This document discusses mobility and virtualization in the data center using LISP and OTV. It introduces LISP and its use cases for data center networking including host mobility. LISP allows IP addresses to represent identity only, maintaining the same address even if the host moves locations. This allows seamless workload mobility between data centers. The document also discusses LAN extensions using OTV to enable distributed applications across data centers while preserving non-IP communication.
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
Jason Davis, Distinguished Services Engineer , Cisco Software-Defined Networking (SDN) is an exciting new approach to network IT Service Management. If you are trying to understand what SDN is and want to understand more about Controllers, APIs, Overlays, OpenFlow and ACI, then this introductory session is for you! We will cover the genesis of SDN, what it is, what it is not, and Cisco's involvement in this space. You may also be wondering what products and services are SDN-enabled and how you can solve your unique business challenges by enhancing and differentiating your services by leveraging network programmability. Cisco's SDN-enabled Products and Services will be explained enabling you to consider your own implementations. Since SDN extends network flexibility and functionality which impacts Network Engineering and Operations teams, we'll also cover the IT Service Management impact. Finally, we'll explore what skills and capabilities are needed to take advantage of SDN and Network Programmability. Network engineers, network operation staff, IT Service Managers, IT personnel managers, and application/compute SMEs will benefit from this session.
This document provides an overview of Segment Routing (SR) and SR with IPv6 (SRv6). It discusses how SRv6 leverages the source routing capabilities of IPv6 to encode network functions and policies in packet headers. This allows the network to be programmed through injection of segment lists. The document outlines the standardization of SR through various IETF RFCs, including SRv6 network programming and the SRv6 data plane. It also provides examples of SRv6 behaviors like endpoints and how SR domains can encapsulate traffic to execute segment lists as network programs.
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof KonkowskiPROIDEA
The document discusses an SP-IWAN (Service Provider Intelligent WAN) architecture that can be offered by network operators. It proposes separating the transport and service layers, using DMVPN as an overlay and allowing applications to flow freely between MPLS and internet links using PfR. It also discusses using virtual network functions and orchestration to automate service provisioning and deliver application-aware services like monitoring, optimization and security. The architecture is meant to help operators deliver new cloud services, optimize application performance across networks and generate new revenue streams.
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
Jeff Tantsura – Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications – mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WG’s. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
This document summarizes Cisco's UCS and usNIC technologies for high performance computing. It discusses how UCS provides record-setting servers with large memory capacities, low latency Ethernet networking, and centralized management. It then describes how usNIC allows direct userspace access to network interface cards for ultra-low latency by bypassing the operating system. Benchmarks show usNIC achieving sub-microsecond application to application latency.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
Jason Davis, Distinguished Services Engineer , Cisco Software-Defined Networking (SDN) is an exciting new approach to network IT Service Management. If you are trying to understand what SDN is and want to understand more about Controllers, APIs, Overlays, OpenFlow and ACI, then this introductory session is for you! We will cover the genesis of SDN, what it is, what it is not, and Cisco's involvement in this space. You may also be wondering what products and services are SDN-enabled and how you can solve your unique business challenges by enhancing and differentiating your services by leveraging network programmability. Cisco's SDN-enabled Products and Services will be explained enabling you to consider your own implementations. Since SDN extends network flexibility and functionality which impacts Network Engineering and Operations teams, we'll also cover the IT Service Management impact. Finally, we'll explore what skills and capabilities are needed to take advantage of SDN and Network Programmability. Network engineers, network operation staff, IT Service Managers, IT personnel managers, and application/compute SMEs will benefit from this session.
This document provides an overview of Segment Routing (SR) and SR with IPv6 (SRv6). It discusses how SRv6 leverages the source routing capabilities of IPv6 to encode network functions and policies in packet headers. This allows the network to be programmed through injection of segment lists. The document outlines the standardization of SR through various IETF RFCs, including SRv6 network programming and the SRv6 data plane. It also provides examples of SRv6 behaviors like endpoints and how SR domains can encapsulate traffic to execute segment lists as network programs.
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof KonkowskiPROIDEA
The document discusses an SP-IWAN (Service Provider Intelligent WAN) architecture that can be offered by network operators. It proposes separating the transport and service layers, using DMVPN as an overlay and allowing applications to flow freely between MPLS and internet links using PfR. It also discusses using virtual network functions and orchestration to automate service provisioning and deliver application-aware services like monitoring, optimization and security. The architecture is meant to help operators deliver new cloud services, optimize application performance across networks and generate new revenue streams.
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
Jeff Tantsura – Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications – mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WG’s. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
This document summarizes Cisco's UCS and usNIC technologies for high performance computing. It discusses how UCS provides record-setting servers with large memory capacities, low latency Ethernet networking, and centralized management. It then describes how usNIC allows direct userspace access to network interface cards for ultra-low latency by bypassing the operating system. Benchmarks show usNIC achieving sub-microsecond application to application latency.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
Support for Network-based User Mobility with LISPAndrea Galvani
LISP (Locator/ID Separation Protocol) allows separating a host's identifier (EID) from its locator (RLOC), enabling mobility as the user's RLOC can change without affecting the EID. The document proposes LISP-ROAM, a network-based solution using LISP to provide connection continuity for users roaming across Wi-Fi networks. It presents a 5-step process: 1) user authentication via RADIUS, 2) retrieving the user's EID, 3) local configuration, 4) retrieving the home Map-Server details, and 5) updating the user's location. This allows maintaining TCP connections using constant EIDs as the user's RLOC is dynamically updated. Performance
This document outlines the visual objectives and topology for labs in the Cisco ICND1 certification course. It includes labs on using network tools, observing network traffic, configuring switches and routers, IP addressing, subnetting, DHCP, routing, and managing Cisco devices. The labs are designed to teach skills for interconnecting Cisco networking devices.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
This document provides an overview of Microsoft's Virtual Academy training on Hyper-V and virtualization. It outlines an introductory first half focusing on Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers Hyper-V networking technologies like VMQ, SR-IOV and the extensible switch, as well as integration with System Center and other Microsoft virtualization products. Frequently asked networking questions are also addressed at a high level.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationNetworkCollaborators
The document discusses Cisco's vision for a distributed telco cloud architecture. It covers topics such as service edge evolution through virtualization and decomposition of network functions. It also discusses the need for low latency to enable new applications and improve quality of experience. Cisco proposes building on its NFV infrastructure and cloud-scale networking solutions like ACI to create a distributed telco cloud fabric that spans central and edge locations through automation and orchestration.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
The document discusses IPv6 addressing and transitioning from IPv4 to IPv6. It describes the need for a larger address space than IPv4 due to the growing number of internet-connected devices. It then covers various IPv6 features and address types including global unicast addresses, link-local addresses, and address assignment methods like stateless autoconfiguration and DHCPv6. The document also discusses IPv6 routing protocols and transition technologies like dual stack and tunneling to help networks migrate from IPv4 to IPv6.
1) The Internet of Everything (IoE) refers to the intelligent connection of people, processes, data and things, while the Internet of Things (IoT) is the network of physical objects accessed through the Internet. 2) IoE and IoT devices generate huge amounts of data that require real-time analytics capabilities both at the network edge and in data centers. 3) Key technology trends that will change the future industry include network simplification, real-time analytics, fog computing, self-learning networks, and network functions virtualization and DevOps.
Cisco Software Defined Access - новая архитектура для корпоративных кампусных...Cisco Russia
- Зачем нужна новая архитектура?
- Общие понятия и принципы SD-Access
- Как работает SD-Access?
- Выводы и с чего начать
Запись вебинара: http://ciscoclub.ru/cisco-software-defined-access-novaya-arhitektura-dlya-korporativnyh-kampusnyh-setey-cisco
Cisco Prime for IP Next -Generation Networks (IP NGN) drastically simplifies the design, provisioning, and management of carrier - grade networks.
This comprehensive solution centralizes and automates service design, fulfillment, assurance, and performance analysis to help you lower costs while meeting high customer expectations.
Introducing Application Engineered Routing Powered by Segment RoutingCisco Service Provider
Application-Engineered Routing
Application programs the Segment Routing network to deliver end-to-end per-flow policy from DC through WAN to end-user
Adding value at your own pace
– Leveraging the existing MPLS dataplane without any change. SW upgrade only.
– Simplification, Automated 50msec FRR, per-domain and then end-to-end policies
Economic gains
– Improved service richness and velocity
– Optimized CAPEX and OPEX thanks to the simplicity of the SR architecture
Segment Routing deployments in CY15 in all the markets – WEB, SP, Entreprise
Strong partnership with lead operator group Commitment to standardization and multi-vendor support

This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
This document discusses end-to-end data center virtualization presented by Ronnie Scott in Toronto, Canada on May 30, 2013. It begins with an overview of virtualization and definitions of virtual, then outlines the agenda which includes data center virtualization, virtual networking and cloud services, virtual compute and storage, and software defined networking. It proceeds to discuss topics like front-end data center virtualization including virtual port channels, fabric extenders, and FabricPath. Virtual networking services from the Nexus 1000V are also examined including port profiles, VXLAN, and vPath for service chaining.
The document discusses Cisco's expertise in Hadoop and big data technologies. It provides an agenda for a Hadoop Summit presentation that includes topics like Hadoop optimization, scheduling and prioritization, and visibility plugins. Performance tests show the benefits of SSD drives, dual NICs, and 10GbE networking for Hadoop workloads. The presentation aims to demonstrate Cisco's solutions for high performance, scalable and highly available Hadoop deployments.
Cisco Connect Toronto 2018 dc-aci-anywhereCisco Canada
The document provides an overview and roadmap of Cisco's Application Centric Infrastructure (ACI) Multi-Site capabilities. Key points discussed include ACI Multi-Site Orchestrator for cross-fabric configuration, ACI Remote Leaf for extending ACI fabrics to remote locations, and upcoming enhancements in ACI releases 4.0 and 4.1 such as support for multi-cloud, increased scale, and inter-site Layer 3 outside networks. A timeline of ACI software releases shows continuous improvements to Multi-Site capabilities.
Nexus 5548 switches provide a scalable single layer data center design for midsize organizations. The switches support virtual port channels (vPC), Fibre Channel over Ethernet (FCoE), unified ports, and Nexus 2000 fabric extensions (FEX) to aggregate servers. This design balances cost and performance using a dedicated pair of Nexus 5548 switches for the data center core, with capabilities to transition to larger dual-tier designs.
This document provides an overview and summary of a Cisco technical presentation on delivering Cisco Next Generation SD-WAN with Viptela. The presentation introduces Cisco SD-WAN architecture and components including vManage, vSmart, vBond and WAN Edge. It discusses SD-WAN fabric establishment and common enterprise use cases such as critical application SLA, multi-cloud onramp and secure branch segmentation. The presentation also covers SD-WAN migration sequence and includes a live demo.
Deploying Applications in Today’s Network InfrastructureCisco Canada
This presentation prepares networking engineers for the fundamentals of deploying application in today’s server virtualization infrastructure. The objectives for this presentation is to share best practices, tips and tricks on how best to implement Cisco technology such as Cisco UCS and Cisco Nexus 1000v with any virtualization stack. During this presentation we will analyze and dissect two server virtualization use cases recently architected. These use cases consist of a multi -tenant private cloud and virtual desktop infrastructure for thousands of users.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
More Related Content
Similar to BRKDCT-2131-Mobility & Virt in the DC with LISP & OTV [Milan-2014].pptx
Support for Network-based User Mobility with LISPAndrea Galvani
LISP (Locator/ID Separation Protocol) allows separating a host's identifier (EID) from its locator (RLOC), enabling mobility as the user's RLOC can change without affecting the EID. The document proposes LISP-ROAM, a network-based solution using LISP to provide connection continuity for users roaming across Wi-Fi networks. It presents a 5-step process: 1) user authentication via RADIUS, 2) retrieving the user's EID, 3) local configuration, 4) retrieving the home Map-Server details, and 5) updating the user's location. This allows maintaining TCP connections using constant EIDs as the user's RLOC is dynamically updated. Performance
This document outlines the visual objectives and topology for labs in the Cisco ICND1 certification course. It includes labs on using network tools, observing network traffic, configuring switches and routers, IP addressing, subnetting, DHCP, routing, and managing Cisco devices. The labs are designed to teach skills for interconnecting Cisco networking devices.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
This document provides an overview of Microsoft's Virtual Academy training on Hyper-V and virtualization. It outlines an introductory first half focusing on Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers Hyper-V networking technologies like VMQ, SR-IOV and the extensible switch, as well as integration with System Center and other Microsoft virtualization products. Frequently asked networking questions are also addressed at a high level.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationNetworkCollaborators
The document discusses Cisco's vision for a distributed telco cloud architecture. It covers topics such as service edge evolution through virtualization and decomposition of network functions. It also discusses the need for low latency to enable new applications and improve quality of experience. Cisco proposes building on its NFV infrastructure and cloud-scale networking solutions like ACI to create a distributed telco cloud fabric that spans central and edge locations through automation and orchestration.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
The document discusses IPv6 addressing and transitioning from IPv4 to IPv6. It describes the need for a larger address space than IPv4 due to the growing number of internet-connected devices. It then covers various IPv6 features and address types including global unicast addresses, link-local addresses, and address assignment methods like stateless autoconfiguration and DHCPv6. The document also discusses IPv6 routing protocols and transition technologies like dual stack and tunneling to help networks migrate from IPv4 to IPv6.
1) The Internet of Everything (IoE) refers to the intelligent connection of people, processes, data and things, while the Internet of Things (IoT) is the network of physical objects accessed through the Internet. 2) IoE and IoT devices generate huge amounts of data that require real-time analytics capabilities both at the network edge and in data centers. 3) Key technology trends that will change the future industry include network simplification, real-time analytics, fog computing, self-learning networks, and network functions virtualization and DevOps.
Cisco Software Defined Access - новая архитектура для корпоративных кампусных...Cisco Russia
- Зачем нужна новая архитектура?
- Общие понятия и принципы SD-Access
- Как работает SD-Access?
- Выводы и с чего начать
Запись вебинара: http://ciscoclub.ru/cisco-software-defined-access-novaya-arhitektura-dlya-korporativnyh-kampusnyh-setey-cisco
Cisco Prime for IP Next -Generation Networks (IP NGN) drastically simplifies the design, provisioning, and management of carrier - grade networks.
This comprehensive solution centralizes and automates service design, fulfillment, assurance, and performance analysis to help you lower costs while meeting high customer expectations.
Introducing Application Engineered Routing Powered by Segment RoutingCisco Service Provider
Application-Engineered Routing
Application programs the Segment Routing network to deliver end-to-end per-flow policy from DC through WAN to end-user
Adding value at your own pace
– Leveraging the existing MPLS dataplane without any change. SW upgrade only.
– Simplification, Automated 50msec FRR, per-domain and then end-to-end policies
Economic gains
– Improved service richness and velocity
– Optimized CAPEX and OPEX thanks to the simplicity of the SR architecture
Segment Routing deployments in CY15 in all the markets – WEB, SP, Entreprise
Strong partnership with lead operator group Commitment to standardization and multi-vendor support

This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
This document discusses end-to-end data center virtualization presented by Ronnie Scott in Toronto, Canada on May 30, 2013. It begins with an overview of virtualization and definitions of virtual, then outlines the agenda which includes data center virtualization, virtual networking and cloud services, virtual compute and storage, and software defined networking. It proceeds to discuss topics like front-end data center virtualization including virtual port channels, fabric extenders, and FabricPath. Virtual networking services from the Nexus 1000V are also examined including port profiles, VXLAN, and vPath for service chaining.
The document discusses Cisco's expertise in Hadoop and big data technologies. It provides an agenda for a Hadoop Summit presentation that includes topics like Hadoop optimization, scheduling and prioritization, and visibility plugins. Performance tests show the benefits of SSD drives, dual NICs, and 10GbE networking for Hadoop workloads. The presentation aims to demonstrate Cisco's solutions for high performance, scalable and highly available Hadoop deployments.
Cisco Connect Toronto 2018 dc-aci-anywhereCisco Canada
The document provides an overview and roadmap of Cisco's Application Centric Infrastructure (ACI) Multi-Site capabilities. Key points discussed include ACI Multi-Site Orchestrator for cross-fabric configuration, ACI Remote Leaf for extending ACI fabrics to remote locations, and upcoming enhancements in ACI releases 4.0 and 4.1 such as support for multi-cloud, increased scale, and inter-site Layer 3 outside networks. A timeline of ACI software releases shows continuous improvements to Multi-Site capabilities.
Nexus 5548 switches provide a scalable single layer data center design for midsize organizations. The switches support virtual port channels (vPC), Fibre Channel over Ethernet (FCoE), unified ports, and Nexus 2000 fabric extensions (FEX) to aggregate servers. This design balances cost and performance using a dedicated pair of Nexus 5548 switches for the data center core, with capabilities to transition to larger dual-tier designs.
This document provides an overview and summary of a Cisco technical presentation on delivering Cisco Next Generation SD-WAN with Viptela. The presentation introduces Cisco SD-WAN architecture and components including vManage, vSmart, vBond and WAN Edge. It discusses SD-WAN fabric establishment and common enterprise use cases such as critical application SLA, multi-cloud onramp and secure branch segmentation. The presentation also covers SD-WAN migration sequence and includes a live demo.
Deploying Applications in Today’s Network InfrastructureCisco Canada
This presentation prepares networking engineers for the fundamentals of deploying application in today’s server virtualization infrastructure. The objectives for this presentation is to share best practices, tips and tricks on how best to implement Cisco technology such as Cisco UCS and Cisco Nexus 1000v with any virtualization stack. During this presentation we will analyze and dissect two server virtualization use cases recently architected. These use cases consist of a multi -tenant private cloud and virtual desktop infrastructure for thousands of users.
Similar to BRKDCT-2131-Mobility & Virt in the DC with LISP & OTV [Milan-2014].pptx (20)
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
13. West-DC East-DC
Non-LISP Sites
PITR
LISP Site
IP Network
EID
RLOC LISP Encap/Decap
ITR
Mapping DB
5.1.1.1
5.3.3.3
1.1.1.1
10.2.0.0/24
5.2.2.2
ETR
2.1.1.1 2.1.2.1
Branch Routers
ip lisp itr-etr
ip lisp ITR map-resolver 5.3.3.3
DC Aggregation Routers
ip lisp itr-etr
ip lisp database-mapping 10.2.0.0/24 2.1.1.1 p1 w50
ip lisp database-mapping 10.2.0.0/24 2.1.2.1 p1 w50
ip lisp ETR map-server 5.1.1.1 key s3cr3t
ip lisp ETR map-server 5.2.2.2 key s3cr3t
Border Routers Between Backbones
ip lisp proxy-itr
ip lisp ITR map-resolver 5.3.3.3
Servers
ip lisp map-resolver
ip lisp map-server
lisp site west-DC
authentication-key 0 s3cr3t
eid-prefix 10.2.0.0/24
Usually Devices Will Be Configured as ITRs and ETRs
to Handle Traffic in Both Directions;
We Illustrate Only One Direction for Simplicity
13
Basic LISP Configuration