How to Configure the NFX250 Nextgen

Total Page:16

File Type:pdf, Size:1020Kb

How to Configure the NFX250 Nextgen How to Configure the NFX250 NextGen Published 2021-04-20 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. How to Configure the NFX250 NextGen Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. iii Table of Contents About This Guide | x 1 Overview NFX250 NextGen Overview | 2 Software Architecture | 3 NFX250 Models | 5 Interfaces | 6 Performance Modes | 7 Benefits and Uses | 11 Junos OS Releases Supported on NFX Series Hardware | 12 Upgrade the NFX250 Software to NFX250 NextGen Software | 14 NFX250 NextGen Software Upgrade Overview | 14 Prerequisites | 14 Upgrade to NFX250 NextGen Software Architecture | 17 NFX Product Compatibility | 17 2 Initial Configuration Initial Configuration on NFX250 NextGen Devices | 22 Factory Default Settings | 22 Enabling Basic Connectivity | 23 Establishing the Connection | 24 Zero Touch Provisioning on NFX Series Devices | 25 Understanding Zero Touch Provisioning | 25 Pre-staging an NFX Series Device | 26 Provisioning an NFX Series Device | 29 Provisioning an NFX Series Device Using Sky Enterprise | 30 iv 3 Generating YANG Files YANG files on NFX250 NextGen Devices | 32 Understanding YANG on NFX250 NextGen Devices | 32 Generating YANG Files | 33 4 Configuring Interfaces Configuring the In-Band Management Interface on NFX250 NextGen Devices | 36 ADSL2 and ADSL2+ Interfaces on NFX250 NextGen Devices | 37 ADSL Interface Overview | 37 Example: Configuring ADSL SFP Interface on NFX250 Devices | 39 Requirements | 39 Overview | 39 Configuration | 39 Results | 41 VDSL2 Interfaces on NFX250 NextGen Devices | 41 VDSL Interface Overview | 41 VDSL2 Network Deployment Topology | 42 VDSL2 Interface Support on NFX Series Devices | 44 Example: Configuring VDSL SFP Interface on NFX250 Devices | 46 Requirements | 47 Overview | 47 Configuration | 47 Results | 49 Configuring the LTE Module on NFX Devices | 49 Configuring the LTE Module for Primary Mode | 50 Configuring the LTE Module for Dial-on-Demand Mode | 52 Configuring the LTE Module for Backup Mode | 54 Configuring the LTE Interface Module in an NFX150 Chassis Cluster | 55 5 Configuring USB Pass-Through on NFX Series Devices Supporting File Transfer from USB on NFX Series Devices | 63 v 6 Configuring Security IP Security on NFX Devices | 67 Overview | 67 Configuring Security | 69 Configuring Interfaces | 69 Configuring Routing Options | 70 Configuring Security IKE | 71 Configuring Security IPsec | 74 Configuring Security Policies | 76 Configuring Security Zones | 77 UTM on NFX Devices | 77 Application Security on NFX Devices | 78 Intrusion Detection and Prevention on NFX Devices | 79 Integrated User Firewall Support on NFX Devices | 80 7 Configuring Virtual Network Functions Prerequisites to Onboard Virtual Network Functions on NFX250 NextGen Devices | 83 NFX250 NextGen Device Prerequisites to Onboard a VNF | 83 VNF Prerequisites to Onboard on an NFX250 NextGen Device | 85 Validate the VNFs | 85 Sample Output | 86 Configuring VNFs on NFX250 NextGen Devices | 91 Load a VNF Image | 92 Prepare the Bootstrap Configuration | 93 Allocate CPUs for a VNF | 94 Allocate Memory for a VNF | 97 (Optional) Attach a Config Drive to the VNF | 99 Configure Interfaces and VLANs for a VNF | 106 Configure Storage Devices for VNFs | 110 vi Instantiate a VNF | 111 Verify the VNF Instantiation | 112 Managing VNFs on NFX Series Devices | 113 Managing VNF States | 113 Managing VNF MAC Addresses | 114 Managing the MTU of a VNF Interface | 115 Accessing a VNF from the JCP | 116 Viewing the List of VNFs | 116 Displaying the Details of a VNF | 117 Deleting a VNF | 117 Configuring Analyzer VNF and Port-mirroring | 118 8 Configuring Mapping of Address and Port with Encapsulation (MAP-E) Mapping of Address and Port with Encapsulation on NFX Series Devices | 120 Overview | 120 Benefits of MAP-E | 120 MAP-E Terminology | 121 MAP-E Functionality | 122 Configuring MAP-E on NFX Series Devices | 123 Overview | 123 Requirements | 123 Topology Overview | 123 Configure an NFX Series Device as a MAP-E CE Device | 124 Configure an MX Series Device as a BR Device | 127 Verify the MAP-E Configuration | 129 9 Configuring High Availability Chassis Cluster on NFX250 NextGen Devices | 136 vii NFX250 NextGen Chassis Cluster Overview | 136 Chassis Cluster Interfaces | 137 Chassis Cluster Limitation | 138 Example: Configuring a Chassis Cluster on NFX250 NextGen Devices | 138 Requirements | 138 Overview | 139 Configuration | 140 Verification | 148 Upgrading or Disabling a Chassis Cluster on NFX250 NextGen Devices | 152 Upgrading Individual Devices in a Chassis Cluster Separately | 152 Disabling a Chassis Cluster | 153 10 Configuring Service Chaining Example: Configuring Service Chaining Using VLANs on NFX250 NextGen Devices | 155 Requirements | 155 Overview | 155 Configuration | 157 Example: Configuring Service Chaining Using SR-IOV on NFX250 NextGen Devices | 162 Requirements | 162 Overview | 163 Configuration | 165 Example: Configuring Service Chaining Using a Custom Bridge on NFX250 NextGen Devices | 169 Requirements | 170 Overview | 170 Configuration | 171 Verifying the Configuration | 174 Example: Configuring Cross-Connect on NFX250 NextGen Devices | 180 Requirements | 181 viii Overview | 181 Configuration | 182 Verifying the Configuration | 185 Example: Configuring Service Chaining for LAN Routing on NFX250 NextGen Devices | 192 Requirements | 192 Overview | 193 Configuration | 194 Example: Configuring Service Chaining for LAN to WAN Routing on NFX250 NextGen Devices | 195 Requirements | 196 Overview | 196 Configuration | 197 Verification | 199 Example: Configuring Service Chaining for LAN to WAN Routing through Third-party VNFs on NFX250 NextGen Devices | 201 Requirements | 201 Overview | 201 Configuration | 202 Verification | 206 11 Troubleshooting Recovering the Root Password for NFX150, NFX250 NextGen, and NFX350 Devices | 209 Troubleshooting Interfaces on NFX Devices | 213 Monitoring Interface Status and Traffic on NFX Series Devices | 213 12 Operational Commands request vmhost cleanup | 220 request vmhost file-copy | 221 request vmhost halt | 223 ix request vmhost mode | 225 request vmhost power-off | 227 request vmhost reboot | 228 request vmhost software add | 232 request vmhost storage | 235 show system visibility cpu | 238 show system visibility host | 243 show system visibility memory | 255 show system visibility network | 258 show system visibility vnf | 267 show vmhost connections | 274 show vmhost control-plane | 277 show vmhost crash | 278 show vmhost forwarding-options analyzer | 280 show vmhost memory | 282 show vmhost mode | 284 show vmhost status | 292 show vmhost storage | 294 show vmhost uptime | 301 show vmhost version | 303 show vmhost vlans | 306 x About This Guide Use this guide to perform initial provisioning, configure Junos OS features, chain multiple virtualized network functions, monitor, and manage the NFX250 NextGen devices. 1CHAPTER Overview NFX250 NextGen Overview | 2 Upgrade the NFX250 Software to NFX250 NextGen Software | 14 NFX Product Compatibility | 17 2 NFX250 NextGen Overview IN THIS SECTION Software Architecture | 3 NFX250 Models | 5 Interfaces | 6 Performance Modes | 7 Benefits and Uses | 11 Junos OS Releases Supported on NFX Series Hardware | 12 The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premises equipment (CPE) platform that delivers virtualized network and security services on demand. The NFX250 is part of the Juniper Cloud CPE solution, which leverages Network Functions Virtualization (NFV). It enables service providers to deploy and chain multiple, secure, and high- performance virtualized network functions (VNFs) on a single device. Figure 1 on page 2 shows the NFX250 device. Figure 1: NFX250 Device The NFX250 is a complete SD-WAN CPE, which provides secure router functionality and Next- Generation Firewall (NGFW) solution. NGFW includes security features such as • VPN (see VPN User Guide for Security Devices) • NAT (see NAT User Guide) 3 • ALG (see Application Layer Gateways User Guide) • Application Security (see AppSecure User Guide) • UTM features including Enhanced Web Filtering and Anti-Virus (see UTM User Guide) The NFX250 device is suitable for small to midsize businesses and large multinational or distributed
Recommended publications
  • Escuela Técnica Superior De Ingenieros De Telecomunicación
    ESCUELA TÉCNICA SUPERIOR DE INGENIEROS DE TELECOMUNICACIÓN TRABAJO FIN DE GRADO GRADO EN INGENIERÍA DE TECNOLOGÍAS ESPECÍFICAS DE TELECOMUNICACIÓN MENCIÓN EN TELEMÁTICA APLICACIÓN ANDROID PARA EL ENTRENAMIENTO COGNITIVO DE PERSONAS BAJO TUTELA JURÍDICA CON DISCAPACIDAD INTELECTUAL O DEL DESARROLLO AUTOR: D. RAÚL VELASCO CAMINERO TUTORA: DRA. DÑA. MÍRIAM ANTÓN RODRÍGUEZ VALLADOLID, ENERO de 2017 TÍTULO: Aplicación Android para el entrenamiento cognitivo de personas bajo tutela jurídica con discapacidad intelectual o del desarrollo AUTOR: D. Raúl Velasco Caminero TUTORA: Dra. Dña. Míriam Antón Rodríguez DEPARTAMENTO: Teoría de la Señal y Comunicaciones e Ingeniería Telemática TRIBUNAL PRESIDENTE: Míriam Antón Rodríguez VOCAL: Mario Martínez Zarzuela SECRETARIO: David González Ortega SUPLENTE: Francisco Javier Díaz Pernas SUPLENTE: Mª Ángeles Pérez Juárez FECHA: CALIFICACIÓN: 3 Resumen El objetivo principal de este proyecto consiste en el desarrollo de una aplicación para la plataforma Android con el fin de tratar de mejorar las capacidades cognitivas de los tutelados a través de juegos desarrollados específicamente para tal fin. Aunque esta es la funcionalidad principal que se ofrece, la aplicación va más allá. Permite llevar un seguimiento de cada tutelado y crear y ver los detalles de los mismos. También permite ver estadísticas de los tutelados en los distintos juegos para ver su desarrollo y mejora. La aplicación es un sistema de seguimiento y rehabilitación donde los voluntarios introducen sus credenciales para poder acceder a todas las funcionalidades citadas anteriormente que ofrece la aplicación. El sistema está desarrollado en Java utilizando el IDE Android Studio y puede utilizarse en cualquier dispositivo que disponga de Android 4.0 o superior como sistema operativo.
    [Show full text]
  • Mejora Del Comando En Ps En Minix
    MEJORA DEL COMANDO PS EN MINIX. INGENIERIA TECNICA INFORMATICA DE GESTION 2007 1 INTRODUCCIÓN......................................................................................................................................3 OBJETIVO .................................................................................................................................................3 FUNDAMENTOS TEÓRICOS.................................................................................................................3 • FICHERO MINIX/PROC.H.....................................................................................................................3 • FICHERO MINIX/CONF.H.....................................................................................................................3 • FICHERO MINIX/CONFIG.H ................................................................................................................3 • FICHERO MINIX/MPROG.H..................................................................................................................3 • FICHERO USR/LOCAL/SMX/SRC/FS/FPROG.H.......................................................................................4 DESCRIPCIÓN DEL TRABAJO REALIZADO....................................................................................4 PASOS SEGUIDOS PARA LA CREACIÓN DEL PROYECTO..........................................................5 CONCLUSIONES......................................................................................................................................6
    [Show full text]
  • Planificación De Procesos
    ETSISI - UPM Sistemas Operativos Curso 20/21 PRÁCTICA 3 Planificación de procesos 15 de Octubre 2020 ETSISI - UPM Sistemas Operativos Curso 20/21 ÍNDICE 1 OBJETIVOS ................................................................................................................................................... 2 2 ENUNCIADO ................................................................................................................................................. 2 3 JUGANDO CON LA POLÍTICA DE PLANIFICACIÓN ............................................................................. 2 4 PRIMERA APROXIMÁCIÓN ....................................................................................................................... 5 5 UNA SOLUCIÓN MÁS ADECUADA .......................................................................................................... 7 6 PUNTUACIÓN ............................................................................................................................................... 8 7 ANEXOS......................................................................................................................................................... 9 7.1 Fichero de pruebas: prueba1.c ................................................................................................................. 9 7.2 Fichero de pruebas: prueba2.c ................................................................................................................. 9 7.3 Fichero de pruebas: prueba3.c ..............................................................................................................
    [Show full text]
  • PRÁCTICA 3 Planificación De Procesos
    E.T.S.I.S.I. Sistemas Operativos Curso 19/20 PRÁCTICA 3 Planificación de procesos VERSIÓN BETA Adaptación (P. P. López) para Windows de practica3.pdf (P. Carazo) Página - 1 E.T.S.I.S.I. Sistemas Operativos Curso 19/20 ÍNDICE 1 OBJETIVOS ........................................................................................................................ 3 2 ENUNCIADO ..................................................................................................................... 3 3 JUGANDO CON LA POLÍTICA DE PLANIFICACIÓN ................................................. 3 4 PRIMERA APROXIMÁCIÓN ......................................................................................... 23 5 UNA SOLUCIÓN MÁS ADECUADA ............................................................................ 24 6 PUNTUACIÓN ................................................................................................................. 25 Página - 2 E.T.S.I.S.I. Sistemas Operativos Curso 19/20 1 OBJETIVOS Los objetivos de esta práctica son: • Entender la política de planificación de procesos de MINIX • Modificar la política de planificación de procesos de MINIX 2 ENUNCIADO Lo que se pide en esta práctica es modificar la estrategia de planificación de procesos de MINIX 3 (transparencia 86 de procesos.ppt) atendiendo a los criterios siguientes: 1. La política de planificación no debe modificar la prioridad de un proceso (sí podría modificarla algún comando externo al planificador) 2. En el momento de determinar qué proceso debe ejecutarse, se seleccionará
    [Show full text]
  • Volume #37 Spring 2019
    Volume #37 Spring 2019 The Forum Official Publication of Phi Sigma Iota International Foreign Language Honor Society Volume 37 Spring 2019 In This Issue FROM THE COMITIUM page 1 This column carries reports of the Executive Committee of Phi Sigma Iota. Please send comments to [email protected] to the attention of Mirna Trauger, President. FROM THE CURIA page 5 The Curia, a section devoted to guest contributors, features a poem in memory. of Taylor Bonora, a Spanish language student and Phi Sigma Iota member at Cal State Chico, who lost her battle with cancer. In addition, read how two chapters celebrated foreign language and culture on their campuses to increase visability and celebrate cultural diversity. FROM THE ROSTRUM page 8 Phi Sigma Iota exists to recognize students who excel in language learning. The experiences of learning a new language or of becoming better acquainted with a culture other than one’s own are unique to each student. The Rostrum offers student members of Phi Sigma Iota the opportunity to publish their original writing about these experiences. REPORTS FROM THE 2017-2018 SCHOLARSHIP RECIPIENTS page 33 IT’S ALL ABOUT US! page 40 In this section, we publish your chapter news and photographs. We also report new chapter charters. Let us hear from you! Send news and pictures to Administrative Director Roz Macken at [email protected]. Editor, Kajsa C. Larson Associate Professor of Spanish Gamma Phi Chapter #222 Northern Kentucky University FROM THE COMITIUM: President’s Letter As I begin my second year as president, I would like to share with you what a pleasure it has been to serve on the Executive Board of Phi Sigma Iota.
    [Show full text]
  • 1147 SPARTA, Inc YI
    Network Working Group R. Stine, Editor Request for Comments: 1147 SPARTA, Inc. FYI: 2 April 1990 FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices Status of this Memo The goal of this FYI memo is to provide practical information to site administrators and network managers. This memo provides information for the Internet community. It does not specify any standard. It is not a state- ment of IAB policy or recommendations. Comments, critiques, and new or updated tool descriptions are wel- come, and should be sent to Robert Stine, at [email protected], or to the NOCTools working group, at [email protected]. Distribution of this memo is unlimited. 1. Introduction This catalog contains descriptions of several tools available to assist network managers in debugging and main- taining TCP/IP internets and interconnected communications resources. Entries in the catalog tell what a tool does, how it works, and how it can be obtained. The NOCTools Working Group of the Internet Engineering Task Force (IETF) compiled this catalog in 1989. Future editions will be produced as IETF members become aware of tools that should be included, and of de®ciencies or inaccuracies. Developing an edition oriented to the OSI protocol suite is also contemplated. The tools described in this catalog are in no way endorsed by the IETF. For the most part, we have neither evaluated the tools in this catalog, nor validated their descriptions. Most of the descriptions of commercial tools have been provided by vendors. Caveat Emptor. 1.1 Purpose The practice of re-inventing the wheel seems endemic to the ®eld of data communications.
    [Show full text]
  • Cover Sheet for Technical Memorandur
    @eell Laboratories Cover Sheet for Technical Memorandur The information contained herein is for the use of employees of Be// Laboratories and is not for publication (see GEi 13.9-3 Title- A Structured Operating System Date- May 6, 1975 for a PDP-11/45 TM- 75-1352-4 Other Keywords - UNIX Multi-Environment Real-Time Author(s) Location and Room Extension Charging Case - 39394 Lycklama, H. MH 7C-211 6170 Filing Case- 39394-11 Bayer, D. L. MH 7C-207 3080 ABSTRACT A structured operating system, MERT, consisting of a set of autonomous processes has been designed and implemented on a PDP-11/45 computer in Department 1352. The MERT system is a multi-environment, real-time operating system consisting of a set of basic kernel procedures providing services for the inde• pendent processes which support the different operating system environments. A well-developed set of inter-process communica• tion primitives have been implemented, including event flags, message buffers, shared memory and shared files. We believe this provides a good base for providing support for various operating system environments and for providing real-time response for processes. The UNIX time-sharing system has been implemented as one environment on the MERT system. This paper (*) provides an overview of the MERT system. * - Submitted to COMPCON Conference, September 7-9, 1975 Pages Text 11 Other 5 Total 16 _ DATE FILE COPY Bell Telephone Laboratories No. Figures 2 No. Tables O No. Refs. 4 _ Incorporated E-1932-0-4 (6-73) SEE REVERSE SIDE FOR DISTRIBUTION LIST LL TELl:.PHONE LA.bORATO.cUES, fo<:.
    [Show full text]
  • UNO-4683 User Manual
    UNO-4683 Intel Core i7 Dual Core Automa- tion Computer with 6xLAN, 2xCOM, 3 expansion slots User Manual Copyright This document is copyrighted, © 2011. All rights are reserved. The origi- nal manufacturer reserves the right to make improvements to the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmit- ted in any form or by any means without the prior written permission of the original manufacturer. Information provided in this manual is intended to be accurate and reliable. However, the original manufacturer assumes no responsibility for its use, nor for any infringements upon the rights of third parties that may result from such use. Acknowledgements Intel, Pentium and Celeron are registered trademarks of Intel Corp. Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp. All other product names or trademarks are properties of their respective owners. Support For more information on this and other Advantech products, please visit our websites at: http://www.advantech.com For technical support and service, please visit our support website at: http://www.advantech.com/support/ This manual is for UNO-4683. Part No. 2003468300 1st Edition Printed in Taiwan December 2011 UNO-4683 User Manual ii Product Warranty (2 years) Advantech warrants to you, the original purchaser, that each of its prod- ucts will be free from defects in materials and workmanship for two years from the date of purchase. This warranty does not apply to any products that have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper instal- lation.
    [Show full text]
  • Trabajo De Diploma
    Universidad Central “Martha Abreu” de Las Villas Facultad “Matemática-Física-Computación” Licenciatura en Ciencias de la Computación Trabajo de Diploma Título: Sistema Operativo Minix versión UCLV. Autor: Dayli Suset Rojas Jiménez. Tutor: Dr. Mateo G. Lezcano Brito. Laboratorio: Informática Educativa. Santa Clara, junio 2011 “Año 53 de la Revolución” Dictamen. El que suscribe, ___ , hago constar que el trabajo titulado ___ ___ fue realizado en la Universidad Central “Marta Abreu” de Las Villas como parte de la culminación de los estudios de la especialidad de , autorizando a que el mismo sea utilizado por la institución, para los fines que estime conveniente, tanto de forma parcial como total y que además no podrá ser presentado en eventos ni publicado sin la autorización de la Universidad. Firma del autor Los abajo firmantes, certificamos que el presente trabajo ha sido realizado según acuerdos de la dirección de nuestro centro y el mismo cumple con los requisitos que debe tener un trabajo de esta envergadura referido a la temática señalada. ___ Firma del tutor Firma del jefe del Laboratorio Fecha Pensamiento "Sin su software, la computadora es un montón de metal inútil". Andrew S. Tanenbaum Dedicatoria A mi mamá por estar siempre apoyándome Por ser la mejor mamá del mundo. A Darly por ser la personita más especial de mi vida. A Ony por ser la luz que ilumina mi camino. Por ser un papá maravilloso para mí. Agradecimientos A mi mamá y a Ony, quienes me indujeron la ética y el rigor que me guían para transitar por la vida. Gracias por estar en todo momento a mi lado apoyándome y exigiendo de mí un mayor esfuerzo.
    [Show full text]
  • Global Conference on Animal Welfare: an OIE Initiative
    Global conference on animal welfare: an OIE initiative Paris, 23–25 February 2004 PROCEEDINGS The views expressed in this document are solely the responsibility of the authors and may not, under any circumstances, be regarded as stating an official position either of the Commission of the European Communities or of the Office international des épizooties. Corrigendum Readers should note that in this CD-ROM version of the conference proceedings, as compared to the already published hard-copy (ISBN 92-894-6614-6), an additional paper by Dr. F.A. Abiola entitled "Transport and slaughter of animals: current constraints in Sub-Saharan Africa" is presented, as well as a modified version of Dr. A.B.M. Raj's paper "Cultural, religious and ethical issues". Consequently, there is no correlation between the pagination of the two published versions. Full information about the World Organisation for Animal Health (OIE) and its activities can be reached at www.oie.int or by addressing requests to [email protected]. General information is also available by calling directly at (33-1) 44 15 18 88 Europe Direct is a service to help you find answers to your questions about the European Union Freephone number: 00 800 6 7 8 9 10 11 A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://europa.eu.int). Cataloguing data can be found at the end of this publication. Luxembourg: Office for Official Publications of the European Communities, 2004 © European Communities, 2004 © Office international des épizooties, 2004 Reproduction is authorised provided the source is acknowledged.
    [Show full text]
  • Doctoral Thesis-Mohamed Tawfik
    Tesis Doctoral 2013 Laboratory as a Service (LaaS): a Paradigm for Developing and Implementing Modular Remote Laboratories Laboratorio como Servicio (LaaS): un Paradigma para Desarrollar e Implementar Laboratorios Remotos Modulares Mohamed Saied Tawfik Abuelela MSc, Ingeniería Electrónica Universidad Nacional de Educación a Distancia, Madrid, España (2011) BSc, Ingeniería Eléctrica Universidad de Ain Shams, El Cairo, Egipto (2008) Departamento de Ingeniería Eléctrica, Electrónica, y de Control (DIEEC) Escuela Técnica Superior de Ingenieros Industriales (ETSII) Universidad Nacional de Educación a Distancia (UNED) Director: Manuel Alonso Castro Gil Catedrático de Universidad Presidente de la Sociedad de Educación del IEEE Co-director: Elio Sancristobal Ruiz Ayudante Doctor Tesis Doctoral 2013 Laboratory as a Service (LaaS): a Paradigm for Developing and Implementing Modular Remote Laboratories Laboratorio como Servicio (LaaS): un Paradigma para Desarrollar e Implementar Laboratorios Remotos Modulares Mohamed Saied Tawfik Abuelela MSc, Ingeniería Electrónica Universidad Nacional de Educación a Distancia, Madrid, España (2011) BSc, Ingeniería Eléctrica Universidad de Ain Shams, El Cairo, Egipto (2008) Departamento de Ingeniería Eléctrica, Electrónica, y de Control (DIEEC) Escuela Técnica Superior de Ingenieros Industriales (ETSII) Universidad Nacional de Educación a Distancia (UNED) Director: Manuel Alonso Castro Gil Catedrático de Universidad Presidente de la Sociedad de Educación del IEEE Co-director: Elio Sancristobal Ruiz Ayudante Doctor
    [Show full text]
  • A JUNGIAN PERSPECTIVE by LAURA NANNETTE MOSLEY
    THE ROLE AND MEANING OF THE MELUSINE MYTH IN MODERN NARRATIVE: A JUNGIAN PERSPECTIVE by LAURA NANNETTE MOSLEY (Under the Direction of Jonathan F. Krell) ABSTRACT The myth of Mélusine first appeared in literary form in France in 1393. Its author, Jean d’Arras, drew from long-standing oral tradition in the writing of his romance, which was, by the standards of the Middle Ages, a best-seller. Mélusine’s ongoing popularity into the 20th and 21st centuries, not only in France, but internationally as well, is evidenced by André Breton’s Arcane 17 (1944), Manuel Mujica Lainez’s El unicornio (1965), Esther Tusquets’s El mismo mar de todos los veranos (1978), and Marie de la Montluel’s (Chantal Chawaf’s) Mélusine des détritus (2002), the four novels I undertake to explore in this dissertation. From a Jungian perspective, the ongoing appeal of Mélusine may be explained by the rich archetypal images and mythological motifs contained within her story, but to fully understand why these authors from such vastly different socio-cultural and historical backgrounds were so inspired by her, it is necessary to consider that each of these authors wrote at a time of personal and societal crisis. Jung teaches that it is at such times that the individual awakens to the need to probe the unconscious, and that it is then that the archetype most needed by the psyche will appear. Following Jungian scholar James Hillman, who identifies the alchemical Mercurius as the archetype of healing due to his capacity to unite opposites, I identify Mélusine with this archetype.
    [Show full text]