SlideShare a Scribd company logo
Slide 1
A Service-Inferred, Deterministic
Traffic Forwarding Scheme
C. Jacquenet
christian.jacquenet@orange.com
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Slide 2
Outline
• New challenges
• Basic issue and typical use case
• Introducing Network Located Function
Chaining (NLFC)
• NLFC operation
• Pending questions
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Challenges
• Network service design and operation now assume
the combined and sometimes ordered activation of
elementary capabilities
– Forwarding and routing, firewall, QoS, DPI, etc.
– Function chaining may be conditioned by traffic directionality
• These Network-Located Functions (NLF) may be
activated on the same I/F or network segment
– E.g., the (s)Gi I/F of mobile networks
• Inferred complexity suggests robust mastering of
chained NLF activation
– For the sake of optimized service delivery and efficient
forwarding scheme
Slide 3 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Core Issue
• IP network operation now assumes the
complex chaining of various elementary
capabilities
– Besides basic routing and forwarding functions
• How to efficiently forward traffic entering a
network that supports these functions?
– Differentiation is ensured by tweaking the set of
network functions to be invoked
• Packet processing decisions become service-
inferred and policy-derived
Slide 4 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Slide 5
Business-Driven Forwarding
Use Case
• Best path is now computed and selected
based upon network service orchestration
– May differ from typical hop-by-hop path
computation and forwarding schemes
Unsuitable
Network
Typical best path
Business best path
User
2 paths
1 path
1 path
Unsuitable network
is not visible to first
service provider
network
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Objectives
• Compute and establish service-inferred data paths
– For the sake of optimized traffic flow forwarding
• Master NLF chaining regardless of the underlying
topology and routing policies
– Yielding a NLF-based differentiated forwarding paradigm
• Facilitate NLF operation while avoiding any major
topology upgrade
– Adapt chronology of NLF activation according to the required
service and associated parameters
• Contribute to the automation of dynamic resource
allocation and policy enforcement procedures
Slide 6 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Rationale
• Dynamic NLF provisioning is separated from
packet processing
• NLF functions are seen as black boxes
• NLF chaining varies as a function of the
service and the traffic directionality
– Chaining is described by an information processed
by devices that participate to the delivery of a
given service
– Such information is signaled by the packets
themselves
Slide 7 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Environment
• Policy Decision Point (PDP) *makes* decisions
according to policies documented in NLFC Policy
Tables
– PDP decisions are applied by NLF (boundary) nodes which
process traffic accordingly
Slide 8 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
The Intelligence Resides In
The PDP
• PDP-maintained NLFC Policy Tables describe
the NLF-specific policy to be enforced
• NLF nodes are provisioned with:
– Local NLF Identifier(s) so that the node can position
itself in the NLFC Map
– NLFC Maps and Locators
• Boundary nodes are also provisioned with
Classification Rules
– A Rule is bound to one NLFC Map
– (Packet) Classifier relies upon various packet header
fields (DA, SA, DS, etc.)
Slide 9 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Processing
• Assign NLF Identifiers
– NLF functions are listed and identified in a repository
maintained by the NLFC administrative entity (ISP)
• Identifier is a case-sensitive string
• Assign NLF Locators
– Meant to locate a NLF which can be supported by several
devices
• Locator is typically an IP address (could be a FQDN)
• One or multiple Locators can be configured for each NLF
• Build NLFC Maps
– Detail the list of NLFs to be invoked in a specific order
– Maps are identified by an Index and are specific to traffic
directionality
Slide 10 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLF Node Operation
• Check whether the incoming packet conveys
a NLFC Map Index
– If not, proceed with typical forwarding rules
• If so, packet is subject to NLFC according to:
– The NLFC Map
– The number of NLF functions supported by the
node
• If node is not the last in the Map, node
forwards packet to the next NLF node as
described in the Map
– Proceeds with typical forwarding rules otherwise
Slide 11 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Example
• A node supports NLF function a
– Function a must be invoked only for packets
matching Rules 1 and 3, as per NLFC Maps
– Next NLF functions to be invoked for such packets
are c (Map Index 1) and h (Map Index 3),
respectively
Slide 12 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
At NLFC Domain Boundaries
• Ingress Node
– Strips any existing NLFC Map Index
– Checks whether received packet matches any existing
classification rule
• If not, proceed with typical forwarding rules
– If so, retrieves the locator of the first NLF as per the
corresponding Map entry
• If next NLF node is not the next hop, packet is encapsulated
(e.g., GRE) and forwarded to next NLF node
• Egress Node
– Strips any existing NLFC Map Index
– Proceeds with typical forwarding rules
Slide 13 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Pending Questions
• NLC Map Index encoding
– 8-bit is probably enough, 16-bit is comfortable
• Where to store NLFC Map Index?
– DS field, Flow Label, new IPv6 extension header, new IP
option, L2 field, TCP option, define a new shim, etc.
• NLFC forwarding suggests encapsulation
– When next NLF node is not the next hop as per IGP/BGP
machinery
– GRE, IP-in-IP, LISP, etc., are candidate options
• Security issues at NLFC domain boundaries
– Means to protect against DDoS or illegitimate invocation of
resources must be supported
Slide 14 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Reading Material
• Problem statement
– http://tools.ietf.org/html/draft-quinn-nsc-problem-
statement-00
• Global framework
– http://tools.ietf.org/html/draft-boucadair-network-
function-chaining-01
• Network Service Header (as a means to
encapsulate information that describes a
service path)
– http://tools.ietf.org/html/draft-quinn-nsh-00
Slide 15 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Thank You!
Slide 16 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.

More Related Content

What's hot

2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture
Maurizio Donna
 
Rpl
Rpl Rpl
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
Eleni Trouva
 
Rpl2016
Rpl2016Rpl2016
TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...
chiportal
 
3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages
Maurizio Donna
 
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
gogo6
 
Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013
Eleni Trouva
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
Eleni Trouva
 
LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017
Shawn Zandi
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
ARCFIRE ICT
 
RouteFlow & IXPs
RouteFlow & IXPsRouteFlow & IXPs
RouteFlow & IXPs
nvirters
 
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
chiportal
 
1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture 1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture
Maurizio Donna
 
Architecture of OpenFlow SDNs
Architecture of OpenFlow SDNsArchitecture of OpenFlow SDNs
Architecture of OpenFlow SDNs
US-Ignite
 
0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction
Maurizio Donna
 
DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
Cisco DevNet
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
Eleni Trouva
 
Ieee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialIeee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorial
Stefano Salsano
 
Mpls
MplsMpls

What's hot (20)

2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture
 
Rpl
Rpl Rpl
Rpl
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...
 
3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages
 
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
 
Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
 
LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
RouteFlow & IXPs
RouteFlow & IXPsRouteFlow & IXPs
RouteFlow & IXPs
 
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
 
1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture 1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture
 
Architecture of OpenFlow SDNs
Architecture of OpenFlow SDNsArchitecture of OpenFlow SDNs
Architecture of OpenFlow SDNs
 
0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction
 
DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
Ieee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialIeee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorial
 
Mpls
MplsMpls
Mpls
 

Viewers also liked

Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréalAct 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
ACSG Section Montréal
 
Routage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linuxRoutage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linux
Lehiri Gosse
 
Comment générer du trafic vers votre site internet en 2017 ?
Comment générer du trafic vers votre site internet en 2017  ?Comment générer du trafic vers votre site internet en 2017  ?
Comment générer du trafic vers votre site internet en 2017 ?
Julien Bréal
 
netsurf ppt in hindi
netsurf ppt in hindinetsurf ppt in hindi
netsurf ppt in hindi
Sharma Ji
 
Digital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail SolutionsDigital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail Solutions
RetailnDetail
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 

Viewers also liked (6)

Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréalAct 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
 
Routage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linuxRoutage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linux
 
Comment générer du trafic vers votre site internet en 2017 ?
Comment générer du trafic vers votre site internet en 2017  ?Comment générer du trafic vers votre site internet en 2017  ?
Comment générer du trafic vers votre site internet en 2017 ?
 
netsurf ppt in hindi
netsurf ppt in hindinetsurf ppt in hindi
netsurf ppt in hindi
 
Digital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail SolutionsDigital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail Solutions
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe

Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Cloud Native Day Tel Aviv
 
P4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and ControlP4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and Control
Open-NFP
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
APNIC
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve Rothenberg
CPqD
 
OpenFlow Extensions
OpenFlow ExtensionsOpenFlow Extensions
OpenFlow Extensions
US-Ignite
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
John Loughney
 
Segment Routing: A Tutorial
Segment Routing: A TutorialSegment Routing: A Tutorial
Segment Routing: A Tutorial
APNIC
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
Rute C. Sofia
 
Making our networking stack truly extensible
Making our networking stack truly extensible Making our networking stack truly extensible
Making our networking stack truly extensible
Olivier Bonaventure
 
IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013
APNIC
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Mark Ryan Castellani
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Mark Ryan Castellani
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
How OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's UsefulHow OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's Useful
OPNFV
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
FIBRE Testbed
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
Open Networking Summits
 
Cardigan at ISCC 2014
Cardigan at ISCC 2014Cardigan at ISCC 2014
Cardigan at ISCC 2014
Christian Esteve Rothenberg
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton
IPv6 Summit 2010
 
CellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deploymentsCellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deployments
CPqD
 
Cumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open sourceCumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open source
Nat Morris
 

Similar to JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe (20)

Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
 
P4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and ControlP4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and Control
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve Rothenberg
 
OpenFlow Extensions
OpenFlow ExtensionsOpenFlow Extensions
OpenFlow Extensions
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
 
Segment Routing: A Tutorial
Segment Routing: A TutorialSegment Routing: A Tutorial
Segment Routing: A Tutorial
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
 
Making our networking stack truly extensible
Making our networking stack truly extensible Making our networking stack truly extensible
Making our networking stack truly extensible
 
IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
How OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's UsefulHow OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's Useful
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
 
Cardigan at ISCC 2014
Cardigan at ISCC 2014Cardigan at ISCC 2014
Cardigan at ISCC 2014
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton
 
CellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deploymentsCellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deployments
 
Cumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open sourceCumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open source
 

More from Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
Afnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Afnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
Afnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
Afnic
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
Afnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Afnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Afnic
 

More from Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe

  • 1. Slide 1 A Service-Inferred, Deterministic Traffic Forwarding Scheme C. Jacquenet christian.jacquenet@orange.com Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 2. Slide 2 Outline • New challenges • Basic issue and typical use case • Introducing Network Located Function Chaining (NLFC) • NLFC operation • Pending questions Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 3. Challenges • Network service design and operation now assume the combined and sometimes ordered activation of elementary capabilities – Forwarding and routing, firewall, QoS, DPI, etc. – Function chaining may be conditioned by traffic directionality • These Network-Located Functions (NLF) may be activated on the same I/F or network segment – E.g., the (s)Gi I/F of mobile networks • Inferred complexity suggests robust mastering of chained NLF activation – For the sake of optimized service delivery and efficient forwarding scheme Slide 3 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 4. Core Issue • IP network operation now assumes the complex chaining of various elementary capabilities – Besides basic routing and forwarding functions • How to efficiently forward traffic entering a network that supports these functions? – Differentiation is ensured by tweaking the set of network functions to be invoked • Packet processing decisions become service- inferred and policy-derived Slide 4 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 5. Slide 5 Business-Driven Forwarding Use Case • Best path is now computed and selected based upon network service orchestration – May differ from typical hop-by-hop path computation and forwarding schemes Unsuitable Network Typical best path Business best path User 2 paths 1 path 1 path Unsuitable network is not visible to first service provider network Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 6. NLFC Objectives • Compute and establish service-inferred data paths – For the sake of optimized traffic flow forwarding • Master NLF chaining regardless of the underlying topology and routing policies – Yielding a NLF-based differentiated forwarding paradigm • Facilitate NLF operation while avoiding any major topology upgrade – Adapt chronology of NLF activation according to the required service and associated parameters • Contribute to the automation of dynamic resource allocation and policy enforcement procedures Slide 6 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 7. Rationale • Dynamic NLF provisioning is separated from packet processing • NLF functions are seen as black boxes • NLF chaining varies as a function of the service and the traffic directionality – Chaining is described by an information processed by devices that participate to the delivery of a given service – Such information is signaled by the packets themselves Slide 7 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 8. NLFC Environment • Policy Decision Point (PDP) *makes* decisions according to policies documented in NLFC Policy Tables – PDP decisions are applied by NLF (boundary) nodes which process traffic accordingly Slide 8 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 9. The Intelligence Resides In The PDP • PDP-maintained NLFC Policy Tables describe the NLF-specific policy to be enforced • NLF nodes are provisioned with: – Local NLF Identifier(s) so that the node can position itself in the NLFC Map – NLFC Maps and Locators • Boundary nodes are also provisioned with Classification Rules – A Rule is bound to one NLFC Map – (Packet) Classifier relies upon various packet header fields (DA, SA, DS, etc.) Slide 9 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 10. NLFC Processing • Assign NLF Identifiers – NLF functions are listed and identified in a repository maintained by the NLFC administrative entity (ISP) • Identifier is a case-sensitive string • Assign NLF Locators – Meant to locate a NLF which can be supported by several devices • Locator is typically an IP address (could be a FQDN) • One or multiple Locators can be configured for each NLF • Build NLFC Maps – Detail the list of NLFs to be invoked in a specific order – Maps are identified by an Index and are specific to traffic directionality Slide 10 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 11. NLF Node Operation • Check whether the incoming packet conveys a NLFC Map Index – If not, proceed with typical forwarding rules • If so, packet is subject to NLFC according to: – The NLFC Map – The number of NLF functions supported by the node • If node is not the last in the Map, node forwards packet to the next NLF node as described in the Map – Proceeds with typical forwarding rules otherwise Slide 11 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 12. Example • A node supports NLF function a – Function a must be invoked only for packets matching Rules 1 and 3, as per NLFC Maps – Next NLF functions to be invoked for such packets are c (Map Index 1) and h (Map Index 3), respectively Slide 12 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 13. At NLFC Domain Boundaries • Ingress Node – Strips any existing NLFC Map Index – Checks whether received packet matches any existing classification rule • If not, proceed with typical forwarding rules – If so, retrieves the locator of the first NLF as per the corresponding Map entry • If next NLF node is not the next hop, packet is encapsulated (e.g., GRE) and forwarded to next NLF node • Egress Node – Strips any existing NLFC Map Index – Proceeds with typical forwarding rules Slide 13 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 14. Pending Questions • NLC Map Index encoding – 8-bit is probably enough, 16-bit is comfortable • Where to store NLFC Map Index? – DS field, Flow Label, new IPv6 extension header, new IP option, L2 field, TCP option, define a new shim, etc. • NLFC forwarding suggests encapsulation – When next NLF node is not the next hop as per IGP/BGP machinery – GRE, IP-in-IP, LISP, etc., are candidate options • Security issues at NLFC domain boundaries – Means to protect against DDoS or illegitimate invocation of resources must be supported Slide 14 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 15. Reading Material • Problem statement – http://tools.ietf.org/html/draft-quinn-nsc-problem- statement-00 • Global framework – http://tools.ietf.org/html/draft-boucadair-network- function-chaining-01 • Network Service Header (as a means to encapsulate information that describes a service path) – http://tools.ietf.org/html/draft-quinn-nsh-00 Slide 15 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 16. Thank You! Slide 16 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.