This document provides an overview of routing protocols and concepts:
- It defines what a route is and explains that routing protocols are used to exchange route information between routers to direct packet flow.
- Key concepts covered include the routing table, static and dynamic routes, classification of routing protocols by area and algorithm, and route metrics.
- It also discusses routing protocol preference, equal cost multi-path routing, and the longest prefix match method used to select routes.
Speaker: Atul Kshirsagar, GE Software
To learn more about Pivotal Cloud Foundry, visit http://www.pivotal.io/platform-as-a-service/pivotal-cloud-foundry.
1.LTE Network Architecture
2.LTE Radio Interface Overview
3.E-UTRA Features and Interfaces
4.Radio Interface Techniques
5.FDD and TDD
6.Spectrum Usage in LTE
7.Radio and Network Identities
OFDM, OFDMA and SC-FDMA Basic Principles
1. OFDMA Principle
2.Signal generation and processing
3.Inter Symbol Interference
4.OFDM Problems
5.SC-FDMA
6.Frequency Hopping
7.Proposed use in LTE
8.Pros and Cons with OFDM and SC-FDMA
Enabling Key Applications for Transport SDN - Optinet China 2020Leah Wilkinson
Dr Hu Qian presents OIF Enabling Key Applications for Transport SDN at the Optinet China 2020 event. From Transport SDN to Integrated Packet Optical SDN: IP SDN and transport SDN is ready; Integrated packet optical SDN on the way.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Speaker: Atul Kshirsagar, GE Software
To learn more about Pivotal Cloud Foundry, visit http://www.pivotal.io/platform-as-a-service/pivotal-cloud-foundry.
1.LTE Network Architecture
2.LTE Radio Interface Overview
3.E-UTRA Features and Interfaces
4.Radio Interface Techniques
5.FDD and TDD
6.Spectrum Usage in LTE
7.Radio and Network Identities
OFDM, OFDMA and SC-FDMA Basic Principles
1. OFDMA Principle
2.Signal generation and processing
3.Inter Symbol Interference
4.OFDM Problems
5.SC-FDMA
6.Frequency Hopping
7.Proposed use in LTE
8.Pros and Cons with OFDM and SC-FDMA
Enabling Key Applications for Transport SDN - Optinet China 2020Leah Wilkinson
Dr Hu Qian presents OIF Enabling Key Applications for Transport SDN at the Optinet China 2020 event. From Transport SDN to Integrated Packet Optical SDN: IP SDN and transport SDN is ready; Integrated packet optical SDN on the way.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Route technology is the key point that
internet is running continuously.
Route is a very interesting and complex
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 2
Route is a very interesting and complex
task, and eternal topic.
3. Upon completion of this course, you will be
able to :
Know the concept of route
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 3
Know the classification of routing
protocol
Understand the routing process of data
packet in the network
Understand the structure of routing table
4. What’s The Route?
A route is the path information to guide IP packets to be
transferred.
Destination
network N
E0/1
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 4
Other networks
E0/0 S0/0
E0/1
RTA
RTB
RTC
5. The Key Function of routing
Check the destination of the data packet
Confirm the information resource
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 5
Discover possible route
Select best route
Validate and maintain route information
7. Routes—Discovered by Data Link Layer
[RTB]display ip routing-table
Routing Tables: Public
Destinations : 8 Routes : 8
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30
RTA
10.1.2.0/24
.1
.1 .2
.2
RTB
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 7
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0/0/0
10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
……
10.1.2.1/32 Direct 0 0 127.0.0.1 InLoopBack0
10.1.2.2/32 Direct 0 0 10.1.2.2 Serial0/0/1
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
RTC
8. Routes—Static Route
[RTA] display ip routing-table
Routing Tables: Public
RTB
2.2.2.2/32
10.1.1.0/30
RTA
.1 .2
Configure static route towards
destination network 2.2.2.2/32
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 8
Routing Tables: Public
Destinations : 8 Routes : 8
Destination/Mask Proto Pre Cost NextHop Interface
2.2.2.2/32 Static 60 0 10.1.2.2 Ethernet0
10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0
10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
10.1.1.2/32 Direct 0 0 10.1.1.2 Serial0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
9. Routes—Discovered by Dynamic Routing
Protocol
[RTB]display ip routing-table
Routing Tables: Public
10.1.2.0/24
.1
OSPF
RIP
RTA
RTC
172.16.1.1/32
.2
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 9
Routing Tables: Public
Destinations : 10 Routes : 10
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30 Direct 0 0 10.1.1.2 Serial0/0/0
10.1.1.1/32 Direct 0 0 10.1.1.1 Serial0/0/0
……
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
172.16.1.1/32 OSPF 10 1563 10.1.2.2 Serial0/0/1
192.168.1.0/24 RIP 100 1 10.1.1.1 Serial0/0/0
10.1.1.0/8
RTB
.1
192.168.2.1/24
.2
10. Static and Dynamic Route
Static route Dynamic route
The route configured
manually by network
The route that router gets
from other routers via
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 10
manually by network
administrator
When network topological
is changed, administrator
need to update static route
routing protocol
When network topological
is changed, routers will
update route information
automatically
11. Routing Protocol
Routing protocol is like language that used to exchange information between
routers, routers shares network status and network reachable information via
routing protocol.
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 11
routing protocol.
The communication peers must run same protocols that used to exchange
routing information.
Routing protocol define a set of rules about communication between the routers
Routing protocol maintains routing table and provide the best forwarding path.
13. Routing Protocols Classification——Protocol
Algorithm
According to protocol algorithm
Distance-Vector routing protocol
− It includes RIP and BGP. Thereinto, BGP is also called
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 13
− It includes RIP and BGP. Thereinto, BGP is also called
Path-Vector routing protocol.
Link-State routing protocol
− It is also called the shortest path first routing protocol,
includes OSPF and IS-IS.
14. Routing Protocols Classification——Service
Application
According to service application, routing protocol can be divide
into the following types:
Unicast Routing Protocol: includes RIP、OSPF、BGP and IS-
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 14
Unicast Routing Protocol: includes RIP、OSPF、BGP and IS-
IS and so on.
Multicast Routing Protocol : includes DVMRP、PIM-SM、PIM-
DM and so on.
16. Preference of Routing Protocol
If there are multiple routes, the route with higher preference (the
smaller value, the higher preference) will be used to guide IP packet
to be transferred.
RIP OSPF
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 16
Routing table
10.0.0.0 R0
10.0.0.0 R1
10.0.0.0 R1
17. Preference of Routing Protocol
The default route preference on VRP platform is shown in the
following table
Routing protocol Preference
DIRECT 0
OSPF 10
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 17
OSPF 10
IS-IS 15
STATIC 60
RIP 100
OSPF ASE 150
IBGP 255
EBGP 255
Untrustworthy 255
18. Route Metric
There are two routes from router A to D :
Path1: A→B→C→D ,the total route metric is 9
Path2: A→E→F→C→D , the total route metric is 12
The router first selects the smaller metric route, and take it into the
routing table.
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 18
2
5 2
6
3
1
A
B D
F
C
E
routing table.
19. Equal Cost Multi-Path (ECMP)
Equal Cost Multi-Path
There are several routes towards the same destination with same route
metric, if the route preference is same, these routes are all added into the
routing table, IP packet will be transferred over these link by turns.
Two equal cost multi-path from A to D:
A→B→C→D,total metric 5+5+8=18
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 19
A→B→C→D,total metric 5+5+8=18
A→C→D, total metric 10+8=18
5
8
5
10
A
B
C D
20. Equal Cost Multi-Path
[RTB] display ip routing-table
Routing Tables: Public
Destinations : 13 Routes : 15
Destination/Mask Proto Pre Cost NextHop Interface
3.3.3.0/24 Direct 0 0 3.3.3.2 Serial2
3.3.3.1/32 Direct 0 0 3.3.3.1 Serial2
3.3.3.2/32 Direct 0 0 127.0.0.1 InLoopBack0
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 20
10.1.1.1/32 Static 60 0 1.1.1.1 Serial0
Static 60 0 2.2.2.1 Serial1
Static 60 0 3.3.3.1 Serial2
20.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
Equal Cost Multi-Path
realizes load-balance
21. The Longest Match
Destination makes
logical AND operation
Lookup routing table
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 21
match
logical AND operation
with mask
Compare the destination
address in the routing table
Select the longest
matched route
22. The Example of Longest Match
[Quidway] display ip routing-table
Routing Tables:
Destination/Mask proto pref Metric Nexthop Interface
0.0.0.0/0 Static 60 0 120.0.0.2 Serial0/0
The data packet of destination 9.1.2.1 will match the route 9.1.0.0/16
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 22
8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1
9.0.0.0/8 OSPF 10 50 20.0.0.2 Ethernet0/0
9.1.0.0/16 RIP 100 4 120.0.0.2 Serial0/0
11.0.0.0/8 Static 60 0 120.0.0.2 Serial0/1
20.0.0.0/8 Direct 0 0 20.0.0.1 Ethernet0/2
20.0.0.1/32 Direct 0 0 127.0.0.1 LoopBack0