenciamento e e Gestão Gestão de de Redes Redes de de Alta Performance Alta Performance Coordenador Coordenador Prof. Prof. MSc MSc. Ricardo Rodrigues . Ricardo Rodrigues [email protected][email protected]Pós Pós-graduação graduação Internacional Internacional 09h00 09h00 Credenciamento Credenciamento 10h00 10h00 Gestão de Redes de Alta Performance Gestão de Redes de Alta Performance - Prof. MSc. Ricardo Rodrigues Consultor e Coordenador de Graduação e Pós-graduação em Redes de Computadores - FIT 11h00 11h00 Application Platforms for Cloud Computing: Who, Why and When Application Platforms for Cloud Computing: Who, Why and When – Yefim Natis (Vice-Presidente e Analista Emérito - Gartner Research) 12h00 12h00 Encerramento Encerramento AGENDA AGENDA
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
16/04/2010
1
GerenciamentoGerenciamento e e GestãoGestão de de RedesRedes de de
Alta PerformanceAlta Performance
CoordenadorCoordenadorProf. Prof. MScMSc. Ricardo Rodrigues. Ricardo Rodrigues
PósPós--graduaçãograduação Internacional Internacional
09h00 09h00 CredenciamentoCredenciamento
10h00 10h00 Gestão de Redes de Alta Performance Gestão de Redes de Alta Performance - Prof. MSc. Ricardo Rodrigues Consultor e Coordenador de Graduação e Pós-graduação em Redes de Computadores - FIT
11h0011h00Application Platforms for Cloud Computing: Who, Why and WhenApplication Platforms for Cloud Computing: Who, Why and When –Yefim Natis (Vice-Presidente e Analista Emérito - Gartner Research)
12h0012h00 EncerramentoEncerramento
AGENDAAGENDA
16/04/2010
2
OO GerenciamentoGerenciamento dede DesempenhoDesempenho dede RedesRedes consisteconsiste nono planejamentoplanejamento,,modelagemmodelagem,, mensuraçãomensuração ee otimizaçãootimização dasdas RedesRedes parapara garantirgarantir aa transmissãotransmissãodede informaçãoinformação comcom aa velocidadevelocidade,, confiabilidadeconfiabilidade ee capacidadecapacidade apropriadosapropriados àànaturezanatureza dada aplicaçãoaplicação ee dodo custocusto nana organizaçãoorganização..
Gerenciamento de Desempenho de RedesGerenciamento de Desempenho de Redes
“Today we are moving beyond the “Today we are moving beyond the Giga eraGiga era and into the and into the TeraTera eraera. . In fact, data is multiplying so quickly worldwide that it's now being In fact, data is multiplying so quickly worldwide that it's now being measured by measured by exabyteexabyte –– a million terabytes. a million terabytes. TeraTera--IOPs (I/O Operations IOPs (I/O Operations
per second) and terabytes of information represent a new scale of per second) and terabytes of information represent a new scale of workload.”workload.”
Gerenciamento de Desempenho de RedesGerenciamento de Desempenho de Redes
16/04/2010
4
TECNOLOGIAS ESTRATÉGICAS DE TI (GARTNER 2009 – 2012)
TOP 10 STRATEGIC TECHNOLOGY AREASTOP 10 STRATEGIC TECHNOLOGY AREAS
GartnerGartner IdentifiesIdentifies thethe Top 10 Top 10 StrategicStrategic Technologies Technologies fromfrom 2009 2009 to 2012 to 2012 ((STAMFORD, Conn., October 14, 2009)STAMFORD, Conn., October 14, 2009)
16/04/2010
5
Carl Claunch - IT Infrastructure & Operations Trends —Change is on the Horizon – The Future of IT - September15-17, 2009
VirtualizationVirtualization changes how IT is acquiredacquired,managedmanaged and how softwaresoftware is priced andlicensed.
It will become an enabler of cloudcloudcomputingcomputing.
In addition to energyenergy savingssavings and lowerlowercapitalcapital expensesexpenses due to more efficient useof your hardware resources, it will get highhighavailabilityavailability ofof resourcesresources, betterbettermanagementmanagement, increasedincreased securitysecurity and thepotentialpotential ofof improvedimproved disasterdisaster recoveryrecoveryprocessesprocesses when you build a virtualinfrastructure.
VIRTUALIZATIONVIRTUALIZATION
Carl Claunch - IT Infrastructure & Operations Trends —Change is on the Horizon – The Future of IT - September15-17, 2009
The cloud-computing grewgrew exponentiallyexponentiallyduringduring 20092009 andand 20102010.
The key characteristics of cloud computing:
§ (1) delivery of capabilities "as a service”
§ (2) delivery of services in a highlyscalable and elastic fashion
§ (3) using Internet technologies todevelop and deliver services
§ (4) designing for delivery to externalcustomers
CLOUD COMPUTINGCLOUD COMPUTING
16/04/2010
6
Carl Claunch - IT Infrastructure & Operations Trends -Change is on the Horizon – The Future of IT - September 15-17, 2009
Today's blades arehighly serverserver--centriccentric,thus the level ofmodularity revolvesaround a server as acomponent.
The future bladegenerations will be notof server-centric andwill be moremore modularmodular.
The modules will benetworknetwork componentscomponents,storagestorage componentscomponents andprocessor/memoryprocessor/memorycomponentscomponents.
SERVER BEYOND BLADESSERVER BEYOND BLADES
Carl Claunch - IT Infrastructure & Operations Trends -Change is on the Horizon – The Future of IT - September 15-17, 2009
WebWeb--orientedorientedarchitecturearchitecture (WOAWOA)is emerging as abest-practice modelfor implementingSOA in a Web-centric fashion.
The use of WebWeb--centriccentric modelsmodels tobuild global classsolutions can notaddress the fullbreadth of enterprisecomputing needs.
WEB ORIENTED ARCHITECTURE (WOA)WEB ORIENTED ARCHITECTURE (WOA)
16/04/2010
7
In mashupmashup and WebWebarchitecturearchitecture, technologiesand standards are used tocombine resources intocompositions.
MashupMashup applicationsapplications canquickly be created and userscan easily personalizemashup content displays.
ENTERPRISE MASHUPSENTERPRISE MASHUPS
Carl Claunch - IT Infrastructure & Operations Trends -Change is on the Horizon – The Future of IT - September 15-17, 2009
Some specialspecial hardwarehardware thatprovides a substantialsubstantialincreaseincrease inin performanceperformance ora substantialsubstantial costcost advantageadvantageover the alternative of usinga generalgeneral serverserver.
Examples of appliances,with special hardware as theadvantage over generalpurpose servers, includeCiscoCisco routersrouters, NetezzaNetezza DataDataWarehouseWarehouse appliancesappliances toaccelerateaccelerate performanceperformance, andthe AzulAzul SystemsSystems ComputeComputeApplianceAppliance that has a specialprocessor designed to runrunJavaJava codecode manymany timestimes fasterfasterthanthan generalgeneral--purposepurposeprocessorsprocessors.
GartnerGartner IdentifiesIdentifies thethe Top 10 Top 10 StrategicStrategic Technologies for 2009 Technologies for 2009 ((STAMFORD, Conn., October 14, 2009)STAMFORD, Conn., October 14, 2009)
SPECIALIZED SYSTEMSSPECIALIZED SYSTEMS
16/04/2010
8
SocialSocial networkingnetworking covers socialprofile management products,such as MySpaceMySpace, FacebookFacebook, andFriendsterFriendster. It also covers thesocial networking analysistechnologies that use humanrelationships for the discovery ofpeople and expertise.
SocialSocial collaborationcollaboration coverstechnologies, such as wikiswikis,blogsblogs, instantinstant messagingmessaging,collaborativecollaborative officeoffice.
SocialSocial mediamedia includestechnologies that assistcommunities in sharing contentsuch as YouTubeYouTube.
SocialSocial validationvalidation is getting thecommunity involved in assessingproducts, content, people and soon. Examples include socialsocialratingrating, socialsocial commentarycommentary, socialsocialtaggingtagging andand socialsocial bookmarkingbookmarking.
GartnerGartner IdentifiesIdentifies thethe Top 10 Top 10 StrategicStrategic Technologies for 2009 Technologies for 2009 ((STAMFORD, Conn., October 14, 2009)STAMFORD, Conn., October 14, 2009)
SOCIAL SOFTWARE AND SOCIAL NETWORKINGSOCIAL SOFTWARE AND SOCIAL NETWORKING
Carl Claunch - IT Infrastructure & Operations Trends —Change is on the Horizon – The Future of IT - September 15-17, 2009
Communication serviceintegration where allall thethecommunicationcommunication applicationsapplications willbe realreal timetime integratedintegrated.
Enterprise and Business quickcommunications.
UNIFIED COMMUNICATIONSUNIFIED COMMUNICATIONS
16/04/2010
9
Elia San Miguel - The Unified Communications Scenario – The Future of IT - September 15-17, 2009
UNIFIED COMMUNICATIONSUNIFIED COMMUNICATIONS
BusinessBusiness IntelligenceIntelligence (BIBI)initiative leaders must dotwo things well to besuccessful. FirstFirst, they mustprovide newnew capabilitiescapabilities totobusinessbusiness managementmanagement andknowledgeknowledge workersworkers.SecondSecond, they must buildbuild andandevolveevolve aa betterbetter andand moremorecapablecapable informationinformation--centriccentricinfrastructureinfrastructure.OrganizationOrganization ofof analystsanalysts andandresearchresearch inin fivefive initiativesinitiatives:BusinessBusiness IntelligenceIntelligence andandPerformancePerformance ManagementManagement,SocialSocial SoftwareSoftware andandCollaborationCollaboration, EnterpriseEnterpriseInformationInformation ManagementManagement,EnterpriseEnterprise ContentContentManagementManagement and DataDataManagementManagement andandIntegrationIntegration.
GartnerGartner IdentifiesIdentifies thethe Top 10 Top 10 StrategicStrategic Technologies for 2009 Technologies for 2009 ((STAMFORD, Conn., October 14, 2009)STAMFORD, Conn., October 14, 2009)
BI BI –– BUSINESS INTELLIGENCEBUSINESS INTELLIGENCE
16/04/2010
10
GartnerGartner IdentifiesIdentifies thethe Top 10 Top 10 StrategicStrategic Technologies for 2009 Technologies for 2009 ((STAMFORD, Conn., STAMFORD, Conn., October 14, 2009)October 14, 2009)
GREEN ITGREEN IT
ü COMO GERENCIAR E INTEGRAR ESSAS TECNOLOGIAS?
ü A DEMANDA DE MERCADO PARA GESTORES DE TI E REDES DE ALTA
PERFORMANCE?
16/04/2010
11
PósPós--Graduação Internacional Graduação Internacional MBT em Gerenciamento e Gestão de Redes MBT em Gerenciamento e Gestão de Redes
Redes de Alta PerformanceRedes de Alta Performance
Aplicações de Alta Aplicações de Alta Performance Performance ((Aplicações .NetAplicações .Net, , J2EEJ2EE, , MobileMobile e e Computação DistribuídaComputação Distribuída) )
StorageStorage e Banco de Dados de e Banco de Dados de Alta PerformanceAlta Performance
Redes de Alta PerformanceRedes de Alta Performance
Aplicações de Alta Aplicações de Alta Performance Performance ((Aplicações .NetAplicações .Net, , J2EEJ2EE, , MobileMobile e e Computação DistribuídaComputação Distribuída) )
StorageStorage e Banco de Dados de e Banco de Dados de Alta PerformanceAlta Performance
RoteamenoRoteameno e Proteçãoe ProteçãoMultiMulti--layerlayer ((EGPEGP, , IGPIGP e e BGPBGP))
Rede Rede Ótica (Ótica (DWDMDWDM, , SONETSONET e e SDHSDH))Gerenciamento de Gerenciamento de Conexão (Conexão (QoSQoS, , Eng. de Eng. de TráfegoTráfego, , MPLSMPLS e e ATMATM))Segurança da Segurança da Informação Informação para Redes Corporativaspara Redes Corporativas
VirtualizaçãoVirtualização
MiddlewareMiddleware para Redes para Redes InteligentesInteligentes
Redes Redes Wireless (Wireless (WiMaxWiMax e e 4G4G))Arquitetura de Dados Arquitetura de Dados e e SOA (SOA (SaaSSaaS))
RoteamenoRoteameno e Proteçãoe ProteçãoMultiMulti--layerlayer ((EGPEGP, , IGPIGP e e BGPBGP))
Rede Rede Ótica (Ótica (DWDMDWDM, , SONETSONET e e SDHSDH))Gerenciamento de Gerenciamento de Conexão (Conexão (QoSQoS, , Eng. de Eng. de TráfegoTráfego, , MPLSMPLS e e ATMATM))Segurança da Segurança da Informação Informação para Redes Corporativaspara Redes Corporativas
VirtualizaçãoVirtualização
MiddlewareMiddleware para Redes para Redes InteligentesInteligentes
Redes Redes Wireless (Wireless (WiMaxWiMax e e 4G4G))Arquitetura de Dados Arquitetura de Dados e e SOA (SOA (SaaSSaaS))
Gerência e LiderançaGerência e LiderançaOrganizacionalOrganizacional
Gerenciamento de SLAGerenciamento de SLA
Plano de Continuidade Plano de Continuidade de de Negócios Negócios ((BIBI, , Data Data WarehouseWarehouse, , BIABIA, , DRPDRP, ....), ....)
Gerência e LiderançaGerência e LiderançaOrganizacionalOrganizacional
Gerenciamento de SLAGerenciamento de SLA
Plano de Continuidade Plano de Continuidade de de Negócios Negócios ((BIBI, , Data Data WarehouseWarehouse, , BIABIA, , DRPDRP, ....), ....)
CICLOS DO MBTCICLOS DO MBT
Arquitetura de GerenciamentoArquitetura de Gerenciamentode Redesde Redes
Protocolos de Gerenciamento Protocolos de Gerenciamento
de Redesde Redes
PMIPMI
ITILITIL
COBITCOBIT
Ferramentas de GerenciamentoFerramentas de Gerenciamentode Redesde Redes
Prática de Gestão de Projetos Prática de Gestão de Projetos
Gerenciamento de Riscos e Gerenciamento de Riscos e CapacityCapacity ManagementManagement
LoadLoad BalancingBalancing e e ClusteringClustering
Gerenciamento de Ambientes Gerenciamento de Ambientes VirtualizadosVirtualizados
Internet Internet ServiceService ManagementManagement
Arquitetura de GerenciamentoArquitetura de Gerenciamentode Redesde Redes
Protocolos de Gerenciamento Protocolos de Gerenciamento
de Redesde Redes
PMIPMI
ITILITIL
COBITCOBIT
Ferramentas de GerenciamentoFerramentas de Gerenciamentode Redesde Redes
Prática de Gestão de Projetos Prática de Gestão de Projetos
Gerenciamento de Riscos e Gerenciamento de Riscos e CapacityCapacity ManagementManagement
LoadLoad BalancingBalancing e e ClusteringClustering
Gerenciamento de Ambientes Gerenciamento de Ambientes VirtualizadosVirtualizados
Internet Internet ServiceService ManagementManagement
üü Gerenciamento de Ambientes VirtualizadosGerenciamento de Ambientes Virtualizados
TotaTotall
4º Semestre(Módulo 4)
Carga horária
GRADE CURRICULARGRADE CURRICULAR
16/04/2010
14
PARCEIROS FITPARCEIROS FIT
Módulo Módulo InternacionalInternacional
InformationInformation SecuritySecurity Management for Management for Enterprise Networks (32h)Enterprise Networks (32h)
ManagerialManagerial ConceptsConcepts in in InformationInformationTechnologyTechnology (32h)(32h)
Workshop (16h)Workshop (16h)
Apresentação do Projeto Final do Curso na Apresentação do Projeto Final do Curso na CCC&TICCC&TI e, posteriormente, na FITe, posteriormente, na FIT
MÓDULO INTERNACIONALMÓDULO INTERNACIONAL
16/04/2010
15
MÓDULO INTERNACIONALMÓDULO INTERNACIONAL
Information Security Management for EnterpriseInformation Security Management for EnterpriseNetworksNetworks
•• Analysis of VulnerabilityAnalysis of Vulnerability•• Information Security Project ManagementInformation Security Project Management•• Risk ManagementRisk Management•• Security PlanningSecurity Planning•• Security PolicySecurity Policy•• VPN (tunneling, cryptograph, IPSec, ... )VPN (tunneling, cryptograph, IPSec, ... )•• Authentication and ProtocolsAuthentication and Protocols•• Firewall / DMZFirewall / DMZ•• Intrusion Detection SystemsIntrusion Detection Systems•• Group PolicyGroup Policy•• Security for Mobile CommunicationsSecurity for Mobile Communications•• Identity ManagementIdentity Management•• Information Security MaintenanceInformation Security Maintenance
MÓDULO INTERNACIONALMÓDULO INTERNACIONAL
Managerial Concepts in Information TechnologyManagerial Concepts in Information Technology
•• Managing in the Information AgeManaging in the Information Age•• Information Technology`s Strategic ImportanceInformation Technology`s Strategic Importance•• Developing the Organization`s IT StrategyDeveloping the Organization`s IT Strategy•• Information Technology PlanningInformation Technology Planning•• Hardware and Software TrendsHardware and Software Trends•• Modern Telecommunications SystemsModern Telecommunications Systems•• Legislative and Industry TrendsLegislative and Industry Trends•• Managing Application PortfoliosManaging Application Portfolios•• Managing Application DevelopmentManaging Application Development•• Development and Acquisition AlternativesDevelopment and Acquisition Alternatives•• Managing EManaging E--Business ApplicationsBusiness Applications•• Developing and Managing Customer ExpectationsDeveloping and Managing Customer Expectations•• Managing Computer and Data ResourcesManaging Computer and Data Resources•• Managing EManaging E--business and Network Systemsbusiness and Network Systems•• Measuring IT Investments and ReturnsMeasuring IT Investments and Returns
•• IT Controls and Asset Protection, and IT Controls and Asset Protection, and SecuritySecurity
•• People, Organizations, and Management People, Organizations, and Management SystemsSystems
•• The Chief Information Officer`s RoleThe Chief Information Officer`s Role•• Strategic PlanningStrategic Planning•• Project ManagementProject Management•• Business Process and IT OutsourcingBusiness Process and IT Outsourcing•• Corporate Governance and ITCorporate Governance and IT•• Collaboration Tools and Wireless Collaboration Tools and Wireless
Part 1Part 1: Readings in the Management of Information Security: Readings in the Management of Information Security•• Mobile Device Security ManagementMobile Device Security Management, Benjamin J. , Benjamin J. HalpertHalpert•• Linking Business Objectives and Security DirectivesLinking Business Objectives and Security Directives, Donald L. , Donald L. PipkinPipkin•• Managing Incident ResponseManaging Incident Response, David M. , David M. ShacklefordShackleford•• The Role of Information Security and Its Relationship to Information Technology Risk ManagementThe Role of Information Security and Its Relationship to Information Technology Risk Management, , ChrisanChrisan HerrodHerrod•• Architecting and Managing Secure Biometric SystemsArchitecting and Managing Secure Biometric Systems, , KameswaraKameswara RaonamuduriRaonamuduri& & SavithaSavitha S. S. KadiyalaKadiyala•• Integration and Ethical Perspectives for Information Systems ManagementIntegration and Ethical Perspectives for Information Systems Management, Ernest A. , Ernest A. CapozzoliCapozzoli; ; RoberRober D. Winsor & D. Winsor & ShebSheb L. TrueL. True•• Security Education, Training, and Awareness from a Human Performance Technology Point of ViewSecurity Education, Training, and Awareness from a Human Performance Technology Point of View, Melissa J. Dark, Melissa J. Dark•• The Provision of Defenses Against InternetThe Provision of Defenses Against Internet--Based AttacksBased Attacks, Li, Li--ChiouChiou Chen; Thomas A. Chen; Thomas A. LongstaffLongstaff & Kathleen M. & Kathleen M. CarleyCarley•• Trust, Controls and Information SecurityTrust, Controls and Information Security, Irene , Irene WoonWoon & & AtreyiAtreyi KankanhalliKankanhalli•• Hierarchical Model of Organizational Work in the Sphere of Information SecurityHierarchical Model of Organizational Work in the Sphere of Information Security, Alexander , Alexander AnisimovAnisimov•• Transparency in Information Security System DesignTransparency in Information Security System Design, Hebert J. , Hebert J. MattordMattord & Michael E. Whitman& Michael E. Whitman
Part 2Part 2: Cases in the Management of Information Security: Cases in the Management of Information Security•• CASE ACASE A: : Computer Gaming TechnologiesComputer Gaming Technologies--CGT IncCGT Inc., Michael E. Whitman & Hebert J. ., Michael E. Whitman & Hebert J. MattordMattord•• CASE BCASE B: : Assessing and Mitigating the Risks to a Hypothetical Computer SystemAssessing and Mitigating the Risks to a Hypothetical Computer System, National Institute of Standards and Technology , National Institute of Standards and Technology
(NIST); Technology Administration; U.S. Department of Commerce(NIST); Technology Administration; U.S. Department of Commerce•• CASE CCASE C: : Random Widget WorksRandom Widget Works, Michael E. Whitman & Hebert J. , Michael E. Whitman & Hebert J. MattordMattord•• CASE DCASE D: : Sequential Label and SupplySequential Label and Supply, Hebert J. , Hebert J. MattordMattord & Michael E. Whitman& Michael E. Whitman•• CASE ECASE E: : BrightingtonBrightington AcademyAcademy, Michael E. Whitman & Hebert J. , Michael E. Whitman & Hebert J. MattordMattord•• CASE FCASE F: : The 9/11 Commission ReportThe 9/11 Commission Report, Hebert J. , Hebert J. MattordMattord & Michael E. Whitman& Michael E. Whitman