SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Quareo™
Businesses and organizations worldwide are more dependent than
ever upon networks that operate over a broadly distributed physical
infrastructure layer, comprised of hundreds of millions of cables and
connections. The reliability or fallibility of these networks’ is dependent
upon many factors, including comprehensive and accurate status
and documentation, and the ability of network personnel to isolate,
troubleshoot, and repair failures.

With network challenges and growing complexities, there is a greater need to identify
a solution that will confront the following issues head-on:


S e c u ri ty   Every organization must mitigate the risk of network intrusion to prevent
   compromise of critical business information. Ever-increasing security threats raise
   the need for organizations to require complete network visibility and instantaneous
   intrusion detection.


Hi gh Avai l abi l i ty      Today’s networks require business continuity, but network
   operators currently lack visibility into the entire network as the physical layer is
   excluded from existing network management, monitoring systems and policies. With
   typically 60 to 80% of unplanned downtime originating in the physical layer, this lack
   of visibility and management capability poses serious risks to network availability.


OPEX        The costs associated with network infrastructure maintenance are staggering.
   Tracking, tracing, discovering and resolving network disruptions have a direct impact
   on your organization’s IT budgets and bottom line. Accurate knowledge of physical
   layer network topology leads to less network issues, faster resolution of problems and
   a reduced OPEX.


Compl i an ce        There are a variety of government regulations, compliance and
   reporting requirements regarding how an organization’s data is accessed, transacted
   and stored. Today’s network management tools simply do not have access to
   information related to physical layer connections where intrusion detection and
   accurate logging of events can guarantee network integrity and meet security,
   compliance and reporting requirements.


Capac i ty an d S c al e         The ever-increasing amount of network traffic and data
   storage requirements continues to drive complexity in the network. Data Centers need
   to be more agile and able to scale their network based on new demands. It is more
   critical than ever to choose solutions that allow for capacity and flexibility.
TE’s Q u a re o ™
To solve these network issues, TE Connectivity introduces Quareo, a game-changing
technology in the physical layer or layer 1 of the OSI model. This technology is based on
unique identifiers for every connection point in the network, where a connection point
can be defined as one end of an Ethernet cable or a port on a network device. Quareo is
a Connection Point Identification Technology™, which provides unprecedented knowledge
about the network including accurate documentation and reporting of changes, as well as
enhanced security; Quareo enables higher network availability while lowering the network
operating costs for a network, from the data center all the way to the desktop.


Wh at is Q u a re o?
Quareo is based on microchips that are
embedded in connectors of TE’s high-
                                                       Ope n Syste m Inte rco nne c t i o n M o d e l (OSI)
performance copper and fiber network
cabling solutions. These microchips have
information related to the cable itself as
well as unique identifiers for each cable.
Quareo PathManager software suite is                                                                                               Layer 3
                                                                                                                                 Network Layer

able to have real time communication                 Computer/Phone Sytems

with each cable and network panel.
This information is stored in the Quareo
PathManager database and is then
used to draw topology maps as well as                                                                                                              Layer 2
                                                                                                                                                   Data Link
integrate with industry applications.


                                                                                                                            Layer 1
                                                                                                                          Physical Layer




Today, network managers utilize multiple routers or switches                 Finally, the same can be said for the appliances, be they IP phones,
connected together to effectively run the network. The perception is         laptops, PCs, WAPs, etc. These items aren’t directly connected to the
that these routers or switches are physically connected to each other,       servers, routers or switches. They are connected to the physical layer
but the reality is that they are actually connected together through         that connects them to the servers.
the physical layer.

                                                                             Although the network perception is that all these items are connected
The same is true for application servers. They either have multiple          together via a direct connections, the reality is that they are all
servers, or partitions of servers are logically connected together           connected together through a complex and distributed physical
through routers or switches. Again, these servers aren’t physically          layer infrastructure.
connected to the routers or switches directly. They are connected via
the physical layer.
How i s th e Qu are o di f fe re nt ?
                      The technology uniquely identifies each connection at the time of install, which enables
                      the Quareo PathManager software to automatically self-discover, inventory and
                      document the connection and co-relate all other connections in the network to create
                      a comprehensive network view of the connection points. Every physical change in the
                      network is recorded for real-time monitoring and event logs, topology mapping and
                      problem solving from the data center to the desktop. Quareo delivers unprecedented
                      security and business continuity by making every outage, interruption or intrusion
                      instantaneously visible via graphic display and reporting tools.


                      Wh at i s th e val u e of Qua re o?
                      Quareo enables easier, smarter network management for everyone from cable installers
                      to network managers, strengthening physical security, boosting availability and
                      providing real-time communication with network assets. Quareo brings a new level of
                      business intelligence to the network by making possible a wealth of new applications.
                      Organizations can now increase service levels and reduce OPEX across the entire network
                      with access to new applications functionality made possible by Quareo, ranging from
                      security and inventory management to remote diagnostics and managed or outsourced
                      services. This unparalleled visibility into a network will enable organizations to have
                      documented compliance to regulatory or industry requirements as well as to network
                      security policies.


                      Why TE?
                      TE network connectivity solutions can be found in many of the world’s largest
                      telecommunications networks and data centers, including highly secure commercial
                      and government installations that demand mission-critical quality and reliability.
                      Quareo technology represents a logical, next generation innovation based on the core
                      competencies of TE bolstered by patent-pending chip technology and software. The
                      design of the new Connection Point ID technology and corresponding open architecture
                      software provides infinitely scalable physical layer visibility and management that
                      integrates transparently with existing network management software.




Contact us:
Greensboro, NC
USA 55440-1101                               TE Connectivity, TE connectivity (logo), Tyco Electronics, TE (logo), and Quareo are trademarks of the TE Connectivity Ltd. family of
Tel: 1-800-553-0938                          companies and its licensors.
Fax: 1-717-986-7406                          While TE Connectivity has made every reasonable effort to ensure the accuracy of the information in this document, TE Connectivity does
                                             not guarantee that it is error-free, nor does TE Connectivity make any other representation, warranty or guarantee that the information is
www.te.com                                   accurate, correct, reliable or current. TE Connectivity reserves the right to make any adjustments to the information contained herein at
                                             any time without notice. TE Connectivity expressly disclaims all implied warranties regarding the information contained herein, including,
www.te.com/adc                               but not limited to, any implied warranties of merchantability or fitness for a particular purpose. The dimensions in this document are
                                             for reference purposes only and are subject to change without notice. Specifications are subject to change without notice. Consult
                                             TE Connectivity for the latest dimensions and design specifications.

                                             © 2011 Tyco Electronics Corporation, a TE Connectivity Ltd. Company. All Rights Reserved.
                                             108415AE 4/11 Original © 2011

Contenu connexe

Tendances

Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsDHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsMichael Smith
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Securityijtsrd
 
Device Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetDevice Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetMETZ CONNECT USA Inc.
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPNIRJET Journal
 
DDS in SCADA, Utilities, Smart Grid and Smart Cities
DDS in SCADA, Utilities, Smart Grid and Smart CitiesDDS in SCADA, Utilities, Smart Grid and Smart Cities
DDS in SCADA, Utilities, Smart Grid and Smart CitiesAngelo Corsaro
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 

Tendances (20)

Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Sdnhpkorea
SdnhpkoreaSdnhpkorea
Sdnhpkorea
 
History
HistoryHistory
History
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control SystemsDHS - Recommendations for Securing Zigbee Networks in Process Control Systems
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
 
Device Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetDevice Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial Ethernet
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Report-SDN
Report-SDNReport-SDN
Report-SDN
 
Wireless security
Wireless securityWireless security
Wireless security
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
DDS in SCADA, Utilities, Smart Grid and Smart Cities
DDS in SCADA, Utilities, Smart Grid and Smart CitiesDDS in SCADA, Utilities, Smart Grid and Smart Cities
DDS in SCADA, Utilities, Smart Grid and Smart Cities
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 

Similaire à Quareo Solution Overview

Quareo know your network intro presentation v2 1
Quareo know your network intro presentation   v2 1Quareo know your network intro presentation   v2 1
Quareo know your network intro presentation v2 1Bill Miller
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptxGaneshHS6
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetMeshDynamics
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuideEugene Yu
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Kanishka Ramyar
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 

Similaire à Quareo Solution Overview (20)

Quareo know your network intro presentation v2 1
Quareo know your network intro presentation   v2 1Quareo know your network intro presentation   v2 1
Quareo know your network intro presentation v2 1
 
E018113036
E018113036E018113036
E018113036
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptx
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuide
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
19 23
19 2319 23
19 23
 

Quareo Solution Overview

  • 2. Businesses and organizations worldwide are more dependent than ever upon networks that operate over a broadly distributed physical infrastructure layer, comprised of hundreds of millions of cables and connections. The reliability or fallibility of these networks’ is dependent upon many factors, including comprehensive and accurate status and documentation, and the ability of network personnel to isolate, troubleshoot, and repair failures. With network challenges and growing complexities, there is a greater need to identify a solution that will confront the following issues head-on: S e c u ri ty Every organization must mitigate the risk of network intrusion to prevent compromise of critical business information. Ever-increasing security threats raise the need for organizations to require complete network visibility and instantaneous intrusion detection. Hi gh Avai l abi l i ty Today’s networks require business continuity, but network operators currently lack visibility into the entire network as the physical layer is excluded from existing network management, monitoring systems and policies. With typically 60 to 80% of unplanned downtime originating in the physical layer, this lack of visibility and management capability poses serious risks to network availability. OPEX The costs associated with network infrastructure maintenance are staggering. Tracking, tracing, discovering and resolving network disruptions have a direct impact on your organization’s IT budgets and bottom line. Accurate knowledge of physical layer network topology leads to less network issues, faster resolution of problems and a reduced OPEX. Compl i an ce There are a variety of government regulations, compliance and reporting requirements regarding how an organization’s data is accessed, transacted and stored. Today’s network management tools simply do not have access to information related to physical layer connections where intrusion detection and accurate logging of events can guarantee network integrity and meet security, compliance and reporting requirements. Capac i ty an d S c al e The ever-increasing amount of network traffic and data storage requirements continues to drive complexity in the network. Data Centers need to be more agile and able to scale their network based on new demands. It is more critical than ever to choose solutions that allow for capacity and flexibility.
  • 3. TE’s Q u a re o ™ To solve these network issues, TE Connectivity introduces Quareo, a game-changing technology in the physical layer or layer 1 of the OSI model. This technology is based on unique identifiers for every connection point in the network, where a connection point can be defined as one end of an Ethernet cable or a port on a network device. Quareo is a Connection Point Identification Technology™, which provides unprecedented knowledge about the network including accurate documentation and reporting of changes, as well as enhanced security; Quareo enables higher network availability while lowering the network operating costs for a network, from the data center all the way to the desktop. Wh at is Q u a re o? Quareo is based on microchips that are embedded in connectors of TE’s high- Ope n Syste m Inte rco nne c t i o n M o d e l (OSI) performance copper and fiber network cabling solutions. These microchips have information related to the cable itself as well as unique identifiers for each cable. Quareo PathManager software suite is Layer 3 Network Layer able to have real time communication Computer/Phone Sytems with each cable and network panel. This information is stored in the Quareo PathManager database and is then used to draw topology maps as well as Layer 2 Data Link integrate with industry applications. Layer 1 Physical Layer Today, network managers utilize multiple routers or switches Finally, the same can be said for the appliances, be they IP phones, connected together to effectively run the network. The perception is laptops, PCs, WAPs, etc. These items aren’t directly connected to the that these routers or switches are physically connected to each other, servers, routers or switches. They are connected to the physical layer but the reality is that they are actually connected together through that connects them to the servers. the physical layer. Although the network perception is that all these items are connected The same is true for application servers. They either have multiple together via a direct connections, the reality is that they are all servers, or partitions of servers are logically connected together connected together through a complex and distributed physical through routers or switches. Again, these servers aren’t physically layer infrastructure. connected to the routers or switches directly. They are connected via the physical layer.
  • 4. How i s th e Qu are o di f fe re nt ? The technology uniquely identifies each connection at the time of install, which enables the Quareo PathManager software to automatically self-discover, inventory and document the connection and co-relate all other connections in the network to create a comprehensive network view of the connection points. Every physical change in the network is recorded for real-time monitoring and event logs, topology mapping and problem solving from the data center to the desktop. Quareo delivers unprecedented security and business continuity by making every outage, interruption or intrusion instantaneously visible via graphic display and reporting tools. Wh at i s th e val u e of Qua re o? Quareo enables easier, smarter network management for everyone from cable installers to network managers, strengthening physical security, boosting availability and providing real-time communication with network assets. Quareo brings a new level of business intelligence to the network by making possible a wealth of new applications. Organizations can now increase service levels and reduce OPEX across the entire network with access to new applications functionality made possible by Quareo, ranging from security and inventory management to remote diagnostics and managed or outsourced services. This unparalleled visibility into a network will enable organizations to have documented compliance to regulatory or industry requirements as well as to network security policies. Why TE? TE network connectivity solutions can be found in many of the world’s largest telecommunications networks and data centers, including highly secure commercial and government installations that demand mission-critical quality and reliability. Quareo technology represents a logical, next generation innovation based on the core competencies of TE bolstered by patent-pending chip technology and software. The design of the new Connection Point ID technology and corresponding open architecture software provides infinitely scalable physical layer visibility and management that integrates transparently with existing network management software. Contact us: Greensboro, NC USA 55440-1101 TE Connectivity, TE connectivity (logo), Tyco Electronics, TE (logo), and Quareo are trademarks of the TE Connectivity Ltd. family of Tel: 1-800-553-0938 companies and its licensors. Fax: 1-717-986-7406 While TE Connectivity has made every reasonable effort to ensure the accuracy of the information in this document, TE Connectivity does not guarantee that it is error-free, nor does TE Connectivity make any other representation, warranty or guarantee that the information is www.te.com accurate, correct, reliable or current. TE Connectivity reserves the right to make any adjustments to the information contained herein at any time without notice. TE Connectivity expressly disclaims all implied warranties regarding the information contained herein, including, www.te.com/adc but not limited to, any implied warranties of merchantability or fitness for a particular purpose. The dimensions in this document are for reference purposes only and are subject to change without notice. Specifications are subject to change without notice. Consult TE Connectivity for the latest dimensions and design specifications. © 2011 Tyco Electronics Corporation, a TE Connectivity Ltd. Company. All Rights Reserved. 108415AE 4/11 Original © 2011