L4-L7 services for SDN and NVF by Youcef Laribibuildacloud
In this talk, we will discuss how L4-L7 devices can integrate in various SDN architectures, discuss benefits and some of the challenges that such integration represents. We will also talk about how SDN and NFV relate, and what are the different challenges to successfully deploy L4-L7 devices as Virtual Network Functions (VNFs) or provide such services to the NFV Infrastructure (VIM).
Bio
Youcef Laribi is a Principal Architect in the Delivery Networks BU at Citrix. He is responsible for driving the integration projects of the NetScaler ADC product with several Cloud, SDN and Automation environments including OpenStack, CloudStack, VMware NSX and Cisco ACI. He is also the Citrix representative on the OpenDaylight Technical Steering Committee. His background is mainly in Operating Systems and Distributed Systems, and he worked on several middleware technologies from DCE and CORBA in the early days, to J2EE and .NET to SOA and micro-services today. Youcef speaks 4 languages and holds a PhD and an MSc in Computer Science from the French INPG Institute in Grenoble, France.
L4-L7 services for SDN and NVF by Youcef Laribibuildacloud
In this talk, we will discuss how L4-L7 devices can integrate in various SDN architectures, discuss benefits and some of the challenges that such integration represents. We will also talk about how SDN and NFV relate, and what are the different challenges to successfully deploy L4-L7 devices as Virtual Network Functions (VNFs) or provide such services to the NFV Infrastructure (VIM).
Bio
Youcef Laribi is a Principal Architect in the Delivery Networks BU at Citrix. He is responsible for driving the integration projects of the NetScaler ADC product with several Cloud, SDN and Automation environments including OpenStack, CloudStack, VMware NSX and Cisco ACI. He is also the Citrix representative on the OpenDaylight Technical Steering Committee. His background is mainly in Operating Systems and Distributed Systems, and he worked on several middleware technologies from DCE and CORBA in the early days, to J2EE and .NET to SOA and micro-services today. Youcef speaks 4 languages and holds a PhD and an MSc in Computer Science from the French INPG Institute in Grenoble, France.
NFV workloads pose challenges for IIAS providers. Learn how hardware performance enhancements (DPA&EPA) by Intel, integrated with virtualization providers, can be an NFV enabler, and how advanced orchestration by TOSCA and Cloudify can put the right VNF on the right hardware and coordinate complex deployments.
Simple, Scalable and Secure Networking for Data Centers with Project CalicoEmma Gordon
Traditional overlay networks using VXLAN are more complicated to setup and diagnose than is necessary for the majority of data centers. Calico offers an alternative Layer 3 solution - aside from simplicity, this also offers benefits in terms of improved scale and security.
These are the Calico slides from the SDN Switzerland meetup on 13/11/2015,
Lisa Caywood and Colin Dixon's presentation at the 2017 Open Networking Summit.
OpenDaylight has become a nexus for open source integration, creating a new open networking stack and enabling a new generation of open source, agile IT infrastructure. The fifth “Boron” release provides new tooling and documentation to support application developers, as well as greater integration with industry frameworks from OPNFV and OpenStack to CORD and Atrium. Boron also brings a practical focus on two leading types of deployments: (1) direct control of virtual switches to provide network virtualization and NFV and (2) management and orchestration of existing networks to provide new features and automation. This talk will cover trends in open SDN and cloud networking, with a focus on Boron milestones. In particular, it dives into the architecture across OpenStack and OpenDaylight to enable OpenStack service function chaining support in OpenDaylight.
Introducing ONAP for OpenStack St Louis Meetupdjzook
An introduction to the Open Networking Automation Platform (ONAP) a new Linux Foundation Project for SDN/NFV, as presented to the OpenStack St Louis Meetup on June 20, 2017
Martin Šuňal's presentation from Open Networking Summit 2017.
Network Function Virtualization (NFV) and Service Function Chaining (SFC) have been hot topics for some time, but many users are still finding it difficult to adopt these concepts in the real world. Since network functions are getting virtualized/containerized and service chaining is a requirement in many NFV use cases, there is a need for container service chaining. This presentation discusses problems with existing approaches, potential solutions and benefits of container service chaining.
Webinar - Relying on Bare Metal to manage your workloadsScaleway
Upon leaving this webinar, you will be able to distinguish the different types of workloads, but you will also be capable of testing your infrastructure allowing you to better manage its peak loads.
Read the blog post here: http://cloudify.co/2017/10/15/tosca-onap-service-orchestration-cloudify-aria/
This presentation dives into the different concepts in TOSCA for ONAP, including types, interfaces, relationships, service modeling, and more.
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Networking Summit
Prem Sankar's presentation from the 2017 Open Networking Summit.
Microservice is gaining increased adoption in the Telco NFV world. It is key to understand the design and deployment methodologies involved in developing Microservice based VNF. This talk provides an opensource practitioner approach to building and deploying a Microservice based VNF and includes the following: - Design patterns, workflow models - Design models for VNF placement, capacity management, scale-in/out and resiliency - Deployment considerations that includes handing of scale and fault tolerant VNF using well known Opensource tools
Ildikó Váncsa, Chris Price, and Carsten Rossenhövel's presentation at the 2017 Open Networking Summit.
Communications service providers (CSPs) have a wide range of options when building virtualized services from the ground up including multiple choices for each functional block in the ETSI NFV reference architecture. CSPs prefer heterogeneous systems with building blocks from different vendors including open source software; for such deployments interoperability becomes a crucial requirement.
OpenStack, as the NFVI and VIM, serves as a widely used cloud platform for telecom and NFV use cases. As a common base, OpenStack offers the means for vendors and other open source projects to ease the interoperability challenge by providing a set of open API’s while focusing on upgradeability and backward compatibility.
However, when it comes to productization, interoperability testing often falls short and is sometimes left to the carrier as shown by the testing programs actively run by no fewer than 10 organizations today.
Join Carsten Rossenhövel from the European Advanced Networking Test Center (EANTC) and the rapporteur (editor) of ETSI’s NFV interoperability standards, Ildikó Váncsa from the OpenStack Foundation, and Chris Price, Ericsson and OpenStack board director to learn more about
The ETSI NFV Release 2 interoperability testing activities - standardization and recently completed ETSI PlugTest. Over 40 commercial and open source implementations were tested for interoperability, including 20 virtual network functions, 10 management and orchestration solutions and 10 NFV platforms.
The New IP Agency (NIA) interoperability testing campaigns of commercial NFV implementations executed by EANTC, focusing on results, lessons learned and recommendations.
How vendors and open source projects are stepping up to the challenge, realizing they must work together.
How to stay up-to-date with OpenStack releases and the community.
How to get involved to ensure you are aware of the latest developments and contribute what you need to OpenStack.
What will I learn from attending this session?
CSPs, open source projects and vendors alike will learn more about the recent ETSI PlugTest and NIA-commissioned interoperability testing, their results and how to architect full NFV solutions that will work together. Interoperability API tests and associated marks from OpenStack will be covered, as well as features to help stay current on OpenStack releases. Attendees will also hear from Ericsson about a vendor’s point of view, and how other projects such a OPNFV are evolving and expanding in scope to address this challenge.
A key tenant of moving NFV from a Proof of Concept (Poc) to deployment is testing. NFV solutions that pull from open source projects such as OPNFV, OpenStack, OpenDaylight, and others must be integrated and tested in an environment that fully supports the performance and availability requirements of service provider networks. Testing criteria and solutions are also required to ensure NFV interoperability between hardware and software systems that comprise NFV. In this tutorial, you’ll learn best practices for open source NFV testing, including: methodology; mapping to ETSI NFV use-case/s; open source project integration; testing dashboards; Continuous Integration and Continuous Deployment (CI/CD); and testing acceleration.
Open Source, Open Architecture, Open Standards NFV MANOCloudify Community
MANO, the management and orchestration layer in NFV, is a critical element for the success of NFV deployments.
This talk will focus on three important aspects for effectively implementing MANO in an open source manner, to enable the easy migration and management of networks in any cloud:
- Open source, community-based orchestration such as Open-O and ARIA
- Open architecture using technology agnostic principles
- Open standards for modeling and orchestration (such as TOSCA)
In this talk, I will explain how to use open source tools to migrate networks to the cloud and demo NFV orchestration with TOSCA in a multi-VIM environment.
NFV workloads pose challenges for IIAS providers. Learn how hardware performance enhancements (DPA&EPA) by Intel, integrated with virtualization providers, can be an NFV enabler, and how advanced orchestration by TOSCA and Cloudify can put the right VNF on the right hardware and coordinate complex deployments.
Simple, Scalable and Secure Networking for Data Centers with Project CalicoEmma Gordon
Traditional overlay networks using VXLAN are more complicated to setup and diagnose than is necessary for the majority of data centers. Calico offers an alternative Layer 3 solution - aside from simplicity, this also offers benefits in terms of improved scale and security.
These are the Calico slides from the SDN Switzerland meetup on 13/11/2015,
Lisa Caywood and Colin Dixon's presentation at the 2017 Open Networking Summit.
OpenDaylight has become a nexus for open source integration, creating a new open networking stack and enabling a new generation of open source, agile IT infrastructure. The fifth “Boron” release provides new tooling and documentation to support application developers, as well as greater integration with industry frameworks from OPNFV and OpenStack to CORD and Atrium. Boron also brings a practical focus on two leading types of deployments: (1) direct control of virtual switches to provide network virtualization and NFV and (2) management and orchestration of existing networks to provide new features and automation. This talk will cover trends in open SDN and cloud networking, with a focus on Boron milestones. In particular, it dives into the architecture across OpenStack and OpenDaylight to enable OpenStack service function chaining support in OpenDaylight.
Introducing ONAP for OpenStack St Louis Meetupdjzook
An introduction to the Open Networking Automation Platform (ONAP) a new Linux Foundation Project for SDN/NFV, as presented to the OpenStack St Louis Meetup on June 20, 2017
Martin Šuňal's presentation from Open Networking Summit 2017.
Network Function Virtualization (NFV) and Service Function Chaining (SFC) have been hot topics for some time, but many users are still finding it difficult to adopt these concepts in the real world. Since network functions are getting virtualized/containerized and service chaining is a requirement in many NFV use cases, there is a need for container service chaining. This presentation discusses problems with existing approaches, potential solutions and benefits of container service chaining.
Webinar - Relying on Bare Metal to manage your workloadsScaleway
Upon leaving this webinar, you will be able to distinguish the different types of workloads, but you will also be capable of testing your infrastructure allowing you to better manage its peak loads.
Read the blog post here: http://cloudify.co/2017/10/15/tosca-onap-service-orchestration-cloudify-aria/
This presentation dives into the different concepts in TOSCA for ONAP, including types, interfaces, relationships, service modeling, and more.
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Networking Summit
Prem Sankar's presentation from the 2017 Open Networking Summit.
Microservice is gaining increased adoption in the Telco NFV world. It is key to understand the design and deployment methodologies involved in developing Microservice based VNF. This talk provides an opensource practitioner approach to building and deploying a Microservice based VNF and includes the following: - Design patterns, workflow models - Design models for VNF placement, capacity management, scale-in/out and resiliency - Deployment considerations that includes handing of scale and fault tolerant VNF using well known Opensource tools
Ildikó Váncsa, Chris Price, and Carsten Rossenhövel's presentation at the 2017 Open Networking Summit.
Communications service providers (CSPs) have a wide range of options when building virtualized services from the ground up including multiple choices for each functional block in the ETSI NFV reference architecture. CSPs prefer heterogeneous systems with building blocks from different vendors including open source software; for such deployments interoperability becomes a crucial requirement.
OpenStack, as the NFVI and VIM, serves as a widely used cloud platform for telecom and NFV use cases. As a common base, OpenStack offers the means for vendors and other open source projects to ease the interoperability challenge by providing a set of open API’s while focusing on upgradeability and backward compatibility.
However, when it comes to productization, interoperability testing often falls short and is sometimes left to the carrier as shown by the testing programs actively run by no fewer than 10 organizations today.
Join Carsten Rossenhövel from the European Advanced Networking Test Center (EANTC) and the rapporteur (editor) of ETSI’s NFV interoperability standards, Ildikó Váncsa from the OpenStack Foundation, and Chris Price, Ericsson and OpenStack board director to learn more about
The ETSI NFV Release 2 interoperability testing activities - standardization and recently completed ETSI PlugTest. Over 40 commercial and open source implementations were tested for interoperability, including 20 virtual network functions, 10 management and orchestration solutions and 10 NFV platforms.
The New IP Agency (NIA) interoperability testing campaigns of commercial NFV implementations executed by EANTC, focusing on results, lessons learned and recommendations.
How vendors and open source projects are stepping up to the challenge, realizing they must work together.
How to stay up-to-date with OpenStack releases and the community.
How to get involved to ensure you are aware of the latest developments and contribute what you need to OpenStack.
What will I learn from attending this session?
CSPs, open source projects and vendors alike will learn more about the recent ETSI PlugTest and NIA-commissioned interoperability testing, their results and how to architect full NFV solutions that will work together. Interoperability API tests and associated marks from OpenStack will be covered, as well as features to help stay current on OpenStack releases. Attendees will also hear from Ericsson about a vendor’s point of view, and how other projects such a OPNFV are evolving and expanding in scope to address this challenge.
A key tenant of moving NFV from a Proof of Concept (Poc) to deployment is testing. NFV solutions that pull from open source projects such as OPNFV, OpenStack, OpenDaylight, and others must be integrated and tested in an environment that fully supports the performance and availability requirements of service provider networks. Testing criteria and solutions are also required to ensure NFV interoperability between hardware and software systems that comprise NFV. In this tutorial, you’ll learn best practices for open source NFV testing, including: methodology; mapping to ETSI NFV use-case/s; open source project integration; testing dashboards; Continuous Integration and Continuous Deployment (CI/CD); and testing acceleration.
Open Source, Open Architecture, Open Standards NFV MANOCloudify Community
MANO, the management and orchestration layer in NFV, is a critical element for the success of NFV deployments.
This talk will focus on three important aspects for effectively implementing MANO in an open source manner, to enable the easy migration and management of networks in any cloud:
- Open source, community-based orchestration such as Open-O and ARIA
- Open architecture using technology agnostic principles
- Open standards for modeling and orchestration (such as TOSCA)
In this talk, I will explain how to use open source tools to migrate networks to the cloud and demo NFV orchestration with TOSCA in a multi-VIM environment.
Pubcon 2016: Leveraging Influencers for User AcquisitionMichelle LeBlanc
With organic reach dropping and social search growing in importance, influencers are a highly effective way to reach your marketing goals. Learn about the different types of influencers and how to engage your audience with compelling content-driven influencer programs. Facebook tactics in particular are covered.
CHRISTIAN SUPERNATURAL TEACHINGS, BIBLE CLASS LESSONS, GOSPELS BY LEADER OLUMBA OLUMBA OBU, THE SUPERNATURAL TEACHER AND SOLE SPIRITUAL HEAD, BROTHERHOOD OF THE CROSS AND STAR
Company and market analysis of cadbury has been done, alongwith a forecast of demand faced by cadbury in the year 2015. Methods used to forecast demand are trend projection and regression. We also give recommendations for profitability in the end.
VXLAN is a point to point, UDP-based "tunneling" protocol, that enables L2 encapsulation over an L3 "undernet", while also allowing up to 16 million Virtual Networks. One challenge with deploying VXLAN is that by default VXLAN requires multicast support for Broadcast, Unknown and Multi-cast packets. Often this is not possible in customer networks. An alternative approach is to use the Service Node concept where dedicated node(s)/process(es) are responsible for flooding Broadcast, Unknown, and Multicast packets throughout a network.
This removes the need for multi-cast, and greatly simplifies network configuration. However, it does require a scalable, and highly available implementation.
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
Tutorial at ONUG Spring 2015 on Network and Service Virtualization. The tutorial covers three converging trends 1) Network virtualization, 2) Service virtualization, 3) overlay networking for Docker and OpenStack. The talk concludes with pointers to the hands-on portion of the tutorial that uses LorisPack, and the operational lessons learned.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld
VMworld 2013
Richard Cockett, VMware
Umesh Goyal, VMware Software India Pvt ltd
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
2. Technical Forum
CloudVision, VXLAN
What’s Next ?
Next ?
Optimisation of
the
resource pool
40%
VM
Decrease &
automate
Deployment time
VM VM
Remove islands of
service connectivity
VM
Operational
Efficiency
P P P P
• Undefined SDN strategy ?
• Team interactions,Skills,Planning,
Strategy, Processes not ready ?
What Orchestration
platform choices ?
‘BYOC’
What corporate
Challenges ?
…But you are ready
C
6C
L
FG O ]
?
6
3. Technical Forum
VXLAN Deployment Solutions
VTEP-1
Openstack
NSX, Nuage, …
Automated VXLAN without
3rd party controller
Automation and integration
with 3rd party controller
Small Scale DC and DCI solution
Head Replication (HER)
• Manually configured VTEP-flood
list
• Traffic flooded via the defined
flood-list.
• Flow-based MAC learning
• No need for Multicast in the IP
fabric
• Suitable for DCI solutions and
small scale intra-DC solution due
to manual config
CVX standalone
• CVX provides centralized database
of all VXLAN state.
• MAC address learning via the
CVX, flow-based learning optional
• HER flood-list automatically
populated by the CVX
• No need for Multicast in the IP
fabric
• Scalable for intra-DC solutions
where a level of automation is
required
CVX + 3rd party integration
• Centralized database of CVX
shared with third-party controller
(NSX, OpenStack, Nuage, etc)
• Distributed MAC address learning
between Software and hardware
VTEPs.
• VNI provisioning via centralized
controller
• Solution for scalable DCs with
HW to SW VTEP automation
CloudVision
eXchange
CloudVision
eXchange
7. Technical Forum
At scale manual configuration of HER flood-list can be arduous,potential for excessive traffic flooding
during learning processes
VXLAN Control-Plane – Unicast Replication
Host 4
VTEP 4
VNI
5000
VTEP 1
Host 1 Host 2
VTEP 2 VTEP 3
Host 3
VTEP flood list on VTEP 1
VNI 5000 à VTEP 3
VNI 5000 à VTEP 4
VTEP flood list on VTEP 3
VNI 5000 à VTEP 1
VNI 5000 à VTEP 4
VTEP flood list on VTEP 4
VNI 5000 à VTEP 1
VNI 5000 à VTEP 31
2
3
5 5
4 4
1. VTEP flood-list - manually configured on
each VTEP for each VNI
2. BUM traffic received from a locally attached
node on VTEP-1
3. VTEP-1 replicates the BUM traffic for each
VTEP in the flood-list of the associated VNI
4. Individual unicasts frames are sent on the
wire to each VTEP in theVNI
5. RemoteVTEPs receive BUM traffic
6. RemoteVTEP’s learn inner source MAC and
map it to the outer SRC IP (remoteVTEP of
origin)
Leaf 2 Leaf 3 Leaf 4Leaf 1
8. Technical Forum
CVX – simplified provision and learning
Automated flood-list configuration and MAC address distribution
VXLAN Control-Plane – CVX
1. MAC learnt locally onVTEP 1 From
generated host traffic
2. Local VXLAN states are mounted by
CVX
3. CVX has a global view of each VTEP
- local VXLAN MAC address tables, VNI
configured on each VTEP
4. Remote MACs for locally configured
VNI Written to local VXLAN table
5. Remote MAC added to local
VXLAN hardware tableHost 4, MAC D
VTEP 4
VNI 5000
VTEP 1
Host1, MAC A Host 2
VTEP 2 VTEP 3
Host 3
1
2
5 5
4
Network Database
VTEP 1: VNI 5000:MAC A
VTEP 4: VNI 5000:MAC D
VXLAN table
VNI 5000 MAC A VTEP 1
VNI 5000 MAC D VTEP 4
CloudVision
eXchange
3
Leaf 2Leaf 1 Leaf 3 Leaf 4