This document provides an overview of Cisco's NX-OS operating system and Nexus platforms. It discusses the case for 10GbE connectivity to servers, how NX-OS is purpose-built for the data center, and how it provides increased efficiency and simpler operations through a unified fabric. It then reviews the Nexus 7000, 5000, 2000 and hardware and software versions. Key NX-OS features like Layer 2/3, routing protocols, VRFs, FabricPath, VDCs, FCoE, vPCs and OTV are summarized.
The document discusses the Cisco Nexus 7000 series modular datacenter switches. It provides details on:
1) The Nexus product line including the Nexus 1000v, 2000, 3000, 4000, 5000, and 7000 series switches.
2) Key features of the Nexus 7000 including scalable switching capacity beyond 15 terabits per second, unified fabric, and high availability.
3) The principles behind the Nexus 7000's design which focus on infrastructure scalability, operational continuity, and transport flexibility.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
Cisco ACI (Application Centric Infrastructure) is a software-defined networking solution that provides centralized management of network policies and abstraction of physical network details. It uses a leaf-spine topology with the APIC (Application Policy Infrastructure Controller) as the central controller. ACI implements software-defined networking concepts like logical abstraction of networks, centralized management, and vendor-neutral standards like OpFlex. It enables network segmentation, security, and automation through concepts like endpoint groups, contracts, and programmable APIs.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
The Cisco Catalyst 9200 Series switches are Cisco’s latest addition to the fixed enterprise switching access platform, and are built for security, resiliency, and programmability.
Designing Multi-tenant Data Centers Using EVPNAnas
This document describes the design of a multi-tenant data center network fabric using EVPN-IRB. It discusses the objectives of operational simplicity, workload placement flexibility, efficient bandwidth utilization, and multi-tenancy. It then describes the key components of the solution including BGP EVPN for control plane, overlay IRB for inter-subnet routing, distributed anycast gateways for workload mobility, and how the control and data planes interact for host learning and traffic forwarding.
The document discusses the Cisco Nexus 7000 series modular datacenter switches. It provides details on:
1) The Nexus product line including the Nexus 1000v, 2000, 3000, 4000, 5000, and 7000 series switches.
2) Key features of the Nexus 7000 including scalable switching capacity beyond 15 terabits per second, unified fabric, and high availability.
3) The principles behind the Nexus 7000's design which focus on infrastructure scalability, operational continuity, and transport flexibility.
Cisco® Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cloud, mobility, and big data applications are causing a shift in the data center model. Cisco ACI redefines the power of IT, enabling IT to be more responsive to changing business and application needs, enhancing agility, and adding business value. Cisco ACI delivers a transformational operating model for next-generation data center and cloud applications. This Cisco ACI hands lab will step you through from the ACI Fabric concepts to deployment. • Cisco ACI Overview • ACI Fabric Discovery • ACI Building Basic Network Constructs • ACI Building Policy Filters and Contracts • : Deploying a 3-Tier Application Network Profile • ACI Integrating with VMware • Deploying a Service Graph with Application Network Profile • Exploring Monitoring and Troubleshooting
Cisco ACI (Application Centric Infrastructure) is a software-defined networking solution that provides centralized management of network policies and abstraction of physical network details. It uses a leaf-spine topology with the APIC (Application Policy Infrastructure Controller) as the central controller. ACI implements software-defined networking concepts like logical abstraction of networks, centralized management, and vendor-neutral standards like OpFlex. It enables network segmentation, security, and automation through concepts like endpoint groups, contracts, and programmable APIs.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
The Cisco Catalyst 9200 Series switches are Cisco’s latest addition to the fixed enterprise switching access platform, and are built for security, resiliency, and programmability.
Designing Multi-tenant Data Centers Using EVPNAnas
This document describes the design of a multi-tenant data center network fabric using EVPN-IRB. It discusses the objectives of operational simplicity, workload placement flexibility, efficient bandwidth utilization, and multi-tenancy. It then describes the key components of the solution including BGP EVPN for control plane, overlay IRB for inter-subnet routing, distributed anycast gateways for workload mobility, and how the control and data planes interact for host learning and traffic forwarding.
The document provides an overview of Cisco's physical infrastructure technology for data centers. It discusses the three layers of data center infrastructure including the network, access, and aggregation/services layers. It then covers topics like Moore's law, serializer-deserializer technology, multi-lane distribution, switching architecture changes, switch-on-chip architectures, and modular switch platforms. The document aims to explain how Cisco has adapted its data center switching technology to address the challenges of exponentially increasing bandwidth over time.
BIG-IP F5 LTM provides various load balancing methods including static methods like round robin and ratio, and dynamic methods like least connections, fastest, observed, and predictive. Round robin distributes requests evenly across available servers. Ratio distributes requests according to a pre-defined ratio. Dynamic methods consider server performance and characteristics like connections or outstanding requests to determine where to send the next request.
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
The document provides an overview of an introductory session on IOS XR for enterprises and service providers. It outlines the agenda which includes discussing IOS XR architecture, modularity, scalability, stability, security, software packages, the command line interface, configuration management, monitoring tools, example configurations, and the route policy language. It also provides some logistical information about the session.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
This document provides an overview of Ericsson's 5G NR-RAN Release for the fourth quarter of 2018. It describes the NR non-standalone architecture, including dual connectivity functionality and interfaces. It also covers topics like numerology, frame structure, deployment scenarios for mid-band and high-band spectrum, and transport functionality between the gNodeB and eNodeB.
This document provides an overview of BGP (Border Gateway Protocol) basics and configuration for internet service providers. It discusses BGP attributes, path selection, and applying routing policies. The key points covered include the purpose of BGP in exchanging routing information between autonomous systems, BGP neighbor configuration for internal and external peers, and using attributes like AS path, local preference, communities to influence best path selection.
This document provides an overview and configuration guide for VxLAN routing and control plane capabilities on Nexus 9000 series switches. It begins with an introduction to VxLAN and MP-BGP EVPN technologies. It then covers MP-BGP EVPN control plane functions and design options for VXLAN deployment. The document concludes with instructions for configuring MP-BGP EVPN VXLAN on Nexus 9000 switches and an overview of their VxLAN capabilities.
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
This document chapter discusses routing concepts and initial router configuration. It covers configuring router interfaces, enabling IP connectivity on devices, and verifying connectivity between directly connected networks. The key topics include functions of routers in routing traffic between networks, building routing tables using static and dynamic methods, and show commands to view interface settings and connectivity.
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
The document provides housekeeping notes for a Cisco Connect Toronto 2015 session. It reminds attendees to silence electronic devices, provides information on how to provide feedback and enter a prize drawing, and advertises the Cisco dCloud platform and Cisco Spark collaboration app. It also includes an agenda for the session on access network evolution, next generation EPN architecture, network services evolution, and SDN evolution.
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
VRF-Lite allows a single physical router to virtualize multiple routers by creating independent virtual routing tables (VRFs). Each VRF logically isolates the routing tables and network traffic of customers or applications. The physical router uses VLAN trunking to keep traffic from different VRFs separate when sending data to other devices. Configuring VRF-Lite involves defining VRFs, assigning interfaces to VRFs, and configuring routing protocols for each VRF.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. It determines whether users are accessing the network on authorized devices, establishes user identity and context, and assigns services based on user attributes. ISE provides comprehensive secure access, increases productivity, and reduces operations costs through centralized policy control, visibility, automated provisioning, and guest access management.
Introduction to nexux from zero to HeroDhruv Sharma
The document provides information about Cisco Nexus switches, including the Nexus 7000 and 7700 series switches. It describes the key components of Nexus switches like chassis, I/O modules, supervisor engines, and fabric modules. It also compares different Nexus 7000 and 7700 chassis models in terms of specifications like slots, bandwidth, switching capacity, and port density. Additionally, it discusses some differences between Nexus switches and Cisco Catalyst switches, such as licensing requirements, user accounts, NX-OS image structure, and use of port profiles instead of macros. Finally, it provides an overview of features supported on Nexus switches like virtual device contexts (VDCs).
This document provides an overview of basic network and routing concepts for the CCNP ROUTE certification. It discusses differentiating between dynamic routing protocols, network types including non-broadcast multi-access networks, connecting remote locations using various technologies, and understanding how different traffic types and overlay networks influence routing. The objectives cover routing protocols, branch connectivity options, and IPv6 neighbor discovery.
This document discusses using BGP Flowspec for DDoS mitigation. It provides an overview of legacy DDoS mitigation methods, describes how BGP Flowspec works by distributing flow specifications using BGP, and gives examples of how it can be used for inter-domain and intra-domain DDoS mitigation as well as with a scrubbing center. It also discusses vendor support, advantages over previous methods, potential issues, real world deployments, and the current state and future of BGP Flowspec.
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
Ronnie Scott
Consulting CSE
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Cisco nexus 7000, nexus 5000 and 2000 fa qsIT Tech
The document discusses Cisco Nexus networking switches, including differences between line cards, fabric modules, and virtual device contexts (VDCs) on Nexus 7000, 5000, and 2000 series switches. It answers several questions about the hardware and software capabilities of these switches. Key points include that M series line cards support layer 3 functions while F series support layer 2, fabric modules provide redundancy but no ports, and Nexus 2000 switches have no operating system and download one from a connected Nexus 5000 or 7000.
The document provides an overview of Cisco's physical infrastructure technology for data centers. It discusses the three layers of data center infrastructure including the network, access, and aggregation/services layers. It then covers topics like Moore's law, serializer-deserializer technology, multi-lane distribution, switching architecture changes, switch-on-chip architectures, and modular switch platforms. The document aims to explain how Cisco has adapted its data center switching technology to address the challenges of exponentially increasing bandwidth over time.
BIG-IP F5 LTM provides various load balancing methods including static methods like round robin and ratio, and dynamic methods like least connections, fastest, observed, and predictive. Round robin distributes requests evenly across available servers. Ratio distributes requests according to a pre-defined ratio. Dynamic methods consider server performance and characteristics like connections or outstanding requests to determine where to send the next request.
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
The document provides an overview of an introductory session on IOS XR for enterprises and service providers. It outlines the agenda which includes discussing IOS XR architecture, modularity, scalability, stability, security, software packages, the command line interface, configuration management, monitoring tools, example configurations, and the route policy language. It also provides some logistical information about the session.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
This document provides an overview of Ericsson's 5G NR-RAN Release for the fourth quarter of 2018. It describes the NR non-standalone architecture, including dual connectivity functionality and interfaces. It also covers topics like numerology, frame structure, deployment scenarios for mid-band and high-band spectrum, and transport functionality between the gNodeB and eNodeB.
This document provides an overview of BGP (Border Gateway Protocol) basics and configuration for internet service providers. It discusses BGP attributes, path selection, and applying routing policies. The key points covered include the purpose of BGP in exchanging routing information between autonomous systems, BGP neighbor configuration for internal and external peers, and using attributes like AS path, local preference, communities to influence best path selection.
This document provides an overview and configuration guide for VxLAN routing and control plane capabilities on Nexus 9000 series switches. It begins with an introduction to VxLAN and MP-BGP EVPN technologies. It then covers MP-BGP EVPN control plane functions and design options for VXLAN deployment. The document concludes with instructions for configuring MP-BGP EVPN VXLAN on Nexus 9000 switches and an overview of their VxLAN capabilities.
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
This document chapter discusses routing concepts and initial router configuration. It covers configuring router interfaces, enabling IP connectivity on devices, and verifying connectivity between directly connected networks. The key topics include functions of routers in routing traffic between networks, building routing tables using static and dynamic methods, and show commands to view interface settings and connectivity.
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
The document provides housekeeping notes for a Cisco Connect Toronto 2015 session. It reminds attendees to silence electronic devices, provides information on how to provide feedback and enter a prize drawing, and advertises the Cisco dCloud platform and Cisco Spark collaboration app. It also includes an agenda for the session on access network evolution, next generation EPN architecture, network services evolution, and SDN evolution.
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
VRF-Lite allows a single physical router to virtualize multiple routers by creating independent virtual routing tables (VRFs). Each VRF logically isolates the routing tables and network traffic of customers or applications. The physical router uses VLAN trunking to keep traffic from different VRFs separate when sending data to other devices. Configuring VRF-Lite involves defining VRFs, assigning interfaces to VRFs, and configuring routing protocols for each VRF.
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline service operations. It determines whether users are accessing the network on authorized devices, establishes user identity and context, and assigns services based on user attributes. ISE provides comprehensive secure access, increases productivity, and reduces operations costs through centralized policy control, visibility, automated provisioning, and guest access management.
Introduction to nexux from zero to HeroDhruv Sharma
The document provides information about Cisco Nexus switches, including the Nexus 7000 and 7700 series switches. It describes the key components of Nexus switches like chassis, I/O modules, supervisor engines, and fabric modules. It also compares different Nexus 7000 and 7700 chassis models in terms of specifications like slots, bandwidth, switching capacity, and port density. Additionally, it discusses some differences between Nexus switches and Cisco Catalyst switches, such as licensing requirements, user accounts, NX-OS image structure, and use of port profiles instead of macros. Finally, it provides an overview of features supported on Nexus switches like virtual device contexts (VDCs).
This document provides an overview of basic network and routing concepts for the CCNP ROUTE certification. It discusses differentiating between dynamic routing protocols, network types including non-broadcast multi-access networks, connecting remote locations using various technologies, and understanding how different traffic types and overlay networks influence routing. The objectives cover routing protocols, branch connectivity options, and IPv6 neighbor discovery.
This document discusses using BGP Flowspec for DDoS mitigation. It provides an overview of legacy DDoS mitigation methods, describes how BGP Flowspec works by distributing flow specifications using BGP, and gives examples of how it can be used for inter-domain and intra-domain DDoS mitigation as well as with a scrubbing center. It also discusses vendor support, advantages over previous methods, potential issues, real world deployments, and the current state and future of BGP Flowspec.
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
Ronnie Scott
Consulting CSE
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Cisco nexus 7000, nexus 5000 and 2000 fa qsIT Tech
The document discusses Cisco Nexus networking switches, including differences between line cards, fabric modules, and virtual device contexts (VDCs) on Nexus 7000, 5000, and 2000 series switches. It answers several questions about the hardware and software capabilities of these switches. Key points include that M series line cards support layer 3 functions while F series support layer 2, fabric modules provide redundancy but no ports, and Nexus 2000 switches have no operating system and download one from a connected Nexus 5000 or 7000.
This document discusses file sharing across multiple computer systems. It covers:
1) File systems store information on file owners and access permissions for groups of users.
2) The advent of the Internet introduced issues for accessing remotely stored files, initially using FTP.
3) Distributed file systems allow remote file systems to be mounted locally using normal file access commands.
High Performance Network Infrastructure for Future Internet - Julio OliveiraCPqD
CPqD is a Brazilian research organization focused on innovation in information and communication technologies. It has over 1,200 employees working on optical communications and other areas. Specifically, CPqD's optical communications team develops high-speed transmission equipment, amplifiers, ROADMs, coherent modules, ASICs, and cognitive optical networks. CPqD works with industry partners to transfer these technologies and has had success in growing Brazil's share of the WDM market. Its current focus areas include developing 100Gbps, 200Gbps, and 400Gbps coherent transmission capabilities and cognitive optical networks to enable high performance terabit networks.
File sharing allows users to access and share files over a network. It can be public or private and allows various levels of access like reading, writing, or modifying files. There are advantages like centralizing files for easy administration and updates, but also disadvantages like security problems, data redundancy, and lack of standardized structure. Different file sharing technologies include peer-to-peer networks with no central server, as well as instant messaging programs that allow file transfers between users. Common examples are AIM, ICQ, Windows Live Messenger, and Yahoo Messenger.
Cables ethernet fibre channel electric powerpoint ppt templates.SlideTeam.net
The document promotes downloadable PowerPoint slide templates from slideteam.net that can bring presentations to life and capture audiences' attention. All images are fully editable in PowerPoint. The slides contain placeholder text that can be customized with your own text.
Next Generation Fiber Structured Cabling and Migration to 40/100gPanduit
The new high speed Ethernet standards, 40GBASE-SR4 and 100GBASE-SR10, will require a change in the fiber cable plant. Here we examine the media and connectivity solutions needed to ease the migration for 10 Gigabit Ethernet to 40 and 100 Gigabit Ethernet.
Introducing the ping command and its parameters with example –in Persian
how to read syntax of cmd commands and use ping command in windows OS.
ping video on youtube:
https://youtu.be/DIE2Qa0pF5A
https://youtu.be/cuvTAHnuStU
UTP cable is made of twisted copper wire pairs within a plastic sheath. It comes in categories like Cat3, Cat5, and Cat5e. STP cable includes a protective foil wrapping. RJ-45 connectors are used to terminate UTP cable. The installation process involves stripping cable, arranging wire pairs, crimping the RJ-45 connector, and testing the cable. Solid core cable is for fixed runs while stranded core is more flexible for patch cables. Proper tooling and technique are required to make reliable network cables.
Network cabling is the medium used to transmit information between network devices. There are several types of cable used in local area networks (LANs) including unshielded twisted pair (UTP), fiber optic, and wireless. UTP is the most common and comes in categories that support different transmission speeds. Fiber optic cable can transmit signals over much longer distances than copper cables. Wireless networks use radio signals, infrared, or lasers to transmit information without cables but have disadvantages related to security and interference. Proper installation of network cables follows guidelines such as leaving slack, testing connections, and labeling cables.
Construction of cables
Parts of a cable
Properties of cable insulators
Properties of conductors
Types of cables
Underground cables
Methods of laying underground cables
Types of cable faults
Comparison between overhead and underground cables
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Cisco Canada
This document discusses best practices for designing, operating, and managing Fibre Channel over Ethernet (FCoE) networks. It covers topics such as the benefits of a unified fabric using FCoE, FCoE protocol fundamentals including the FCoE and FIP protocols, Nexus switch FCoE capabilities, design considerations for single-hop and multi-hop FCoE networks, and requirements for lossless Ethernet using data center bridging. The presentation provides an overview of key concepts for implementing FCoE in a converged network infrastructure.
Next Generation Nexus 9000 ArchitectureCisco Canada
In the upcoming year, 2016, the industry will see a significant capacity, capability and cost point shift in Data Center switching. The introduction of 25/100G supplementing the previous standard of 10/40G at the same cost points and power efficiency which represents a 250% increase in capacity for roughly the same capital costs is just one example of the scope of the change. These changes are occurring due to the introduction of new generations of ASICs leveraging improvements in semiconductor fabrication combined with innovative developments in network algorithms, SerDes capabilities and ASIC design approaches. This session will take a deep dive look at the technology changes enabling this shift and the architecture of the next generation nexus 9000 Data Center switches enabled due to these changes. Topics will include a discussion of the introduction of 25/50/100G to compliment existing 10/40G, why next generation fabrication techniques enable much larger forwarding scale, more intelligent buffering and queuing algorithms and embedded telemetry enabling big data analytics based on network traffic
The document discusses cable crimping and testing for RJ45 cables. It explains the difference between straight and crossover cables and the different wiring schematics used for each. It provides steps for crimping an RJ45 connector onto a cable, including stripping the cable, inserting the wires into the connector, crimping it, and testing the connection.
Twisted pair cable is the simplest and oldest cable medium consisting of two insulated copper wires twisted around each other to reduce electrical interference. It is commonly used in telephone systems and comes in two main types - unshielded twisted pair (UTP) and shielded twisted pair (STP). UTP is the most common type used in networks today and comes in categories depending on the data transfer rate it supports, with category 5 cable providing up to 100 Mbps. STP cable has each pair of conductors encased in metal shielding to further prevent interference.
Material for Azure Machine Learning tutorial lecture, held within Data Mining course of MoS in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
Lecturers:
Fabio Rosato - rosato.1565173@studenti.uniroma1.it
Giacomo Lanciano - lanciano.1487019@studenti.uniroma1.it
Francisco Ferreres Garcia - matakukos@gmail.com
Leonardo Martini - martini.1722989@studenti.uniroma1.it
Simone Caldaro - caldaro.1324152@studenti.uniroma1.it
Na Zhu - nana.zhu@hotmail.com
Github repo: https://github.com/giacomolanciano/Azure-Machine-Learning-tutorial
Video tutorial: https://youtu.be/_zvPX6Kk7z8
This document discusses and compares different types of transmission media, including guided and unguided media. Guided media includes twisted pair cables, coaxial cables, and optical fiber cables. Unguided media includes radio waves, microwaves, and infrared waves. Each type of media has different characteristics, performance capabilities, and applications. Optical fiber provides the highest bandwidth and data transmission rates, while being immune to interference, but is also the most expensive.
vPC techonology for full ha from dc core to baremetel server.Ajeet Singh
This document discusses a data center network design using Cisco Nexus switches in a leaf-spine topology with virtual port channels (vPCs) between the core, aggregation, and access layers for high availability. It includes configuration details for Cisco Nexus 5000 and 9500 series switches in the core and access layers with Cisco Nexus 2000 Fabric Extenders providing top-of-rack connectivity to bare-metal servers. vPCs are configured between the core switches, down to the access switches, and to the server ports for redundancy and load distribution.
This document discusses network virtualization and its history. It provides the following key points:
1) Network virtualization aims to decouple virtual networks from physical infrastructure through techniques like tunneling and encapsulation, allowing independent address spaces and topologies.
2) Early work included overlay networks for deployment and experimentation. Virtualization is now used in data centers to isolate tenant traffic and connect virtual machines across sites.
3) The OpenVirteX project aims to advance network virtualization by exposing the entire physical topology to virtual network controllers and allowing independent address spaces and topologies through header rewriting. This would provide more flexibility than existing solutions.
Juniper Networks' vMX product provides a virtualized routing platform that can run the same Junos operating system as physical MX routers. The vMX uses virtualized DPDK-accelerated packet processing called vTRIO to separate the control and data planes for high performance. It supports various hypervisor and container deployments and can scale throughput from 100Mbps up to multiple 10Gbps ports depending on vCPU and core allocation. The vMX is suited for applications such as virtual PE routers, DC gateways, cloud WAN routers, and route reflectors where service providers need a virtualized solution that leverages their existing Junos feature set.
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
This document discusses Virtual Private LAN Service (VPLS) and provides an overview of VPLS technical concepts. VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network by emulating an Ethernet bridge. Key components of VPLS include provider edge devices, pseudowires to connect customer sites, and virtual switch instances to segment customer traffic. VPLS supports both direct attachment and hierarchical architectures. Loop prevention is achieved through a full mesh of pseudowires between provider edges and split horizon forwarding in the MPLS core.
W trakcie sesji przedstawione zostaną różne sposoby budowania rozproszonych punktów wymiany ruchu internetowego. Zaprezentowane zostanie również jak w praktyce wykorzystano protokół TRILL w Slovak Internet Exchange.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
The document discusses NSX design and deployment considerations including:
1. Physical and logical infrastructure requirements for NSX including IP connectivity and MTU size.
2. Edge cluster design with options for collapsed or separated edge and infrastructure racks.
3. NSX manager and controller placement and sizing within management clusters.
4. Transport zone, VTEP, and VXLAN switching concepts which are fundamental to the NSX overlay architecture.
The document provides product information for various networking equipment made by NST Network Solutions, including:
- Ethernet switches ranging from managed layer 2 switches to managed layer 3 switches with Gigabit Ethernet and fiber uplink ports.
- PoE switches, industrial switches, wireless access points, media converters, voice equipment, and a network management software.
- For each product type, it lists specific models and provides brief descriptions of their key features, interfaces, functions, specifications, and management capabilities.
The document serves as a product catalog or guide for NST Network Solutions' networking equipment portfolio. It concisely summarizes the equipment types and key details about multiple models in 3 sentences or less per category
CCNA Training in Bangalore | Best Networking course in BangaloreTIB Academy
At TIB Academy, you will get the best CCNA training in Bangalore. To clear Cisco CCNA Certification, you need to be very good in basic networking concepts like network topology and network layers. So, enroll in our Networking Course immediately to get the best CCNA training and certification assistance
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPROIDEA
The document provides an overview presentation on Shortest Path Bridging (802.1aq) given by Peter Ashwood-Smith at PLNOG in Warsaw on March 5th 2012. The presentation covers the challenges 802.1aq addresses, what 802.1aq is, its applications such as data center networks and wireless backhaul, how it works using IS-IS for routing computations, its current status with deployments and trials, and concludes with a demonstration of an 802.1aq network in the presenter's lab.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
This document provides an overview and update on VMware's NSX network virtualization platform and previews future directions. It discusses expanding NSX capabilities like physical network integration, new encapsulation formats, and multi-site network virtualization. The presentation also explores advanced topics such as distributed logical routing, handling elephant flows, and enabling service chaining through network virtualization. Overall, the document outlines how NSX provides network virtualization and previews exciting new capabilities and use cases for virtualized networking.
The document provides an overview of traditional campus network designs and introduces some concepts for campus network design. It discusses traditional router and hub campus designs and moves to newer designs using virtual LAN (VLAN) technologies and multilayer switching. The key concepts covered include the access, distribution and core layers, switch blocks, core blocks, and considerations around sizing and redundancy in campus network designs.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
mSwitch: A Highly-Scalable, Modular Software Switchmicchie
This document summarizes the mSwitch software which provides a highly scalable and modular approach to software switching. The key points are:
- mSwitch separates the switching fabric from the switching logic to allow for modular and flexible forwarding decisions while still achieving high performance.
- It uses a scalable packet switching algorithm and separate packet buffers per port to efficiently handle packet I/O across many ports.
- Switching logic is implemented as kernel modules, allowing flexibility to change the forwarding behavior while the switch is running.
- Evaluation shows mSwitch scales throughput linearly with CPU cores and ports, outperforming other software switches in port scalability and CPU efficiency. It can forward over 1 million minimum sized packets per
Not all networks are created equal. Brocade Ethernet Fabrics, as joined in the IBM Flex EN4023 embedded switch, revolutionizes by automating and optimizing your network, enabling you to reduce total cost of ownership, not just capital expenses. Lab tests have validated the Opex and Capex advantages of VCS Ethernet Fabrics over traditional networking. Learn how customers have reduced network infrastructure requirements by 25% and increases the networks performance by up to 30%. See how Dynamic Ports on Demand can save hardware costs. Learn the dramatic Operational impact VCS Fabric switches have on decreasing time to deploy the network by 79% and decreasing the time to implement network changes by 85%.
DPDK Summit 2015 - RIFT.io - Tim MortsolfJim St. Leger
DPDK Summit 2015 in San Francisco.
Presentation by RIFT.io's CTO Tim Mortsolf.
For additional details and the video recording please visit www.dpdksummit.com.
Routers are networking devices that interconnect networks by forwarding data packets between them using the best available path. The basic components of a Cisco router include a CPU, RAM, ROM, NVRAM, flash memory, and physical interfaces. The Cisco IOS operating system runs on routers and provides routing functions and network services via the command line interface. Different Cisco router models have varying numbers and types of slots to add communication modules.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
1. Cisco NX-OS
An Innovative Platform To Simplify Data Center Transformation
By Utpal Sinha, B.E(CSE), CCNA, ITIL-V3
2. Agenda
Case and demand of NX-OS.
Brief Hardware Overview.
Software Versions.
NX-OS Layer 2.
NX-OS Layer 3.
FabricPath.
Virtual Device Contexts (VDC’s).
Fiber Channel Over Ethernet (FCoE).
Virtual Port Channels (vPC’s)
Overlay Transport Virtualization (OTV).
3. The Case for 10GbE to the Server
Multi-Core CPU architectures allowing bigger and
multiple workloads on the same machine.
Server virtualization driving the need for more I/O
bandwidth per server.
Growing need for network storage driving the demand
for higher network bandwidth to the server.
10GE LAN on server Motherboards (LoM).
8. Nexus 7000 Overview
Nexus 7000/7700
– Typically DC core or aggregation
– High performance, density, & availability
– Unified I/O
FCoE switch but not a FC switch
– Redundant Power, Line Cards and Supervisors
9. Cisco Nexus 7000 Series
Zero Service Disruption design
Graceful systems operations
Integrated lights-out management
Lossless fabric architecture
Dense 40GbE/100GbE ready
Unified fabric
Virtualized control and data plane
15Tb+ switching capacity
Efficient physical and power design
Infrastructure
Scalability
Transport
Flexibility
Operational
Continuity
10. Nexus 7000 Platform Overview
• Currently 7 form factors
– 7018, 7010, 7009, 7004, 7718, 7710,7706
• Currently 2 types of line cards
– M Series Cards - Layer 3 cards
• Feature rich cards
– F Series Cards - Layer 2 cards*
• Performance oriented cards
11. Line Card Features
• M Series
Specific
– Layer 3 Routing
– FEX
– OTV
– TrustSec
• F Series
Specific
– FabricPath
– vPC+
– FCoE
12. 15Tb+ System Performance
Bandwidth Scales with Each Fabric Module
10GbE Module
GbE Module
Fabric
Modules
46Gbps92Gbps138Gbps184Gbps230Gbps
Per Slot
13. SFP+ Transmission Media
Cable
Transceiver
Latency (link)
Power
(each side)DistanceTechnology
Twinax ~0.25 ms~0.1W10m
SFP+ CU
Copper
MM OM2
MM OM3
~0.1 ms1W
82m
300m
SFP+ SR
short reach
MM OM2
MM OM3
~0.1 ms1W
10m
100m
SFP+ USR
ultra short reach
Cat6
Cat6a/7
Cat6a/7
2.5ms
2.5ms
1.5ms
~8W
~8W
~4W
55m
100m
30m
10GBASE-T
•Low power consumption
•Low cable cost
•Low transceivers latency
•Low error rate
14. Nexus 5000 Overview
Nexus 5000/5500
– Typically End of Row (EoR) aggregation or Top of Rack (ToR) access
– Typically Layer 2 but can do limited Layer 3 with add on daughter card in the
5500 Series Unified I/O
– Both FCoE and native FC switching
– Redundant power but not supervisors
15. Nexus 5000 Platform Overview
• Currently 2 Generations
– 1st Gen - Nexus 5000 – 5010 & 5020
– 2nd Gen - Nexus 5500 – 5548 & 5596
• Mainly layer 2 switching
– 5500 can support L3 add-in card
• Supports Unified I/O
– Both FCoE Forwarder (FCF) and native FC switching
• 5500 supports Unified Ports (UP models)
– Ports can run as Ethernet or native Fibre Channel
– Ethernet ports allocated at port 1 and counts up
– Fibre Channel ports allocated at last port and counts down
– Requires a reboot to re-allocate port’s role (like UCS FI)
16. OS
Cisco Nexus 5000 Series
56-Port L2 Switch
• 40 Ports 10GE/FCoE/DCE, fixed
• 2 Expansion module slots
Cisco Fabric Manager and Cisco Data Center Manager
Cisco DC-OS
FC + Ethernet
• 4 Ports 10GE/FCoE/DCE
• 4 Ports 1/2/4G FC
Fibre Channel
• 8 Ports 1/2/4G FC
Mgmt
Cisco DC-OS
Ethernet
• 6 Ports 10GE/FCoE/DCE
DC-NM and Fabric Manager
NX-OS
17. Nexus 2000
Fabric Extender (FEX)
• Acts as a remote line card of 7K or 5K chassis
• All management performed on Parent Switch
– No console or VTY ports on FEX
– NX-OS automatically downloaded from Parent
• No local switching
– Essentially a VN-Tag/802.1BR switch, not an Ethernet switch
– Traffic between local ports on FEX must flow “north” via uplink to Parent and
then “south” back down
– Can impact design decision of platform placement
18. Software Versions
• NX-OS v6.0(2) on Nexus 7000 Switches (6.2(6) latest)
• NX-OS v5.1(3) on Nexus 5000 Switches
• NX-OS v4.2(1) on Nexus 1000v
• NX-OS v5.2(2) on MDS 9222i Switches
• UCS Software release 2.0(1x) for UCS-6248
Fabric Interconnect
19. Nexus NX-OS Basics
Nexus at its core is a Layer 2/3 Switch
Similar in many aspects to Catalyst IOS
– VLANs, Trunking, VTP, Rapid PVST, MST,
EtherChannel, PVLANs, UDLD, FHRPs, IGPs,
BGP, etc.
Key new features beyond Catalyst IOS
– FEX, vPC, Fabric Path, OTV, FC Switching, FCoE, etc
20. NX-OS Port Channels/EtherChannels
• Unlike IOS, NX-OS does not support PAgP
– Channels must be statically on or LACP negotiated
no “switchport mode desireable”
– LACP must be enabled with feature lacp
• One of the “killer apps” of NX-OS is
Virtual Port Channels (vPC)
– Multi-Chassis EtherChannel (MEC/MCEC)
– Analogous to 3750 Cross StackWise Channel & 6500
- Virtual Switching System (VSS)
21. NX-OS Spanning Tree
• Unlike IOS, NX-OS does not support legacy CST/PVST+
– Default STP mode is Rapid-PVST+
– i.e. per-VLAN, but uses 802.1w Rapid STP
– Also supports 802.1s Multiple Spanning Tree (MST)
• NX-OS defines three STP port types
– spanning-tree port-type [normal | edge | network]
22. Bridge Assurance
• All STP Network Ports send BPDUs regardless of STP port state
– Legacy 802.1d only sends BPDUs from Root Bridge downstream
– Primary goal is to protect against unidirectional links
– BPDU becomes a bidirectional keepalive
– Replaces LoopGuard functionality
• Secondary result is same functional effect as VTP Pruning
– VLANs stop forwarding on trunk links that you do not receive BPDUs for that
VLAN in
• Enabled on interfaces with spanning-tree port type network
24. NX-OS Layer 3
Like Catalyst IOS, NX-OS supports…
– Native layer 3 routed interfaces
I.e. no switchport
Switched Virtual Interfaces (SVIs)
• I.e. VLAN interfaces
• Must be enabled with feature interface-vlan
25. NX-OS Routing Protocols
• Like IOS, NX-OS supports routing with…
– Static routing
– RIPv2 & RIPng
– EIGRP & EIGRPv6
– OSPF & OSPFv3
– IS-IS
– BGP
– Policy Routing
– No network command in IGP’s, activated on link
• Not all protocols use the same license
26. NX-OS VRF
• Like IOS, NX-OS Virtual Routing & Forwarding Instances are used to create
separate logical routing tables
– Layer 3 interfaces in different VRFs cannot exchange traffic by default
• NX-OS VRFs behave slightly different than IOS, as…
– All layer 3 interfaces are automatically in VRF table “default”
– MGMT0 is automatically in vrf “management”
– VRFs are defined as vrf context
– Static routes are defined under the vrf context
– Dynamic routing is VRF aware, but configured under the same process
– Exec mode routing-context vrf can change the default VRF for verifications
27. NX-OS Redistribution
• Unlike IOS, route-maps are required to perform redistribution on NX-OS
– Same route-map match/set logic as IOS
• Redistribution does not include directly connected interfaces
– Requires redistribute direct route-map…
28. Fabric Path
Pre Standard version of TRILL
Essentially Layer 2 Ethernet Routing
Uses ISIS to route Layer 2 Frames instead of using STP
Can build arbitrary Topologies – Full Mesh, Partial Mesh, Triangle, Square, etc
Adds a TTL in Layer 2
When using with vPC referred to as vPC+
30. Virtual Device Contexts (VDC)
VDCs used to virtualize physical hardware of Nexus 7000
– Loosely analogous to SDRs in IOS XR or Contexts in ASA
• VDCs also virtualize control plane protocols of Nexus 7000
– Not analogous to VLANs or VRFs in IOS
– Separate control plane per VDC
• VLAN 40 in VDC 1 is not VLAN 40 in VDC 2
• OSPF PID 20 in VDC 1 is not OSPF PID 20 in VDC 2
31. Why VDC’s?
Multiple logical roles per physical chassis
– E.g. Core & Aggregation/Distribution on same box
Multi-Tenancy
– E.g. VDCs as a managed service to customers
Test Lab Environment for later Production Use
Required for certain features – FCoE/Storage
32. VDC Caveats
Some features can’t co-exist in same VDC
– OTV and VLAN interfaces (SVIs)
– F2 cards and M1/F1
– FCoE requires its own “Storage” VDC
Hardware and Software version dependent, check the release notes
33. VDC Maximums
• 4 VDCs per chassis with SUP 1
• 4+1 VDCs per chassis with SUP 2
• 8+1 VDCs per chassis with SUP 2E*
• No internal cross VDC communication
– E.g. no route leaking like in VRFs
– Physical cable can be used to connect VDCs
34. The Default VDC
• Default VDC “1” always exists and cannot be removed
• Used to create and manage other VDCs
– Controls VDC port allocations
• All ports allocated to default VDC at initialization
– Controls VDC resource allocations
• Number of VLANs, VRFs, Routing table memory, etc.
• Can be used for normal data plane operations
– “Recommended” for management of chassis only
35. Default VDC Tasks
Some tasks can only be performed in the default VDC
– VDC creation/deletion/suspend
– Resource allocation – interfaces, memory, MAC’s
– NX-OS Upgrade across all VDCs
– ISSU or EPLD Upgrade
– Ethanalyzer captures – control plane traffic
– Feature-set installation for Nexus 2000, FabricPath, FCoE
– Control Plane Policing (CoPP)
– Port Channel load balancing hash
– Hardware IDS check control
– ACL Capture feature enable
– System-Wide QoS
36. Converged Ethernet or FCoE
• Lots of terms that essentially mean the
same thing
– Unified Fabric
– Unified Wire
– Converged Ethernet
– Converged Enhanced Ethernet
– Data Center Ethernet
– Data Center Bridging
• What they all really mean…
– You are running the physical framing for both Ethernet and Fibre Channel over the same physical
links
39. How FCoE Works
FCoE replaces layer 1 & 2 transport for FC
All upper layer FC services remain
– Domain IDs, FSPF, FCNS, FLOGI, Zoning.
• New FCoE Initialization Protocol (FIP) to negotiate between Fabric and Node
– Fabric is the FCF
– Node is the ENode
40. FCoE Control and Data Planes
• FIP is the control plane of FCoE
• FCoE is the actual data plane
• FIP
– New EtherType 0x8914
– Used to discover FCFs and perform FLOGI
_ UCS C when FCoE turned on uses LLDP to begin negotiation
• FCoE
– New Ethertype 0x8906
– Min length of 2240 bytes, FC has larger payload
• Implies Jumbo Frames are required
41. vPC Port Channels
– Port Channels, EtherChannels, & NIC Teaming/Bonding terms used
interchangeably
– Regardless of vendor, 802.3ad (LACP) refers to Port Channeling
• Used to aggregate bandwidth of multiple links between devices
– E.g. 4 x physical 1GigE links form a 4GigE logical Port Channel
• Appears as one logical link from STP’s perspective
– Avoids active/standby and allows active/active
42. vPC Port Channels
• Data flows are load balanced between member links
– Single flow cannot exceed BW of any physical member link
• E.g. increases lanes on the highway but not the speed limit
• Does not perform LFI like PPP Multilink
• Flows are load balanced based on L2, L3, & L4 header
information
– SRC/DST VLAN, MAC, IP, & TCP/UDP Port
• Default is SRC/DST L3 for IPv4/IPv6 and SRC/DST MAC
for non IP
– Can result in over/under subscribed links
43. Port Channels
Port Channeling was original between only 2 devices
– 1 downstream device & 1 upstream device
• E.g. end host to Catalyst 3550 via 2 x FE links
– Increases BW but still has single point of failure
• Multi Chassis EtherChannel (MCEC/MEC) is between
3 devices
– 1 downstream device & 2 upstream devices
• E.g. end host to 2 x Catalyst 3750s via 2 x GigE links
– Increases BW and resiliency
– Logically appears the same as a 2 device Port Channel
44. Multi Chassis Ethernet Channels
• 3750 StackWise & 6500 VSS single control plane
– StackWise via Stacking Cable to connect BP
– VSS via Virtual Switch Link (VSL)
• vPC uses two separate control planes
– Configurations managed independently
– Separate control plane protocol instances
• STP, FHRPs, IGPs, BGP, etc.
– Synchronization via a Peer Link
• Similar logic to VSS’s VSL
45. vPC Peer Switches
• vPC made up of 2 physical switches
– The vPC Peers
• vPC Peers each have…
– vPC Peer Link
– vPC Peer Keepalive Link
– vPC Member Ports
47. vPC Peer Link
• Layer 2 trunk link used to sync control plane between vPC peers
– CAM table, ARP cache, IGMP Snooping DB, etc.
– Uses Cisco Fabric Service over Ethernet (CFSoE) protocol
– Used to elect a vPC Primary and vPC Secondary Role
• Normally not used for the data plane
– Peer Link generally much lower BW than aggregate of
vPC Member Ports
– If Peer Link used in the data plane, it is the bottleneck
48. vPC Peer Keepalive
• Layer 3 link used as heartbeat in the control plane
– Used to prevent active/active or “Split Brain” vPC Roles
– Not used in the vPC data plane
– Uses unicast UDP port 3200
• Peer Keepalive Link can be…
– Mgmt0 port
• Back to back or over routed infrastructure
• Ideally in an isolated VRF
49. vPC Member Ports
• Data plane port channel towards downstream neighbor
• Each vPC Peer has at least one member port per vPC
– Can be more, up to hardware platform limits
• From perspective of downstream neighbor, upstream
vPC Peers are one switch
– Physical result is a triangle
– Logical result is a point-to-point Port Channel with no STP blocking ports
50. vPC Order of Operations
• Enable feature vpc
• Create a vPC domain
• Configure the vPC peer keepalive link
• Create the vPC peer link
• Move member ports to a vPC
– Configurations must be consistent to avoid Type 1 and Type 2 errors
51. vPC Loop Prevention
• Goal of vPC is to hide redundant links from STP
– Could result in layer 2 flooding loops
• Loops are prevented via “vPC Check” behavior
– Frames received in the vPC Peer Link cannot flood out a vPC
Member Port while the remote vPC Peer has active vPC
Members in the same vPC
• vPC Check Exception
– If vPC Peer’s Member Ports are down, the
vPC Member Ports become “Orphan Ports” and the
vPC Check is disabled
– vPC Peer Link is essentially a last resort connection
52. vPC and FHRP
• Nexus 7000 is typically L2 & L3 network boundary
– N7K is vPC Peer but also end host’s FHRP Default Gateway
• FHRP behavior changes to accommodate active/active forwarding
over vPC
– Traffic received in vPC Member Port of FHRP Standby to FHRP
Virtual MAC is not forwarded over Peer Link to Active FHRP member
– Essentially HSRP Standby acts as HSRP Active
• FHRP vPC can break in certain non-standard vendor applications
– Frames sent to FHRP Standby with physical DST MAC of FHRP
Active are sent out the Peer Link
– peer-gateway allows FHRP Standby to forward frames on
behalf of DST MAC of FHRP Active without going over Peer Link
53. vPC and Multicast
• When source is reachable via vPC Member Port, both vPC Peers act as PIM DR
– Called “Dual DR” or “Proxy DR”
• Allows either vPC Primary or Secondary to receive traffic from source and
forward it north without having to cross the vPC Peer Link
– Respects vPC check rule
54. OTV Basics
• Overlay Transport Virtualization (OTV)
– Layer 2 VPN over IPv4
• Specifically OTV is…
– IPv4/IPv6 over Ethernet… over MPLS… over GRE…
over IPv4…
55. OTV vs. other Layer 2 DCI’s
Layer 2 DCI is needed for Virtual Machine Workload Mobility i.e. VMware VMotion
• Many possible options for L2 DCI
– Dark Fiber (CWDM/DWDM)
– Layer 2 Transport Protocol (L2TPv3)
– Any Transport over MPLS (AToM)
– Virtual Private LAN Services (VPLS)
– Bridging over GRE – Spanning Tree Bridge Group
• These options can be used for DCI, but OTV was made for DCI
– Optimizes ARP flooding over DCI
– Demarc of the STP domain
– Can overlay multiple VLANs without complicated design
– Allows multiple edge routers without complicated design
56. OTV Terms
• OTV Edge Device
– Edge router(s) running OTV
• Authoritative Edge Device (AED)
– Active edge router for a particular VLAN
– Allows multiple redundant edge routers while preventing loops
• Extend VLANs
– VLAN being bridged over OTV
• Site VLAN
– Internal VLAN used to elect AED
57. OTV Terms Continued
• Site Identifier
– Unique ID per DC site, shared between AEDs
• Internal Interface
– Layer 2 interface where traffic to be encapsulated is received
• Overlay Interface
– The logical OTV tunnel interface that performs the OTV
encapsulation
• OTV Join Interface
– The Layer 3 physical link or port-channel that you use to route upstream
towards the DCI
59. OTV Control Plane
• Uses IS-IS to advertises MAC addresses between AEDs
– Is it’s own transport and extensible
• ISIS Encapsulated as Control Group Multicast
– IS-IS over Ethernet over MPLS over GRE over
IPv4 Multicast
– Implies that DCI must support ASM Multicast
60. OTV Data Plane
• Uses both Unicast and Multicast Transport
• Multicast Control Group
– Multicast or Broadcast Control Plane Protocols
– E.g. ARP, OSPF, EIGRP, etc.
• Unicast Data
– Normal Unicast is encapsulated as Unicast between AEDs
• Multicast Data Group
– Multicast Data flows are encapsulated as SSM Multicast
– Implies AEDs use IGMPv3 for (S,G) Joins
61. OTV Adjacency Server
• Normally OTV requires that the DCI runs multicast
– Needed to find and form IS-IS adjacencies and to tunnel
multicast data traffic
• OTV Adjacency Server removes multicast requirement
– One (or more) AEDs are configured as the adjacency server
– All other AEDs register with the adjacency server
– Now all endpoints are known
• All control and data plane traffic is now unicast encapsulated
– Will result in “Head End Replication” when more than 2 DC’s connected over
the DCI
62. OTV DCI Optimizations
• Other DCI options bridge all traffic over DCI
– STP, ARP, L2 Flooding, broadcast storms, etc.
• OTV reduces unnecessary flooding by…
– Proxy ARP/ICMPv6 Cache on AED
– Terminating the STP domain on AED