6WINDGate™ - Accelerated Data Plane Solution for EPC and vEPC6WIND
The document discusses 6WIND and its 6WINDGate software. It begins by stating that 6WIND aims to replace dedicated networking hardware with commodity servers and virtualization using its software. It then provides facts about 6WIND, including that it has over 150 man years of experience developing 6WINDGate, which supports major hardware platforms. Finally, it outlines the key benefits of 6WINDGate, such as enabling high performance networking on standard platforms for both physical and virtual environments.
6WIND provides the 6WINDGate packet processing software to enable high performance networking on standard hardware platforms. The software delivers industry-leading performance to help network vendors, service providers, and enterprises capitalize on SDN and NFV. By replacing dedicated hardware with generic servers and virtualization, 6WINDGate allows for an open ecosystem, improved performance, and more rapid service creation at a lower cost compared to traditional network architectures.
Platforms for Accelerating the Software Defined and Virtual Infrastructure6WIND
As network infrastructures evolve and selected elements shift from physical systems to virtual functions a new class of network appliance is required that provides high performance processing, balanced I/O and hardware or software acceleration. Such a platform must combine standard server technology and modular systems that can be configured to support line rate performance with network interfaces up to 100Gbit/s.
This webinar will discuss a class of network appliance that offers performance levels previously requiring more complex and costly architectures while integrating seamlessly with standard software frameworks such as Linux, Open vSwitch (OVS) and Intel® Data Plane Development Kit (DPDK).
6WINDGate™ - High Performance Networking for Data Centers6WIND
The document discusses 6WIND's packet processing software, 6WINDGate. It aims to deliver the highest performance networking for virtualized environments through an accelerated virtual switch. 6WINDGate provides transparency, scalability, and hardware independence. It increases VM density and enables new high performance east-west cloud services by resolving bottlenecks and scaling linearly with CPU cores. This allows 3x more VMs, 3x more performance, and 70% less servers with a ROI in less than 3 months.
6WIND Virtual Accelerator Performance Test Comparison6WIND
The document describes performance tests of a 6WIND Virtual Accelerator for network packet forwarding. Test 1 used an Open vSwitch and Linux VM and achieved 14 Gbps. Test 2 used the Virtual Accelerator and a Linux VM and achieved 118 Gbps, an 8x increase. Test 3 used the Virtual Accelerator and a DPDK-enabled VM and achieved wire-speed performance of 240 Gbps. The Virtual Accelerator is designed to provide high-performance networking and virtual switching capabilities for virtual network applications.
6WINDGate™ - Powering the New-Generation of IPsec Gateways6WIND
6WINDGate™ for IPsec Gateways:
- High performance IPsec stack to sustain encrypted traffic over several tens of thousands of IPsec tunnels with low-latency
- Optimal use of software and hardware crypto-acceleration for best price/performance
- High-capacity IKE control plane to manage several tens of thousands of IKE sessions on a single server
- High capacity for encapsulation protocols such as VLAN, PPP, L2TP and GRE…
- High performance and scalable IPv4 and IPv6 forwarding with virtual routing support for a large number of instances
- High performance and capacity firewall and NAT
6WINDGate™ - Enabling Cloud RAN Virtualization6WIND
Traditional mobile networks are based on stand-alone Base Transceiver Stations covering a radio area. BTS overlap to provide a wide coverage to mobile users and are connected to the mobile core network through a backhaul network. Cloud Radio Access Network is a new architecture for mobile access networks that rely on simple radio front-ends connected to a pool of remote network resources. By leveraging cloud infrastructures, CAPEX and OPEX is lowered substantially.
6WINDGate™ - Powering the New Generation of Network Appliances6WIND
This document discusses 6WIND and its software product 6WINDGate. It makes the following key points:
- 6WINDGate is a software networking stack that enables high-performance networking on commodity servers through virtualization. It aims to replace dedicated hardware with generic servers.
- 6WINDGate provides fast packet processing, supports multiple hardware platforms, and has been deployed by major companies since 2007 to improve network performance.
- It allows various network appliances like routers, firewalls, and load balancers to run on a single generic server through virtualization while maintaining high performance.
6WINDGate™ - Accelerated Data Plane Solution for EPC and vEPC6WIND
The document discusses 6WIND and its 6WINDGate software. It begins by stating that 6WIND aims to replace dedicated networking hardware with commodity servers and virtualization using its software. It then provides facts about 6WIND, including that it has over 150 man years of experience developing 6WINDGate, which supports major hardware platforms. Finally, it outlines the key benefits of 6WINDGate, such as enabling high performance networking on standard platforms for both physical and virtual environments.
6WIND provides the 6WINDGate packet processing software to enable high performance networking on standard hardware platforms. The software delivers industry-leading performance to help network vendors, service providers, and enterprises capitalize on SDN and NFV. By replacing dedicated hardware with generic servers and virtualization, 6WINDGate allows for an open ecosystem, improved performance, and more rapid service creation at a lower cost compared to traditional network architectures.
Platforms for Accelerating the Software Defined and Virtual Infrastructure6WIND
As network infrastructures evolve and selected elements shift from physical systems to virtual functions a new class of network appliance is required that provides high performance processing, balanced I/O and hardware or software acceleration. Such a platform must combine standard server technology and modular systems that can be configured to support line rate performance with network interfaces up to 100Gbit/s.
This webinar will discuss a class of network appliance that offers performance levels previously requiring more complex and costly architectures while integrating seamlessly with standard software frameworks such as Linux, Open vSwitch (OVS) and Intel® Data Plane Development Kit (DPDK).
6WINDGate™ - High Performance Networking for Data Centers6WIND
The document discusses 6WIND's packet processing software, 6WINDGate. It aims to deliver the highest performance networking for virtualized environments through an accelerated virtual switch. 6WINDGate provides transparency, scalability, and hardware independence. It increases VM density and enables new high performance east-west cloud services by resolving bottlenecks and scaling linearly with CPU cores. This allows 3x more VMs, 3x more performance, and 70% less servers with a ROI in less than 3 months.
6WIND Virtual Accelerator Performance Test Comparison6WIND
The document describes performance tests of a 6WIND Virtual Accelerator for network packet forwarding. Test 1 used an Open vSwitch and Linux VM and achieved 14 Gbps. Test 2 used the Virtual Accelerator and a Linux VM and achieved 118 Gbps, an 8x increase. Test 3 used the Virtual Accelerator and a DPDK-enabled VM and achieved wire-speed performance of 240 Gbps. The Virtual Accelerator is designed to provide high-performance networking and virtual switching capabilities for virtual network applications.
6WINDGate™ - Powering the New-Generation of IPsec Gateways6WIND
6WINDGate™ for IPsec Gateways:
- High performance IPsec stack to sustain encrypted traffic over several tens of thousands of IPsec tunnels with low-latency
- Optimal use of software and hardware crypto-acceleration for best price/performance
- High-capacity IKE control plane to manage several tens of thousands of IKE sessions on a single server
- High capacity for encapsulation protocols such as VLAN, PPP, L2TP and GRE…
- High performance and scalable IPv4 and IPv6 forwarding with virtual routing support for a large number of instances
- High performance and capacity firewall and NAT
6WINDGate™ - Enabling Cloud RAN Virtualization6WIND
Traditional mobile networks are based on stand-alone Base Transceiver Stations covering a radio area. BTS overlap to provide a wide coverage to mobile users and are connected to the mobile core network through a backhaul network. Cloud Radio Access Network is a new architecture for mobile access networks that rely on simple radio front-ends connected to a pool of remote network resources. By leveraging cloud infrastructures, CAPEX and OPEX is lowered substantially.
6WINDGate™ - Powering the New Generation of Network Appliances6WIND
This document discusses 6WIND and its software product 6WINDGate. It makes the following key points:
- 6WINDGate is a software networking stack that enables high-performance networking on commodity servers through virtualization. It aims to replace dedicated hardware with generic servers.
- 6WINDGate provides fast packet processing, supports multiple hardware platforms, and has been deployed by major companies since 2007 to improve network performance.
- It allows various network appliances like routers, firewalls, and load balancers to run on a single generic server through virtualization while maintaining high performance.
Virtual Accelerator is the first product from our new Speed Series product line, which provides accelerated virtual switching and networking features for virtual infrastructures to enable Network Function Virtualization (NFV), data center virtualization and network appliance virtualization.
The Need for Complex Analytics from Forwarding Pipelines Netronome
Nic Viljoen, Research Engineer, (including Tom Tofigh and Bryan Sullivan form AT&T) presentation from ONS 2016 at Santa Clara Convention Center in Santa Clara, CA.
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...OpenStack Korea Community
6wind 솔루션의 특징은
l Linux 베어메탈 및 가상화 환경에서 최고의 패킷처리 성능을 제공 합니다.
l 다양한 멀티프로세서(Intel, Cavium, Broadcom, EZchip/Tilera 등)와 최적화된 고성능의 L2/L3/L4 네트워크 프로토콜 스택을 제공 합니다.
l Linux OS, Hypervisor, OVS, Openflow, Openstack 등과 투명하게 동작 합니다.
l 개발기간 단축 등으로 비용절감이 가능 합니다.
고객은 용도에 따라 소스코드(제품명: 6WINDGate) 또는 바이너리 솔루션의 라이선스가 가능하며,
통신/네트워크/보안/클라우드 솔루션의 성능 업그레이드 또는 고성능의 신규 솔루션 개발에 사용이 가능 합니다.
클라우드 사업자의 경우 가상스위치 가속솔루션(Virtual Accelerator)을 이용하면 서버당 운용 가능한 가상머신의 수를 증가시킬 수 있으며,
또한 각 가상머신에 더 높은 네트워크 대역폭 제공이 가능 합니다. 이를 통하여 고품질의 서비스 제공 및 경쟁력 확보가 가능하며, TCO 절감 및 ROI 극대화가 가능 합니다.
일부 클라우드 사업자의 경우 소스코드(6WINDGate)를 라이선스 하여 자사의 서비스에 필요한 다양한 솔루션들을 직접 개발하여 사용하기도 합니다.
l 소스코드 솔루션 (6WINDGate)
n 기능별로 모듈화된 76여개의 소스코드 모듈로 구성이 되어 있으며, 용도에 따라 고객이 필요한 모듈을 선택하여 라이선스 가능 합니다.
n 통신/네트웍/보안/클라우드 솔루션의 성능향상 또는 고성능 신규 솔루션 개발을 위해 사용가능 합니다.
l 바이너리 솔루션: 6WINDGate 및 DPDK를 기반으로 제작됨.
n Virtual Accelerator: 가상화 환경에서 KVM hypervisor의 네트워킹 성능가속 솔루션이며 리눅스 기반의 OVS에 비해 월등한 처리 성능 갖으며,
Fast path 기반의 IP forwarding, VRF, Filtering, NAT, VXLAN, GRE 등의 부가 기능을 포함하고 있습니다.
n Turbo Router: 리눅스 베어메탈 및 가상화 환경에서 사용 가능한 고성능의 소프트웨어 기반 라우터(vRouter) 입니다.
n Turbo IPsec gateway: 리눅스 베어메탈 및 가상화 환경에서 사용 가능한 고성능의 소프트웨어 기반 IPsec 게이트웨이(vIPsec GW)이며 Turbo Router를 포함하고 있습니다.
Cloud Network Virtualization with Juniper Contrailbuildacloud
Description: Contrail Technology will be discussed covering architecture, capabilities and use cases. It will be followed by a demonstration on current Contrail implementation on CloudStack/Openstack.
Parantap works as a Sr. Director of Solutions Engineering for Contrail Product within Juniper. Before Juniper, Parantap led the network architecture team for Microsoft Online Services (Windows Azure, MS Bing). Prior to Microsoft, Parantap worked as a core engineering manager for UUNet Technologies building Internet backbones.
SmartNICs are a new generation of intelligent Network Interface Cards (NICs). This intelligence allows NICs to offload virtual switching or other data plane functions in high-performance cloud data center servers.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
MidoNet is a distributed SDN networking solution that provides virtual networking functions like switching, routing, firewalling, and load balancing. It uses an agent-based architecture where intelligence is pushed to the edge, allowing packets to be processed locally rather than requiring centralized flow rules. This improves scalability. The agents maintain a distributed state using a cluster to share information and ensure consistency across the virtual network.
This presentation discusses implementing agentless antivirus (AV) and intrusion detection/prevention system (IDS/IPS) security solutions with VMware NSX. It covers using NSX guest introspection for agentless AV and network introspection for IPS/IDS. The presentation demonstrates how these technologies can be tied together and automated through common security policies. It also includes a demo of using NSX features like security groups and distributed firewall to quarantine systems and enforce security policies.
Secure Multi Tenant Cloud with OpenContrailPriti Desai
Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments.
This slide deck covers:
• Architectural design choices
• Implementation blueprints
• Operational best practices
that have been made to build OpenStack cloud at Symantec.
Nicolai van der Smagt has been in the business of designing, implementing and running SP networks for over 15 years. He has worked with DOCSIS, DSL and FTTH operators. Nowadays, Nicolai is helping Infradata’s pan-European customers build better access, aggregation and core networks, but his focus is on the data center, SDN, NFV and the whitebox switching revolution. His motto: “Simplicity is sophistication”.
Topic of Presentation: SDN
Language: English
Abstract:
Open source SDN that actually works -today
OpenContrail is an open source (Apache 2.0 licensed) project that provides network virtualization in the data center, using tried and tested open standards. It provides northbound APIs, integrates in Openstack or Cloudstack and is available today!
In this slot we’ll show you the architecture and ideas behind the technology and how OpenContrail enables you to avoid the pitfalls that other (closed) SDN solutions bring. If time permits we’ll also demo the technology.
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK
This document discusses smart network interface cards (NICs) and how using the Data Plane Development Kit (DPDK) framework can help accelerate next generation smartNICs. It provides an overview of smartNIC capabilities, market projections showing growth, and challenges with current smartNIC designs. The document proposes using DPDK as the networking dataplane for smartNICs to simplify deployment, improve performance when offloading tasks like Open vSwitch, and foster an open ecosystem similar to how DPDK is widely used on CPUs today. Key benefits discussed include DPDK being proven, supporting majority of networking applications, and its potential to accelerate when used on ARM-based smartNIC processors.
This document discusses the author's experiences using Open vSwitch Network Virtualization (OVN) with Kelda, a platform that encodes operational expertise in code. The author found OVN to be extremely stable but sees opportunities for improving ACL scaling and adding programming language support beyond C. Overall, OVN compares favorably to other networking solutions for containers but could benefit from more marketing efforts to increase awareness in the container community.
This document discusses cloud data center network architectures and how to scale them using Arista switches. It describes the limitations of legacy data center designs and introduces the cloud networking model. The cloud networking model with Arista switches provides benefits like lower latency, no oversubscription between racks, and the ability to scale to hundreds of racks. The document then discusses how to scale the network using layer 2, layer 3, and VXLAN designs from thousands to over a million nodes. It provides examples of scaling the number of leaf and spine switches to achieve greater node counts in a non-blocking two-tier design.
OpenStack and OpenContrail for FreeBSD platform by Michał Dubieleurobsdcon
This document provides an overview of running OpenStack and OpenContrail on the FreeBSD platform. It first discusses OpenStack components like Nova compute and network services. It then covers using OpenContrail for network virtualization, which provides overlay networking as an alternative to VLANs. This allows migration of virtual machines between physical servers while maintaining network isolation. The status of FreeBSD support for OpenStack compute and networking services is also summarized.
Virtualization Forum 2015, Praha, 7.10.2015
sál Juniper Networks
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
Contrail is an open source software defined networking (SDN) solution from Juniper Networks that provides both a virtual network controller and the ability to configure physical network hardware. It runs on commodity x86 servers, with at least three servers needed for the Contrail controllers and two or more additional servers for the data plane. Contrail can be used to create, modify and manage virtual networks for OpenStack or VMware, as well as control physical top-of-rack switches and other devices.
The document provides an overview of the Juniper SDN landscape and Contrail solution. It begins with introducing the speaker and their background. It then discusses the need for SDN due to challenges in traditional networking. The current SDN landscape includes major players like Cisco, Juniper, VMware, OpenStack and smaller startups. Contrail is positioned as Juniper's SDN overlay solution that integrates with OpenStack and uses standard protocols like BGP, MPLS and XMPP to provide multi-tenancy, overlays, routing and gateway connectivity.
Netem is a Linux kernel module that allows network emulation. It emulates properties like bandwidth limitations, delay, packet loss, duplication and reordering to test how protocols and applications perform under different network conditions. Netem works by adding queues and scheduling packets in controlled ways. It has been integrated into the Linux kernel and can be used to test new protocols without needing real network access or expensive test equipment.
6WIND - SPEED MATTERS: The Challenge 2014 Contest Winners6WIND
Winners of SPEED MATTERS: The Challenge, DPDK Contest announced on August 26, 2014 at Google headquarters in Mountain View, California during Hot Interconnects (HOTI).
Virtual Accelerator is the first product from our new Speed Series product line, which provides accelerated virtual switching and networking features for virtual infrastructures to enable Network Function Virtualization (NFV), data center virtualization and network appliance virtualization.
The Need for Complex Analytics from Forwarding Pipelines Netronome
Nic Viljoen, Research Engineer, (including Tom Tofigh and Bryan Sullivan form AT&T) presentation from ONS 2016 at Santa Clara Convention Center in Santa Clara, CA.
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...OpenStack Korea Community
6wind 솔루션의 특징은
l Linux 베어메탈 및 가상화 환경에서 최고의 패킷처리 성능을 제공 합니다.
l 다양한 멀티프로세서(Intel, Cavium, Broadcom, EZchip/Tilera 등)와 최적화된 고성능의 L2/L3/L4 네트워크 프로토콜 스택을 제공 합니다.
l Linux OS, Hypervisor, OVS, Openflow, Openstack 등과 투명하게 동작 합니다.
l 개발기간 단축 등으로 비용절감이 가능 합니다.
고객은 용도에 따라 소스코드(제품명: 6WINDGate) 또는 바이너리 솔루션의 라이선스가 가능하며,
통신/네트워크/보안/클라우드 솔루션의 성능 업그레이드 또는 고성능의 신규 솔루션 개발에 사용이 가능 합니다.
클라우드 사업자의 경우 가상스위치 가속솔루션(Virtual Accelerator)을 이용하면 서버당 운용 가능한 가상머신의 수를 증가시킬 수 있으며,
또한 각 가상머신에 더 높은 네트워크 대역폭 제공이 가능 합니다. 이를 통하여 고품질의 서비스 제공 및 경쟁력 확보가 가능하며, TCO 절감 및 ROI 극대화가 가능 합니다.
일부 클라우드 사업자의 경우 소스코드(6WINDGate)를 라이선스 하여 자사의 서비스에 필요한 다양한 솔루션들을 직접 개발하여 사용하기도 합니다.
l 소스코드 솔루션 (6WINDGate)
n 기능별로 모듈화된 76여개의 소스코드 모듈로 구성이 되어 있으며, 용도에 따라 고객이 필요한 모듈을 선택하여 라이선스 가능 합니다.
n 통신/네트웍/보안/클라우드 솔루션의 성능향상 또는 고성능 신규 솔루션 개발을 위해 사용가능 합니다.
l 바이너리 솔루션: 6WINDGate 및 DPDK를 기반으로 제작됨.
n Virtual Accelerator: 가상화 환경에서 KVM hypervisor의 네트워킹 성능가속 솔루션이며 리눅스 기반의 OVS에 비해 월등한 처리 성능 갖으며,
Fast path 기반의 IP forwarding, VRF, Filtering, NAT, VXLAN, GRE 등의 부가 기능을 포함하고 있습니다.
n Turbo Router: 리눅스 베어메탈 및 가상화 환경에서 사용 가능한 고성능의 소프트웨어 기반 라우터(vRouter) 입니다.
n Turbo IPsec gateway: 리눅스 베어메탈 및 가상화 환경에서 사용 가능한 고성능의 소프트웨어 기반 IPsec 게이트웨이(vIPsec GW)이며 Turbo Router를 포함하고 있습니다.
Cloud Network Virtualization with Juniper Contrailbuildacloud
Description: Contrail Technology will be discussed covering architecture, capabilities and use cases. It will be followed by a demonstration on current Contrail implementation on CloudStack/Openstack.
Parantap works as a Sr. Director of Solutions Engineering for Contrail Product within Juniper. Before Juniper, Parantap led the network architecture team for Microsoft Online Services (Windows Azure, MS Bing). Prior to Microsoft, Parantap worked as a core engineering manager for UUNet Technologies building Internet backbones.
SmartNICs are a new generation of intelligent Network Interface Cards (NICs). This intelligence allows NICs to offload virtual switching or other data plane functions in high-performance cloud data center servers.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
MidoNet is a distributed SDN networking solution that provides virtual networking functions like switching, routing, firewalling, and load balancing. It uses an agent-based architecture where intelligence is pushed to the edge, allowing packets to be processed locally rather than requiring centralized flow rules. This improves scalability. The agents maintain a distributed state using a cluster to share information and ensure consistency across the virtual network.
This presentation discusses implementing agentless antivirus (AV) and intrusion detection/prevention system (IDS/IPS) security solutions with VMware NSX. It covers using NSX guest introspection for agentless AV and network introspection for IPS/IDS. The presentation demonstrates how these technologies can be tied together and automated through common security policies. It also includes a demo of using NSX features like security groups and distributed firewall to quarantine systems and enforce security policies.
Secure Multi Tenant Cloud with OpenContrailPriti Desai
Building a secure multi-tenant cloud necessitates proper tenant isolation and access control. Key network and security functions must scale independently based on the dynamic resource requirements across each tenant. Additionally, On-demand and self-service provisioning are required for achieving operational efficiencies. Robust, dynamic and elastic software abstractions are imperative to support applications built to run such complex environments.
This slide deck covers:
• Architectural design choices
• Implementation blueprints
• Operational best practices
that have been made to build OpenStack cloud at Symantec.
Nicolai van der Smagt has been in the business of designing, implementing and running SP networks for over 15 years. He has worked with DOCSIS, DSL and FTTH operators. Nowadays, Nicolai is helping Infradata’s pan-European customers build better access, aggregation and core networks, but his focus is on the data center, SDN, NFV and the whitebox switching revolution. His motto: “Simplicity is sophistication”.
Topic of Presentation: SDN
Language: English
Abstract:
Open source SDN that actually works -today
OpenContrail is an open source (Apache 2.0 licensed) project that provides network virtualization in the data center, using tried and tested open standards. It provides northbound APIs, integrates in Openstack or Cloudstack and is available today!
In this slot we’ll show you the architecture and ideas behind the technology and how OpenContrail enables you to avoid the pitfalls that other (closed) SDN solutions bring. If time permits we’ll also demo the technology.
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK
This document discusses smart network interface cards (NICs) and how using the Data Plane Development Kit (DPDK) framework can help accelerate next generation smartNICs. It provides an overview of smartNIC capabilities, market projections showing growth, and challenges with current smartNIC designs. The document proposes using DPDK as the networking dataplane for smartNICs to simplify deployment, improve performance when offloading tasks like Open vSwitch, and foster an open ecosystem similar to how DPDK is widely used on CPUs today. Key benefits discussed include DPDK being proven, supporting majority of networking applications, and its potential to accelerate when used on ARM-based smartNIC processors.
This document discusses the author's experiences using Open vSwitch Network Virtualization (OVN) with Kelda, a platform that encodes operational expertise in code. The author found OVN to be extremely stable but sees opportunities for improving ACL scaling and adding programming language support beyond C. Overall, OVN compares favorably to other networking solutions for containers but could benefit from more marketing efforts to increase awareness in the container community.
This document discusses cloud data center network architectures and how to scale them using Arista switches. It describes the limitations of legacy data center designs and introduces the cloud networking model. The cloud networking model with Arista switches provides benefits like lower latency, no oversubscription between racks, and the ability to scale to hundreds of racks. The document then discusses how to scale the network using layer 2, layer 3, and VXLAN designs from thousands to over a million nodes. It provides examples of scaling the number of leaf and spine switches to achieve greater node counts in a non-blocking two-tier design.
OpenStack and OpenContrail for FreeBSD platform by Michał Dubieleurobsdcon
This document provides an overview of running OpenStack and OpenContrail on the FreeBSD platform. It first discusses OpenStack components like Nova compute and network services. It then covers using OpenContrail for network virtualization, which provides overlay networking as an alternative to VLANs. This allows migration of virtual machines between physical servers while maintaining network isolation. The status of FreeBSD support for OpenStack compute and networking services is also summarized.
Virtualization Forum 2015, Praha, 7.10.2015
sál Juniper Networks
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
Contrail is an open source software defined networking (SDN) solution from Juniper Networks that provides both a virtual network controller and the ability to configure physical network hardware. It runs on commodity x86 servers, with at least three servers needed for the Contrail controllers and two or more additional servers for the data plane. Contrail can be used to create, modify and manage virtual networks for OpenStack or VMware, as well as control physical top-of-rack switches and other devices.
The document provides an overview of the Juniper SDN landscape and Contrail solution. It begins with introducing the speaker and their background. It then discusses the need for SDN due to challenges in traditional networking. The current SDN landscape includes major players like Cisco, Juniper, VMware, OpenStack and smaller startups. Contrail is positioned as Juniper's SDN overlay solution that integrates with OpenStack and uses standard protocols like BGP, MPLS and XMPP to provide multi-tenancy, overlays, routing and gateway connectivity.
Netem is a Linux kernel module that allows network emulation. It emulates properties like bandwidth limitations, delay, packet loss, duplication and reordering to test how protocols and applications perform under different network conditions. Netem works by adding queues and scheduling packets in controlled ways. It has been integrated into the Linux kernel and can be used to test new protocols without needing real network access or expensive test equipment.
6WIND - SPEED MATTERS: The Challenge 2014 Contest Winners6WIND
Winners of SPEED MATTERS: The Challenge, DPDK Contest announced on August 26, 2014 at Google headquarters in Mountain View, California during Hot Interconnects (HOTI).
This document summarizes the history and current state of Linux bridging. It discusses how bridging has evolved from Ethernet bridging in 1985 to modern standards like 802.1aq Shortest Path Bridging. It also outlines key topics in bridging including tunneling protocols, the spanning tree protocol for avoiding loops, and security features. The status section notes that VXLAN support is in the mainline kernel but that updates to spanning tree and additional security features may be added in future kernel versions.
Stephen Hemminger discusses performance challenges in software networking. He addresses myths about throughput limits and compares hardware and software approaches. Optimization requires analyzing bottlenecks like CPU cache usage and avoiding locks. While benchmarks use ideal conditions, real systems have bursty traffic, many rules, and limited resources. The performance of software networking depends on algorithms, CPU efficiency, and handling cache behavior.
The Linux kernel acts as an interface between applications and hardware, managing system resources and providing access through system calls; it uses a monolithic design where all components run in the kernel thread for high performance but can be difficult to maintain, though Linux allows dynamic loading of modules. Device drivers interface hardware like keyboards, hard disks, and network devices with the operating system, and are implemented as loadable kernel modules that are compiled using special makefiles and registered with the kernel through system calls.
Slides from the talk at FOSS.IN/2010, Bangalore Dec 15 - 17, 2010.
Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLCSNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMP, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)
Solo Prize Winner - 6WIND Speed Matters: The Challenge Contest
Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)
Accompanying code: https://github.com/pstavirs/dpdk-ostinato
BPF: Next Generation of Programmable DatapathThomas Graf
This session covers lessons learned while exploring BPF to provide a programmable datapath based on BPF and discusses options for OVS to leverage the technology.
The document discusses Linux networking architecture and covers several key topics in 3 paragraphs or less:
It first describes the basic structure and layers of the Linux networking stack including the network device interface, network layer protocols like IP, transport layer, and sockets. It then discusses how network packets are managed in Linux through the use of socket buffers and associated functions. The document also provides an overview of the data link layer and protocols like Ethernet, PPP, and how they are implemented in Linux.
Linux device drivers act as an interface between hardware devices and user programs. They communicate with hardware devices and expose an interface to user applications through system calls. Device drivers can be loaded as kernel modules and provide access to devices through special files in the /dev directory. Common operations for drivers include handling read and write requests either through interrupt-driven or polling-based I/O.
The document discusses various data structures and functions related to network packet processing in the Linux kernel socket layer. It describes the sk_buff structure that is used to pass packets between layers. It also explains the net_device structure that represents a network interface in the kernel. When a packet is received, the interrupt handler will raise a soft IRQ for processing. The packet will then traverse various protocol layers like IP and TCP to be eventually delivered to a socket and read by a userspace application.
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
This presentation features a walk through the Linux kernel networking stack for users and developers. It will cover insights into both, existing essential networking features and recent developments and will show how to use them properly. Our starting point is the network card driver as it feeds a packet into the stack. We will follow the packet as it traverses through various subsystems such as packet filtering, routing, protocol stacks, and the socket layer. We will pause here and there to look into concepts such as networking namespaces, segmentation offloading, TCP small queues, and low latency polling and will discuss how to configure them.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...Jim St. Leger
Thomas Monjalon, 6WIND, presents on where/how to use DPDK, the DPDK ecosystem, and the DPDK.org community.
Thomas is the community maintainer of DPDK.org.
Slides introducing NFV and what is done on the subject in OpenStack and explaining the benefits of 6WIND Gate in an NFVi setup with OpenStack. Presentation done with Vincent Jardin, CTO at 6WIND.
The document discusses network function virtualization and how 6WIND's Virtual Accelerator solution addresses performance bottlenecks in virtualized network environments. It provides high-speed networking and packet processing capabilities independent of the underlying Linux kernel. This improves throughput for east-west traffic between virtual network functions and north-south traffic, allowing for higher VM and VNF densities. It also enables appliance-based network functions to be virtualized without performance limitations.
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Dan Mihai Dumitriu
OpenStack deployments for public or private clouds require overlay networking. Due to the scale and rate of change of virtual resources, it isn't practical to rely on traditional network constructs and isolation mechanims. Today's deployments require performance, resilience, and high availability to be considered truly production-ready. In this session, we deep dive into the MidoNet architecture, and process of sending a data packet across an OpenStack environment through a network overlay. A distributed architecture implements logical constructs that are used to build networks without a single point of failure, all while adding network functionality in a highly-scalable manner. Network functions are applied in a single virtual hop. By applying network services right at the ingress host, the network is free from unnecessary clogging and bottlenecks by avoiding additional hops. Packets reach their destination more efficiently with the single virtual hop. After this session, the audience will understand how distributed architectures allow efficient networking with routing decisions and network services applied at the edge. Also, the audience will understand how it is easier to scale clouds when the network intelligence is distributed.
Virtual Accelerator is a host network acceleration software that provides high performance virtual networking capabilities for virtual machines. It boosts features, optimizes resource usage, and improves virtualization for network function virtualization, data center virtualization, and network appliance virtualization. Virtual Accelerator provides line rate networking and acceleration for virtual switches and networking through features like layer 2 and 3 support, overlays, routing, security, and more. It increases virtual machine density and performance on commercial off-the-shelf servers.
Presented by Eran Bello at the "NFV & SDN Summit" held March 2014 in Paris, France
Ideal for Cloud DataCenter, Data Processing Platforms and Network Functions Virtualization
Leading SerDes Technology: High Bandwidth – Advanced Process
10/40/56Gb VPI with PCIe 3.0 Interface
10/40/56Gb High Bandwidth Switch: 36 ports of 10/40/56Gb or 64 ports of 10Gb
RDMA/RoCE technology: Ultra Low Latency Data Transfer
Software Defined Networking: SDN Switch and Control End to End Solution
Cloud Management: OpenStack integration
Paving the way to 100Gb/s Interconnect
End to End Network Interconnect for Compute/Processing and Switching
Software Defined Networking
High Bandwidth, Low Latency and Lower TCO: $/Port/Gb
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
This document introduces software defined networking (SDN) and network functions virtualization (NFV) concepts. It discusses challenges with traditional networking and how SDN and NFV address these by decoupling the control and data planes, centralizing network intelligence, and abstracting the underlying network infrastructure. It then provides examples of open source SDN technologies like OpenDaylight, Open vSwitch, and OpenStack that can be used to build programmable software-defined networks and virtualized network functions.
This document introduces software defined networking (SDN) and network functions virtualization (NFV) concepts. It discusses challenges with traditional networking and how SDN and NFV address these by decoupling the control and data planes, making the network programmable through APIs, and virtualizing network functions. It then provides examples of open source SDN platforms like OpenDaylight, Open vSwitch, and OpenStack that enable building virtual networks and service chains.
Lenovo's Cloud Network Operating System (CNOS) enables enterprise networks to scale in cloud environments. CNOS provides programmability, cloud scale, and resilience through features like event-driven multi-process architecture, fault isolation, high availability, state of the art routing protocols, and 32-way multipath scale out. CNOS works with software-defined data center tools to automate provisioning, configuration, and orchestration at large scale.
Learn more about how today's service provider's networks are built to deliver yesterday's services and how the Next generation service require a new approach with our Evolved Programmable Network's offerings will enable business transformation for new service deliveries.
The document discusses using Lagopus software-defined networking (SDN) switches to demonstrate an SDN internet exchange (IX) at the Interop Tokyo 2015 technology show. Key points:
- Two Lagopus SDN switches were deployed as the core switches in an SDN IX to enable automated provisioning of inter-autonomous system layer 2 connectivity and on-demand packet filtering between internet service providers.
- The Lagopus switches achieved an average throughput of 2Gbps with no packet drops over a week during the show, demonstrating the potential for software switches in next-generation SDNs.
- Previous work to optimize the Lagopus switch performance through techniques like hardware offloading to FPGAs helped enable its
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreinside-BigData.com
This document discusses how hardware acceleration can improve the performance of modern data centers and machine learning workloads. It covers several key points:
1) Software-defined networking allows for flexibility but suffers from performance issues without hardware offloading. Hardware acceleration is needed to gain efficiency.
2) Technologies like SR-IOV, overlay networking, and RDMA can provide direct access and high-speed networking to virtual machines and accelerate workloads. Hardware offloads from NICs improve performance.
3) Frameworks like DPDK and ASAP2 can further accelerate workloads by offloading processing to the NIC and bypassing the CPU. This improves performance without additional CPU resources.
This document discusses the transformation of the telecommunications industry towards digital technologies and software-defined networks. It specifically focuses on software-defined wide area networks (SD-WAN) and how SD-WAN is driving the adoption of network functions virtualization infrastructure (NFVi) and universal customer premise equipment (uCPE). The document provides an overview of SD-WAN and uCPE deployment options, reference architectures, and Intel's product portfolio for enabling virtualized network functions on uCPE devices.
Leveraging Network Offload to Accelerate SDN and NFV DeploymentsNetronome
Ron Renwick, Director of Product Marketing and Product Line Manager, presents "Leveraging Network Offload to Accelerate SDN and NFV Deployments," at Layer123 SDN NFV World Congress 2017. Watch the video replay on the Netronome YouTube channel: https://youtu.be/V7cRv12pDsc
This document discusses how network virtualization through NFV (network functions virtualization) can benefit rural broadband providers. NFV allows software-based virtual network functions (VNFs) to replace expensive proprietary hardware, reducing costs through operational efficiencies. It provides rural providers flexibility to innovate, quickly launch new revenue-generating services, and customize the end-user experience. NFV also offers a pay-as-you-grow model through software licensing that minimizes upfront investment risks. The document argues NFV can help rural providers compete through lower prices, while gaining agility to adapt networks as needs change over time.
This document provides an overview of Microsoft's Virtual Academy training on Hyper-V and virtualization. It outlines an introductory first half focusing on Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers Hyper-V networking technologies like VMQ, SR-IOV and the extensible switch, as well as integration with System Center and other Microsoft virtualization products. Frequently asked networking questions are also addressed at a high level.
Similar to 6WINDGate™ - Enabling NFV for Telco Architectures (20)
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen