This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
This document provides a summary of a YANG tutorial presentation on advanced YANG statements, including must statements, augment statements, when statements, choice statements, identity statements, feature statements, deviations, and YANG modeling strategies. It discusses topics like restricting valid values with XPath expressions in must statements, adding new data with augment statements, making data conditional with when statements, modeling related enumerations with identity statements, and marking data as optional with feature statements. The presentation aims to help people understand and properly apply these important YANG modeling constructs.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
This document provides a summary of a YANG tutorial presentation on advanced YANG statements, including must statements, augment statements, when statements, choice statements, identity statements, feature statements, deviations, and YANG modeling strategies. It discusses topics like restricting valid values with XPath expressions in must statements, adding new data with augment statements, making data conditional with when statements, modeling related enumerations with identity statements, and marking data as optional with feature statements. The presentation aims to help people understand and properly apply these important YANG modeling constructs.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Tail-f Systems ConfD is a data-model driven network configuration and management system. It provides a core engine that supports multiple protocols like NETCONF, SNMP, REST, and CLIs. ConfD uses YANG data models to automatically render management interfaces and data stores. It also provides transactional configuration, validation, rollback management, and monitoring of operational data. ConfD aims to make network devices more manageable, programmable, and standards-compliant using model-driven development.
The document discusses several network configuration protocols:
- NETCONF uses XML and RPC to install, manipulate, and delete configurations on network devices. It operates over SSH.
- YANG is a data modeling language used to define configuration and state data for NETCONF in XML format.
- RESTCONF provides RESTful operations on NETCONF datastores containing YANG data, using HTTP.
The document discusses the evolution from 4G's point-to-point core network architecture to 5G's service-based architecture. It describes the need for change driven by new 5G use cases requiring network slicing and easier integration of new features. The current 3GPP Release 15 5G service-based architecture is presented, including its protocol layering using HTTP/2 and JSON, API design principles, and support for network slicing and security. Future releases will enhance the architecture for massive IoT, ultra-reliable low latency communication, and other use cases.
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
Introduction to Network Function Virtualization (NFV)rjain51
Class lecture by Prof. Raj Jain on Introduction to Network Function Virtualization (NFV). The talk covers Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline, Introduction to, Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline. Video recording available in YouTube.
The document discusses GPON (Gigabit Passive Optical Network) technology and implementation models. It provides information on:
- GPON standards and components like the OLT, ONU, and splitters
- Implementation models for retail/residential, enterprise/HRB, and mobile backhaul networks
- Considerations for ODN design and link budget calculations for different splitting scenarios
- Capabilities of OLTs, ONUs, and ONTs including interfaces, services supported, and functionalities
- Examples of residential ODN installation and network architectures for different use cases
This document discusses network function virtualization (NFV), including its use cases, architecture, and virtualization requirements. It describes NFV's benefits in reducing costs and increasing flexibility compared to proprietary hardware appliances. The NFV architecture framework separates network functions into software-based virtual network functions (VNFs) that run on a shared virtualized infrastructure. It also covers NFV specifications, use cases like NFV infrastructure as a service, and virtualization requirements around performance, security, and resilience.
Network slicing in 5G allows a single UE to connect to multiple network slices simultaneously. Each slice is identified by a Specific Network Slice Selection Assistance Information (S-NSSAI). The 5G core uses the S-NSSAI to select the appropriate functions like the Session Management Function (SMF) for each slice. This enables isolation of services and network functions on a per-slice basis. The Access and Mobility Management Function (AMF) is common across all slices, but the SMF and User Plane Function (UPF) can differ per slice. This facilitates customized network slices for different use cases and isolation of traffic and functions.
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
This document introduces software defined networking (SDN) and network functions virtualization (NFV) concepts. It discusses challenges with traditional networking and how SDN and NFV address these by decoupling the control and data planes, centralizing network intelligence, and abstracting the underlying network infrastructure. It then provides examples of open source SDN technologies like OpenDaylight, Open vSwitch, and OpenStack that can be used to build programmable software-defined networks and virtualized network functions.
This document discusses 11ax wireless solutions from EnGenius Technologies for SMBs. It begins with an introduction to EnGenius and their mission to deliver reliable and affordable connectivity solutions. It then covers the growing demands on wireless networks from more connected devices and increasing bandwidth needs. The bulk of the document discusses Wi-Fi 6 technology standards and how EnGenius 11ax access points meet the new capabilities like higher speeds, improved range, and increased client capacity. Specifically, it introduces EnGenius' first 11ax 2x2 and 4x4 access point models targeted at different customer deployment needs.
- Packet Tracer is a program used to illustrate basic network concepts and allow users to build and test networks in real-time.
- A router is a networking device that connects different networks and selects the best path to forward packets between them based on its routing table. Cisco is the leading manufacturer of routers.
- There are different modes that allow administrators to monitor and configure routers, including setup, user, privileged, global configuration, and interface modes. Static and dynamic routing can be configured to determine the best paths between networks.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
Summit 16: ETSI NFV Interface and Architecture OverviewOPNFV
The document discusses the work of the ETSI NFV Interfaces and Architecture Working Group (IFA WG). It provides an overview of the MANO architectural framework, including basic concepts, the architectural framework diagram, and information model. It also maps the MANO components to IFA work items, such as specifications for reference points and interfaces. Finally, it shows how the VIM northbound interfaces are mapped to relevant OPNFV projects.
The document discusses Networking as a Service (NaaS), a new business model where network operators provide networking infrastructure and services as a service. It outlines NaaS and its relationship to cloud computing. It then describes several potential solutions to implementing NaaS, including using a single router, deploying "NaaS boxes", and an SDN-based CloudNaaS approach. It concludes by discussing opportunities and open challenges for the future of NaaS.
This document provides an overview of 5G technology and its advantages over 4G LTE. It discusses the different 5G use cases like enhanced mobile broadband, massive IoT, and critical communications. It describes the evolution of radio technology including the use of new spectrum bands and massive MIMO. It also covers network architecture aspects such as centralized RAN deployments and functional splits between centralized and distributed units. The document is intended as a tutorial for IP engineers to understand 5G network capabilities and requirements.
Call Home is an innovative system that enables network functions virtualization (NFV) and software-defined networking (SDN) in situations where virtual customer premises equipment (vCPE) is protected by a cable modem or a firewall. In this presentation, ADVA Optical Networking’s engineers outlined this new technique and explained how it makes secure NFV/SDN deployment possible when a NETCONF client is otherwise unable to initiate an SSH connection directly to the NETCONF server.
Rajendra Nagabhushan and Vikram Darsi discussed how the IETF draft for NETCONF Call Home Using SSH can be implemented as an OpenDaylight feature. They demonstrated how the technology can be applied in a real-world use-case and outlined how an ADVA Optical Networking product is being developed ahead of its 2017 release.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Tail-f Systems ConfD is a data-model driven network configuration and management system. It provides a core engine that supports multiple protocols like NETCONF, SNMP, REST, and CLIs. ConfD uses YANG data models to automatically render management interfaces and data stores. It also provides transactional configuration, validation, rollback management, and monitoring of operational data. ConfD aims to make network devices more manageable, programmable, and standards-compliant using model-driven development.
The document discusses several network configuration protocols:
- NETCONF uses XML and RPC to install, manipulate, and delete configurations on network devices. It operates over SSH.
- YANG is a data modeling language used to define configuration and state data for NETCONF in XML format.
- RESTCONF provides RESTful operations on NETCONF datastores containing YANG data, using HTTP.
The document discusses the evolution from 4G's point-to-point core network architecture to 5G's service-based architecture. It describes the need for change driven by new 5G use cases requiring network slicing and easier integration of new features. The current 3GPP Release 15 5G service-based architecture is presented, including its protocol layering using HTTP/2 and JSON, API design principles, and support for network slicing and security. Future releases will enhance the architecture for massive IoT, ultra-reliable low latency communication, and other use cases.
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
Introduction to Network Function Virtualization (NFV)rjain51
Class lecture by Prof. Raj Jain on Introduction to Network Function Virtualization (NFV). The talk covers Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline, Introduction to, Four Innovations of NFV, Network Function Virtualization, NFV, Why We need NFV?, NFV and SDN Relationship, Mobile Network Functions, ETSI NFV ISG, NFV Specifications, NFV Architecture, NFV Concepts, Network Forwarding Graph, NFV Reference Points, NFV Framework Requirements, NFV Use Cases, NFV Proof of Concepts, PoCs, ETSI ISG Timeline. Video recording available in YouTube.
The document discusses GPON (Gigabit Passive Optical Network) technology and implementation models. It provides information on:
- GPON standards and components like the OLT, ONU, and splitters
- Implementation models for retail/residential, enterprise/HRB, and mobile backhaul networks
- Considerations for ODN design and link budget calculations for different splitting scenarios
- Capabilities of OLTs, ONUs, and ONTs including interfaces, services supported, and functionalities
- Examples of residential ODN installation and network architectures for different use cases
This document discusses network function virtualization (NFV), including its use cases, architecture, and virtualization requirements. It describes NFV's benefits in reducing costs and increasing flexibility compared to proprietary hardware appliances. The NFV architecture framework separates network functions into software-based virtual network functions (VNFs) that run on a shared virtualized infrastructure. It also covers NFV specifications, use cases like NFV infrastructure as a service, and virtualization requirements around performance, security, and resilience.
Network slicing in 5G allows a single UE to connect to multiple network slices simultaneously. Each slice is identified by a Specific Network Slice Selection Assistance Information (S-NSSAI). The 5G core uses the S-NSSAI to select the appropriate functions like the Session Management Function (SMF) for each slice. This enables isolation of services and network functions on a per-slice basis. The Access and Mobility Management Function (AMF) is common across all slices, but the SMF and User Plane Function (UPF) can differ per slice. This facilitates customized network slices for different use cases and isolation of traffic and functions.
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
This document introduces software defined networking (SDN) and network functions virtualization (NFV) concepts. It discusses challenges with traditional networking and how SDN and NFV address these by decoupling the control and data planes, centralizing network intelligence, and abstracting the underlying network infrastructure. It then provides examples of open source SDN technologies like OpenDaylight, Open vSwitch, and OpenStack that can be used to build programmable software-defined networks and virtualized network functions.
This document discusses 11ax wireless solutions from EnGenius Technologies for SMBs. It begins with an introduction to EnGenius and their mission to deliver reliable and affordable connectivity solutions. It then covers the growing demands on wireless networks from more connected devices and increasing bandwidth needs. The bulk of the document discusses Wi-Fi 6 technology standards and how EnGenius 11ax access points meet the new capabilities like higher speeds, improved range, and increased client capacity. Specifically, it introduces EnGenius' first 11ax 2x2 and 4x4 access point models targeted at different customer deployment needs.
- Packet Tracer is a program used to illustrate basic network concepts and allow users to build and test networks in real-time.
- A router is a networking device that connects different networks and selects the best path to forward packets between them based on its routing table. Cisco is the leading manufacturer of routers.
- There are different modes that allow administrators to monitor and configure routers, including setup, user, privileged, global configuration, and interface modes. Static and dynamic routing can be configured to determine the best paths between networks.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
Summit 16: ETSI NFV Interface and Architecture OverviewOPNFV
The document discusses the work of the ETSI NFV Interfaces and Architecture Working Group (IFA WG). It provides an overview of the MANO architectural framework, including basic concepts, the architectural framework diagram, and information model. It also maps the MANO components to IFA work items, such as specifications for reference points and interfaces. Finally, it shows how the VIM northbound interfaces are mapped to relevant OPNFV projects.
The document discusses Networking as a Service (NaaS), a new business model where network operators provide networking infrastructure and services as a service. It outlines NaaS and its relationship to cloud computing. It then describes several potential solutions to implementing NaaS, including using a single router, deploying "NaaS boxes", and an SDN-based CloudNaaS approach. It concludes by discussing opportunities and open challenges for the future of NaaS.
This document provides an overview of 5G technology and its advantages over 4G LTE. It discusses the different 5G use cases like enhanced mobile broadband, massive IoT, and critical communications. It describes the evolution of radio technology including the use of new spectrum bands and massive MIMO. It also covers network architecture aspects such as centralized RAN deployments and functional splits between centralized and distributed units. The document is intended as a tutorial for IP engineers to understand 5G network capabilities and requirements.
Call Home is an innovative system that enables network functions virtualization (NFV) and software-defined networking (SDN) in situations where virtual customer premises equipment (vCPE) is protected by a cable modem or a firewall. In this presentation, ADVA Optical Networking’s engineers outlined this new technique and explained how it makes secure NFV/SDN deployment possible when a NETCONF client is otherwise unable to initiate an SSH connection directly to the NETCONF server.
Rajendra Nagabhushan and Vikram Darsi discussed how the IETF draft for NETCONF Call Home Using SSH can be implemented as an OpenDaylight feature. They demonstrated how the technology can be applied in a real-world use-case and outlined how an ADVA Optical Networking product is being developed ahead of its 2017 release.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Summary slides of current Network OS status overview as of 16, Oct. 2015.
Comparison of two major Open Network OS: "OpenSwitch (ops)" and "Open Network Linux (ONL)".
Tail-f Systems owns the copyright to this document from February 13, 2015. The document discusses operational data providers. It provides copyright information but no other contextual details in the content provided.
This document discusses C data types. C provides a variety of basic data types to store different types of data including integers, floating-point numbers, characters, and pointers. These data types allow programmers to declare variables that can hold specific types of values.
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
The document provides an introduction to the ConfD Database (CDB), which is a hierarchical, ACID-compliant database used by ConfD to store configuration and operational data modeled with YANG. CDB stores data both in-memory and persistently on disk, supports transactions, replication, and automatic schema upgrades. Managed objects use CDB APIs to read configuration data at startup and subscribe to relevant configuration changes via a subscription socket.
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
SURF Lego - Architecture - Peter Boers- NWD23SURFevents
Automation en orchestration hebben enorme verbeteringen gebracht in de laatste generatie van het SURF-netwerk (SURFnet8). In deze sessie praten de architecten en ontwikkelaars van het netwerk je bij over de laatste ontwikkelingen op het gebied van onze netwerkarchitectuur. Hier hoor je alles over orchestration, virtualisatie, het netwerkdashboard en automation van het campus-netwerk.
Peter Boers, Technisch Product Manager Network Orchestration bij SURF
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
This document discusses using Red Hat OpenStack Platform and micro-segmentation to securely deploy financial services clouds. It covers common OpenStack security challenges, how Red Hat OpenStack Platform addresses these challenges through automation and templates, and how micro-segmentation provides isolation and strict access controls. The presentation then demonstrates micro-segmentation using virtual domains to separate workloads and apply fine-grained security policies in a demo.
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPROIDEA
Przemysław Borek - Cisco Systems
Language: English
Service orchestration in provider network, Tail-f
Register to the next PLNOG edition today: krakow.plnog.pl
Cisco Prime for IP Next -Generation Networks (IP NGN) drastically simplifies the design, provisioning, and management of carrier - grade networks.
This comprehensive solution centralizes and automates service design, fulfillment, assurance, and performance analysis to help you lower costs while meeting high customer expectations.
1) Huawei's agile network solution focuses on providing a user-centric, collaborative network with real-time quality awareness and centralized dynamic orchestration through software-defined networking.
2) The solution includes agile campus, branch, WAN, and data center networks. It leverages an agile controller, super switches, and virtual fabric to provide unified, simplified management of wired and wireless infrastructure.
3) Huawei's innovations for the agile network include integrated wired and wireless configuration, aggregation of multiple nodes, free user mobility across networks, distributed security coordination, and quality awareness measurement technologies.
This document discusses YANG data models and automation. It provides background on the speaker and their focus on manageability. It describes how automation is required for today's large, dynamic networks. YANG is introduced as the standard data modeling language that can be used to define management information for protocols like NETCONF and RESTCONF. Examples of organizations developing YANG models are provided. The document emphasizes that data model-driven APIs are key to enabling automation.
This document discusses SDN and metrics from various standards development organizations (SDOs). It notes that many SDOs are developing YANG data models for network automation using model-driven APIs. There is growth in YANG models at the IETF and other SDOs like BBF, IEEE, MEF, and OpenConfig. However, coordination is needed between SDOs to reduce costs as the data models need to work together to create network services. A YANG catalog is proposed to help organize the industry and provide a common inventory of all YANG modules across SDOs and vendors.
Текущее состояние рынка SDN/NFV и Huawei на нём. Взгляд с трех основных напра...ARCCN
Эдуард Василенко — директор по развитию решений SDN/NFV компании Huawei с докладом «Текущее состояние рынка SDN/NFV и Huawei на нём. Взгляд с трех основных направлений: услуги, бизнес-процессы, технологии»
Read to learn what Mule Runtime Fabric (RTF) and Anypoint RTF are, how you can leverage these integration engines, the best adoption strategies, and the right way to conduct the risk-cost-benefit analysis for your business.
Demystifying Orchestration and Assurance Across SDN NFV CE2.0WebNMS
Service providers worldwide are moving toward the dream goal of service automation from the front end of customer ordering and service monitoring to the back end of service provisioning, network monitoring, and active service-level agreement (SLA) enforcement.These are explored in depth with expert opinions. Also explored are a customer self-service portal for on-demand ordering and monitoring of Ethernet services, intelligent customer premises equipment for provisioning and monitoring, and testing and monitoring software for ensuring workability across physical and virtual networks.
OpenConfig: collaborating to enable programmable network managementAnees Shaikh
2015 OpenDaylight Summit
Abstract:
Network management and monitoring is at the heart of nearly all network operations, and yet the methodologies and technology used in this critical area are lagging far behind. SDN brought abstractions and programmability to the control plane, but the management plane has not seen similar advances.
At the last OpenDaylight mini-summit we motivated a new high-level approach for SDN-based configuration management. In this talk we describe the mission and progress of a new industry collaboration to build the basis of programmable management for heterogeneous and complex networks. The OpenConfig working group is structured as a low-overhead open source project with contributions from multiple global-scale network operators. The initial focus of the group is to develop a set of vendor-neutral data models for configuration and state management based on real-world operational use cases.
Lenovo provides a family of networking products including top-of-rack switches, embedded switches for blade servers, and converged switches that support both Ethernet and Fibre Channel. Their switches are designed to offer lower costs, lower power usage, and higher performance than competitors. Lenovo aims to provide a full portfolio of scalable switching solutions for data center networking needs.
This document summarizes an SDN and cloud computing presentation given by Affan Basalamah and Dr.-Ing. Eueung Mulyana from Institut Teknologi Bandung. It discusses SDN and cloud computing research activities at ITB, including implementing OpenFlow networks, developing SDN courses, and student projects involving OpenFlow, OpenStack, and IPsec VPNs. It also describes forming an SDN research group at ITB to facilitate collaboration between academia, network operators, and vendors on SDN topics.
Le SDN et NFV sont très à la mode en ce moment car en passant des appliance physiques aux équipement réseau massivement logiciel, celà devrait offrir une grande flexibilité et agilité aux entreprises (et telco en particulier). Néanmoins chainer des services réseau est un exercice encore très complexe et ce document vous explique ce qu'il est déjà possible de faire sur OpenStack en couplant par exemple : un load balancer (BigIP), un Firewall (BigIP), un réseau virtuel WAN (RiverBed) ou encore un routeur virtuel (Brocade).
Introduction to YANG data models and their use in OpenDaylight: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. YANG is a data modeling language defining device and service configuration and operations. This session will describe what YANG is (with examples), and its relationship to and how it is used in OpenDaylight. Several tools making it easier for the application developer to work with YANG will be discussed. It will conclude with a demonstration of YANGUI and YANG Visualizer, two new OpenDaylight applications that auto-generate a user interface and directed graph respectively, both based on selected YANG models.
LTE: Building next-gen application services for mobile telecomsNuoDB
This document provides an overview of mobile network virtualization and how it enables telecommunications operators to reduce costs and support new services. It discusses concepts like network functions virtualization (NFV), software-defined networking (SDN), and the virtualization of different parts of the mobile network including the radio access network (RAN) and evolved packet core (EPC). The challenges of evolving networks through virtualization while maintaining service and revenues are also examined.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
1) Agile networks focus on providing a flexible, dynamic network that is easy and fast to use, moving away from traditional static networks.
2) Key aspects of agile networks include focus on the user experience, network-wide collaboration, and centralized dynamic orchestration using software-defined approaches.
3) Huawei provides solutions for agile campus, WAN, data center, and branch networks using their 5th generation switches and agile controllers to enable features like zero-touch provisioning, unified management of wired and wireless, and quality-aware networking.
Similar to Module 3: NETCONF and YANG Concepts (20)
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.