Cisco's Virtual Managed Services (VMS) platform allows service providers to orchestrate and manage SD-WAN and NFV services from the cloud. The demo showed how VMS can rapidly deploy SD-WAN services across multiple sites with MPLS, internet, and LTE links using Cisco routers. VMS provides a multi-tenant cloud management platform that reduces costs and time to market for service providers while improving services for enterprise customers.
AN UPDATED VERSION OF THIS IS AVAILABLE HERE: https://www.slideshare.net/3G4GLtd/beginners-5g-terminology-updated-feb-2019
A short video looking at 5G terminology that is being used in standards and specifications.
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
5G is designed to serve an unprecedented range of capabilities with a single global standard. With enhanced mobile broadband (eMBB), massive IoT (mIoT), and mission-critical IoT, the three pillars of 5G represent extremes in performance and associated complexity. For IoT services, NB-IoT and eMTC devices prioritize low power consumption and the lowest complexity for wide-area deployments (LPWA), while enhanced ultra-reliable, low-latency communication (eURLLC), along with time-sensitive networking (TSN), delivers the most stringent use case requirements. But there exists an opportunity to more efficiently address a broad range of mid-tier applications with capabilities ranging between these extremes.
In 5G NR Release 17, 3GPP introduced a new tier of reduced capability (RedCap) devices, also known as NR-Light. It is a new device platform that bridges the capability and complexity gap between the extremes in 5G today with an optimized design for mid-tier use cases. With the recent standards completion, NR-Light is set to efficiently expand the 5G universe to connect new frontiers.
Download this presentation to learn:
• What NR-Light is and why it can herald the next wave of 5G expansion
• How NR-Light is accelerating the growth of the connected intelligent edge
• Why NR-Light is a suitable 5G migration path for mid-tier LTE devices
The document discusses the evolution of network architectures from 2G to 5G. It describes the key network elements and interfaces in 2G, 3G, 4G and 5G networks. The 5G network architecture uses both a reference point architecture for the user plane and a service-based architecture for the control plane. The main network functions in the 5G control plane are the AMF, SMF, UDM, AUSF, NSSF, NEF, NRF and UDR. The UPF is the main network element in the user plane.
- The document discusses 5G connectivity options and use cases, as well as 5G deployment scenarios and network architecture. It focuses on Non-Standalone (NSA) deployment using Dual Connectivity with an LTE anchor (Option 3).
- Key aspects covered include the EN-DC architecture with separate logical entities below the PDCP layer, security considerations for both control and user plane traffic, and 5G radio access decision logic. Configuration guidelines are also provided for the core network and radio access network elements needed to support 5G NSA.
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
3GPP Packet Core Towards 5G Communication SystemsOfinno
This presentation provides an overview of 3GPP packet core and 5G systems. Some enabler features are outlined, such as network slicing. This presentation was prepared for the 20th Annual International Conference on Next Generation Internet and Related Technologies Net-Centric 2017 that was held at George Mason University.
AN UPDATED VERSION OF THIS IS AVAILABLE HERE: https://www.slideshare.net/3G4GLtd/beginners-5g-terminology-updated-feb-2019
A short video looking at 5G terminology that is being used in standards and specifications.
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
5G is designed to serve an unprecedented range of capabilities with a single global standard. With enhanced mobile broadband (eMBB), massive IoT (mIoT), and mission-critical IoT, the three pillars of 5G represent extremes in performance and associated complexity. For IoT services, NB-IoT and eMTC devices prioritize low power consumption and the lowest complexity for wide-area deployments (LPWA), while enhanced ultra-reliable, low-latency communication (eURLLC), along with time-sensitive networking (TSN), delivers the most stringent use case requirements. But there exists an opportunity to more efficiently address a broad range of mid-tier applications with capabilities ranging between these extremes.
In 5G NR Release 17, 3GPP introduced a new tier of reduced capability (RedCap) devices, also known as NR-Light. It is a new device platform that bridges the capability and complexity gap between the extremes in 5G today with an optimized design for mid-tier use cases. With the recent standards completion, NR-Light is set to efficiently expand the 5G universe to connect new frontiers.
Download this presentation to learn:
• What NR-Light is and why it can herald the next wave of 5G expansion
• How NR-Light is accelerating the growth of the connected intelligent edge
• Why NR-Light is a suitable 5G migration path for mid-tier LTE devices
The document discusses the evolution of network architectures from 2G to 5G. It describes the key network elements and interfaces in 2G, 3G, 4G and 5G networks. The 5G network architecture uses both a reference point architecture for the user plane and a service-based architecture for the control plane. The main network functions in the 5G control plane are the AMF, SMF, UDM, AUSF, NSSF, NEF, NRF and UDR. The UPF is the main network element in the user plane.
- The document discusses 5G connectivity options and use cases, as well as 5G deployment scenarios and network architecture. It focuses on Non-Standalone (NSA) deployment using Dual Connectivity with an LTE anchor (Option 3).
- Key aspects covered include the EN-DC architecture with separate logical entities below the PDCP layer, security considerations for both control and user plane traffic, and 5G radio access decision logic. Configuration guidelines are also provided for the core network and radio access network elements needed to support 5G NSA.
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
3GPP Packet Core Towards 5G Communication SystemsOfinno
This presentation provides an overview of 3GPP packet core and 5G systems. Some enabler features are outlined, such as network slicing. This presentation was prepared for the 20th Annual International Conference on Next Generation Internet and Related Technologies Net-Centric 2017 that was held at George Mason University.
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
This presentations contains introductory to Intermediate topics on Ericsson MKVI SGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in SGSN.
This document provides details on Ericsson's 5G training program for 2018, including an overview of course topics, learning levels, and individual course descriptions. The training program covers 5G fundamentals, core network topics like 5G EPC and virtualization, RAN topics like massive MIMO and beamforming, transport, and management/orchestration. Course durations range from video sessions to 5-day classroom instruction, and include both virtual and in-person learning options. Contact information is provided to learn more about Ericsson's training portfolio.
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
To meet the new connectivity requirements of the emerging IoT segment, 3GPP has taken evolutionary steps on both the network side and the device side. A single technology or solution cannot be ideal to all the different potential IoT applications, market situations and spectrum availability. As a result, the 3GPP standardizing several technologies, including Extended Coverage GSM (EC-GSM), LTE-M and NB-IoT.
LTE-M, NB-IoT and EC-GSM are all superior solutions to meet IoT requirements as a family of solutions, and can complement each other based on technology availability, use case requirements and deployment scenarios. The evolution for these technologies is shown in figure #5. Technical studies and normative work for the support of Machine Type Communication (MTC) as part of 3GPP LTE specifications for RAN began in 3GPP Release 12 and are continuing with the goals of developing features optimized for devices with MTC traffic.
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
“Advantech’s Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.” Said Advantech Vice President of Networks & Communications Group, Ween Niu. “In the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.”
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantech’s corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Overview 5G NR Radio Protocols by Intel Eiko Seidel
Very nice overview of the 5G Radio Interface protocol as defined by 3GPP in NR Rel.15. The document was submitted to the 3GPP workshop on ITU submission in Brussels on Oct 24, 2018.
A high level introduction to Non-Standalone and Standalone 5G and what benefits will they bring to the businesses.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The document discusses 5G network slicing and artificial intelligence as a service for big data value. It outlines that 5G systems will enable network slicing to support different industries and use cases with varying latency, bandwidth and capacity needs. By 2025, over 1.2 billion 5G connections are projected globally with 5G covering 40% of the population.
This document discusses the GPON (Gigabit-capable Passive Optical Network) technology for fiber access networks. Some key points:
- GPON supports high-bandwidth, long-reach (up to 20km), and triple-play services, making it widely adopted by carriers.
- It uses a point-to-multipoint architecture with a single optical fiber shared between an OLT and multiple ONUs using passive splitters.
- Wavelength division multiplexing is used with downstream at 1490nm and upstream at 1310nm. Time division multiple access manages upstream bandwidth sharing between ONUs.
- Typical deployments include fiber to the home (FTTH),
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
The OpenRAN architecture, empowered by intelligence and openness principles, is the foundation for building the virtualized RAN on open hardware and cloud, with embedded AI-powered radio control. The architecture is based on standards defined by O-RAN Alliance, which completely support and are complementary to standards promoted by 3GPP and other industry standards organizations.
The document discusses the X2 interface and X2 handover procedure in LTE networks. The X2 interface connects two neighboring eNodeBs and establishes an X2 connection through the X2 setup procedure. The X2 handover procedure allows handing over a UE's connection from a source eNodeB to a target eNodeB, involving preparation where the target allocates resources and the UE connects to it, and execution including a path switch to route data to the target eNodeB. Key information like UE context and bearers is exchanged between eNodeBs through the X2 interface to enable smooth handover.
Propelling 5G forward: a closer look at 3GPP Release-16Qualcomm Research
This presentation summarizes the 3GPP 5G NR Release 16 projects, including eMBB enhancements, unlicensed, sidelink, IAB, TSN, eURLLC, private networks, C-V2X, and more...
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document discusses 5G NR RRC inactive state. It begins by introducing the NR RRC states of CONNECTED, IDLE, and INACTIVE. It then references 3GPP specifications that define the inactive state and its establishment and release.
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
The document discusses 5G radio access network (RAN) fundamentals and architectures. It describes how the RAN has evolved from previous generations with more distributed and virtualized architectures in 5G. Key aspects of 5G RAN covered include centralized/virtualized RAN, Open RAN specifications, functional splits, and new concepts like network slicing and multi-access edge computing. Example use cases are also mentioned.
Beginners: 5G Terminology (Updated - Feb 2019)3G4G
This document discusses 5G terminology and deployment options. It provides an overview of the evolution of mobile technology standards over time. It explains the differences between 4G LTE and 5G NR networks, as well as various options for non-standalone and standalone 5G network deployment and the migration strategies between these options. Key 5G concepts like gNBs, NG-RAN architecture and the 5G system architecture are also summarized.
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Canada
- Cisco SD-WAN is Cisco's next generation SD-WAN solution which will integrate Cisco's routing platforms and provide innovation in areas like cloud integration, security segmentation, and service insertion capabilities.
- The solution leverages Cisco's acquisition of Viptela to provide a cloud-managed SD-WAN platform that can optimize traffic delivery to cloud applications and data centers while ensuring security and application-aware policies across hybrid WAN transports including broadband, LTE, and MPLS networks.
- Key capabilities of Cisco SD-WAN include cloud on-ramp technologies to optimize access to SaaS and IaaS services, arbitrary VPN topologies to meet compliance needs, and zero touch provisioning of edge devices
Automate programmable fabric in seconds with an open standards based solutionTony Antony
Discover how how the standards-based Cisco Programmable Fabric with open APIs enables the Cisco Virtual Topology System (VTS) to automate overlay network provisioning with a highly scalable solution that truly integrates physical and virtual networks.
Learn how the Cisco VTS dramatically simplifies operations, reducing provisioning time from weeks to mere seconds. Find out how this open standards-based BGP EVPN control plane increases VXLAN scalability, extending workload placement and mobility range.
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
This presentations contains introductory to Intermediate topics on Ericsson MKVI SGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in SGSN.
This document provides details on Ericsson's 5G training program for 2018, including an overview of course topics, learning levels, and individual course descriptions. The training program covers 5G fundamentals, core network topics like 5G EPC and virtualization, RAN topics like massive MIMO and beamforming, transport, and management/orchestration. Course durations range from video sessions to 5-day classroom instruction, and include both virtual and in-person learning options. Contact information is provided to learn more about Ericsson's training portfolio.
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
To meet the new connectivity requirements of the emerging IoT segment, 3GPP has taken evolutionary steps on both the network side and the device side. A single technology or solution cannot be ideal to all the different potential IoT applications, market situations and spectrum availability. As a result, the 3GPP standardizing several technologies, including Extended Coverage GSM (EC-GSM), LTE-M and NB-IoT.
LTE-M, NB-IoT and EC-GSM are all superior solutions to meet IoT requirements as a family of solutions, and can complement each other based on technology availability, use case requirements and deployment scenarios. The evolution for these technologies is shown in figure #5. Technical studies and normative work for the support of Machine Type Communication (MTC) as part of 3GPP LTE specifications for RAN began in 3GPP Release 12 and are continuing with the goals of developing features optimized for devices with MTC traffic.
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
“Advantech’s Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.” Said Advantech Vice President of Networks & Communications Group, Ween Niu. “In the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.”
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantech’s corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Overview 5G NR Radio Protocols by Intel Eiko Seidel
Very nice overview of the 5G Radio Interface protocol as defined by 3GPP in NR Rel.15. The document was submitted to the 3GPP workshop on ITU submission in Brussels on Oct 24, 2018.
A high level introduction to Non-Standalone and Standalone 5G and what benefits will they bring to the businesses.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The document discusses 5G network slicing and artificial intelligence as a service for big data value. It outlines that 5G systems will enable network slicing to support different industries and use cases with varying latency, bandwidth and capacity needs. By 2025, over 1.2 billion 5G connections are projected globally with 5G covering 40% of the population.
This document discusses the GPON (Gigabit-capable Passive Optical Network) technology for fiber access networks. Some key points:
- GPON supports high-bandwidth, long-reach (up to 20km), and triple-play services, making it widely adopted by carriers.
- It uses a point-to-multipoint architecture with a single optical fiber shared between an OLT and multiple ONUs using passive splitters.
- Wavelength division multiplexing is used with downstream at 1490nm and upstream at 1310nm. Time division multiple access manages upstream bandwidth sharing between ONUs.
- Typical deployments include fiber to the home (FTTH),
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
The OpenRAN architecture, empowered by intelligence and openness principles, is the foundation for building the virtualized RAN on open hardware and cloud, with embedded AI-powered radio control. The architecture is based on standards defined by O-RAN Alliance, which completely support and are complementary to standards promoted by 3GPP and other industry standards organizations.
The document discusses the X2 interface and X2 handover procedure in LTE networks. The X2 interface connects two neighboring eNodeBs and establishes an X2 connection through the X2 setup procedure. The X2 handover procedure allows handing over a UE's connection from a source eNodeB to a target eNodeB, involving preparation where the target allocates resources and the UE connects to it, and execution including a path switch to route data to the target eNodeB. Key information like UE context and bearers is exchanged between eNodeBs through the X2 interface to enable smooth handover.
Propelling 5G forward: a closer look at 3GPP Release-16Qualcomm Research
This presentation summarizes the 3GPP 5G NR Release 16 projects, including eMBB enhancements, unlicensed, sidelink, IAB, TSN, eURLLC, private networks, C-V2X, and more...
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document discusses 5G NR RRC inactive state. It begins by introducing the NR RRC states of CONNECTED, IDLE, and INACTIVE. It then references 3GPP specifications that define the inactive state and its establishment and release.
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
The document discusses 5G radio access network (RAN) fundamentals and architectures. It describes how the RAN has evolved from previous generations with more distributed and virtualized architectures in 5G. Key aspects of 5G RAN covered include centralized/virtualized RAN, Open RAN specifications, functional splits, and new concepts like network slicing and multi-access edge computing. Example use cases are also mentioned.
Beginners: 5G Terminology (Updated - Feb 2019)3G4G
This document discusses 5G terminology and deployment options. It provides an overview of the evolution of mobile technology standards over time. It explains the differences between 4G LTE and 5G NR networks, as well as various options for non-standalone and standalone 5G network deployment and the migration strategies between these options. Key 5G concepts like gNBs, NG-RAN architecture and the 5G system architecture are also summarized.
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Canada
- Cisco SD-WAN is Cisco's next generation SD-WAN solution which will integrate Cisco's routing platforms and provide innovation in areas like cloud integration, security segmentation, and service insertion capabilities.
- The solution leverages Cisco's acquisition of Viptela to provide a cloud-managed SD-WAN platform that can optimize traffic delivery to cloud applications and data centers while ensuring security and application-aware policies across hybrid WAN transports including broadband, LTE, and MPLS networks.
- Key capabilities of Cisco SD-WAN include cloud on-ramp technologies to optimize access to SaaS and IaaS services, arbitrary VPN topologies to meet compliance needs, and zero touch provisioning of edge devices
Automate programmable fabric in seconds with an open standards based solutionTony Antony
Discover how how the standards-based Cisco Programmable Fabric with open APIs enables the Cisco Virtual Topology System (VTS) to automate overlay network provisioning with a highly scalable solution that truly integrates physical and virtual networks.
Learn how the Cisco VTS dramatically simplifies operations, reducing provisioning time from weeks to mere seconds. Find out how this open standards-based BGP EVPN control plane increases VXLAN scalability, extending workload placement and mobility range.
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Canada
This document provides an overview of Cisco's model-driven telemetry solution. It discusses key concepts like data models, encodings, transports and the telemetry pipeline. YANG is presented as the modeling language and telemetry is described as having three key enablers: push-based collection, analytics-ready data formats, and being data model-driven. Cisco routers support model-driven telemetry via gRPC, TCP, UDP and provide interfaces, system and other data in YANG, OpenConfig and IETF models.
Umbrella Webcast: Redefining Security for the Nomadic WorkerOpenDNS
The document summarizes a webcast about redefining security for nomadic workers. It discusses the challenges of securing mobile devices and remote employees. The webcast introduces OpenDNS's new product called Umbrella, which is designed to provide security for devices across networks. Umbrella is described as being device agnostic, simple to deploy, instantly scalable, and utilizing big data and security algorithms. A customer from Veterans United Home Loans then discusses their experience deploying Umbrella and lessons learned.
A webinar that looks into the new features that the Windows Server 2016 will offer in the DNS, DHCP and IPv6 space.
Showcase of some of the new stuff using the latest tech preview and the aim is to give administrators a quick overview of the Windows Server 2016 and enough information to decide if early adoption is worthwhile.
The document discusses the User Datagram Protocol (UDP) and the Transmission Control Protocol (TCP). UDP is a connectionless protocol that provides process-to-process communication over IP. TCP is connection-oriented and establishes a virtual connection between hosts to reliably send data using flow and error control. TCP numbers data bytes and uses sequence numbers and acknowledgments to ensure reliable in-order delivery. Connection establishment and termination with TCP uses three-way and four-way handshaking protocols. TCP guarantees in-order delivery of data to processes and handles lost packets.
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
The document discusses how cyber attacks have evolved over time and how Cisco security solutions can help address modern threats. It provides examples of ransomware attacks and how Cisco mapped the attacker infrastructure involved. It then summarizes Cisco's Umbrella and Cloudlock solutions, emphasizing how Umbrella provides secure internet access and threat prevention through fast DNS resolution and intelligence-driven models, while Cloudlock focuses on securing usage of cloud apps and accounts.
This document discusses the risks of phishing and social networks. It begins with some basic terminology and context around key players like individuals, technology, and services involved. It describes the basic methodology that criminals and terrorists use to exploit common activities on the internet like social networks, email, and web browsing. This includes making counterfeit activities look normal to attract users. The document provides some statistics on data breaches and privacy losses. It emphasizes knowing yourself and potential threats to understand your risk profile. It recommends practical precautions to mitigate risks like keeping software updated, using security tools, and exercising common sense online. Resources for more information are also included.
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
The DNS protocol has built-in high availability for authoritative DNS servers (this will be better explained in the webinar!), but client machines can see a degraded DNS service if a DNS resolver (caching DNS server) is failing.
In this webinar, we will look into how the DNS clients in popular operating systems (Windows, Linux, macOS/iOS) choose the DNS resolver among a list of available servers, and how a DNS resolver service can be made failure-tolerant with open-source solutions such as “dnsdist” from PowerDNS and “relayd” from OpenBSD.
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
This document discusses accelerating incident response in organizations using Cisco's security solutions. It describes Cisco's approach of integrating tools across the network, email, web and endpoints to provide 30+ days of recorded system history and continuous automated hunting and analysis. This integrated view is meant to translate raw security data into meaningful intelligence to accelerate the incident response process of protecting systems, hunting for threats, and responding to incidents. The presentation provides examples of how specific Cisco products like AMP for Email, AMP ThreatGrid, AMP for Network, and AMP for Endpoint contribute capabilities like continuous analysis, retrospective detection, and enhanced visibility to speed up an organization's incident response.
How to send DNS over anything encryptedMen and Mice
Today, nearly all DNS queries are send unencrypted. This makes DNS vulnerable to eavesdropping by someone with access to the network. The DNS-Privacy group (DPRIVE) inside the Internet Engineering Task Force (IETF), as well as people outside the IETF, are working on new transport protocols to encrypt DNS traffic between DNS clients and resolver.
* DNS over TLS (RFC 7858)
* DNS over DTLS (RFC 8094)
* DNS over HTTP(S) (ID-draft)
* DNS over QUIC (ID-draft)
* DNS over DNSCrypt (outside IETF)
* DNS over TOR (outside IETF)
In this webinar, we will explain the protocols available or discussed inside and outside the IETF, and give some example configurations on how to use this new privacy protocols today.
Das SlideDeck des Microsoft Cyber Security IT-Camps 2017/2018
Im Slidedeck werden Produkte wie Windows Defender AV, ATP und ApplicationGuard und ExploitGuard behandelt.
This document provides an overview and agenda for a presentation on securing and hardening DNS servers. It discusses configuring DNS servers at both the local system level and network level. At the local level, it recommends partitioning the file system, using chroot jails, firewalls, and access control configurations. At the network level, it discusses topics like limiting services, securing NTP, and managing DNS zones and records. The overall goal is to understand the high-level requirements for securing a DNS server and limiting access to the DNS service.
Abstract:
Writing Regular Expressions (Regex) is a versatile skill set to have across the IT landscape. Regex has a number of information security related uses and applications. We are going to provide an overview and work through examples of writing Regex as a group for pattern matching and file content analysis using sample threat feed data in this presentation. Along with a healthy dose of motherly advice, we cover Regex syntax, character classes, capture groups, sub-capture groups, and quantifiers. Whether Regex is something completely new or worth brushing up on, this talk is geared toward you.
Bio:
Matt Scheurer is a Systems Security Engineer working in the Financial Services industry. Matt holds a CompTIA Security+ Certification and possesses a number of Microsoft Certifications including: MCP, MCPS, MCTS, MCSA, and MCITP. Matt has presented on numerous Information Security topics as a featured speaker at a number of area Information Security meetup groups. Matt also had notable speaking engagements as a presenter at DerbyCon 5.0, DerbyCon 7.0, and the 10th Annual Northern Kentucky University Cyber Security Symposium. Matt maintains active memberships in a number of professional organizations including the Association for Computing Machinery (ACM), Cincinnati Networking Professionals Association (CiNPA), and Information Systems Security Association (ISSA). Matt is a regular attendee at monthly Information Security meetings for 2600, the CiNPA affiliated Security Special Interest Group (CiNPA Security SIG), Ohio Information Security Forum (OISF), and Cincinnati Security MBA (SMBA).
Symantec (ISTR) Internet Security Threat Report Volume 22CheapSSLsecurity
Symantec’s Internet Security Threat Report (ISTR) demonstrates how simple tactics and innovative cyber criminals led to unprecedented outcomes in global threat activity.
This document discusses the role of DNS in internet threats like botnets and how hackers have evolved to use DNS for command and control and to evade detection. It explains how hackers can change IP addresses and domain names through techniques like IP flux, domain flux, and DNS tunneling. It argues that defenses must also evolve to track more domain names, handle larger and more complex DNS packets, and identify threats from big DNS traffic data. The document concludes by thanking attendees and providing contact information to continue the discussion.
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...ThreatReel Podcast
Abstract:
What thoughts currently make tech defenders uneasy as they go to bed at night? Despite implementing and properly configuring the latest technological controls and security solutions into our environments, end users typically remain the most vulnerable point of entry into nearly any network. Unfortunately, only one misstep by a single user provides attackers with the foothold they need to begin compromising an entire enterprise network environment. The safety of our inboxes is a key initiative on the battlefront of protecting staff from the scourge of phishing and spear phishing attacks. We will perform a deep-dive look at the latest techniques used by criminals to bypass security products and traditional defense-in-depth strategies. We then focus heavily on conducting a digital forensic investigation on a sample phishing email message. Topics covered include technical analysis of message headers, message source code, message attachments, and malicious landing web pages even when a dedicated sandbox environment is unavailable.
Bio:
Matt Scheurer is a Systems Security Engineer working in the Financial Services industry. Matt holds a CompTIA Security+ Certification and possesses a number of Microsoft Certifications including: MCP, MCPS, MCTS, MCSA, and MCITP. Matt has presented on numerous Information Security topics as a featured speaker at a number of area Information Security meetup groups. Matt also had notable speaking engagements as a presenter at DerbyCon 5.0, DerbyCon 7.0, and the 10th Annual Northern Kentucky University Cyber Security Symposium. Matt maintains active memberships in a number of professional organizations including the Association for Computing Machinery (ACM), Cincinnati Networking Professionals Association (CiNPA), and Information Systems Security Association (ISSA). Matt is a regular attendee at monthly Information Security meetings for 2600, the CiNPA affiliated Security Special Interest Group (CiNPA Security SIG), Ohio Information Security Forum (OISF), and Cincinnati Security MBA (SMBA).
Cisco Connect 2018 Malaysia - Innovation towards SP transformationNetworkCollaborators
- Mobile data traffic is growing significantly and will increase 7 times from 2016 to 2021, driven by factors like increased video consumption and growth of IoT devices. 5G networks will begin deployment and traffic on 5G networks is projected to be 40 times greater than current 4G networks by 2021.
- Telecom operators face challenges from growing bandwidth demand, network investment requirements, and competition from web-scale companies. They need to improve network automation, virtualization, and architecture to gain efficiencies and enable new services.
- Transitioning to a distributed core network architecture with network functions virtualization is recommended to optimize traffic routing for the changing patterns and enable new 5G services through network slicing. This will allow operators to improve
The document discusses network transformation strategies for telecommunications providers, including automation, virtualization, and architecture changes. It notes the growing demands on networks from trends like digitization, mobile traffic increases, and more IoT devices. This puts pressure on providers' revenues despite network investments. The strategies proposed to address challenges include network automation for improved efficiency, virtualization for agility, and optimized architectures like distributed cloud designs for 5G and IoT. Case studies demonstrate how these approaches reduce costs and time to deploy new services while improving customer experience.
Making Networks More Agile, Open, and Application Centric - Cisco InsightsCisco Service Provider
Learn how to apply SDN, NFV, and Open APIs to drive positive business outcomes for Service Providers by visiting any of the following pages:
http://www.cisco.com/go/sp
http://www.cisco.com/go/epn
http://www.cisco.com/go/esp
NFV orchestration for cloud and virtual branch servicesCisco Canada
The document discusses Cisco's Virtual Managed Services (VMS) platform for orchestrating cloud and virtual branch managed services. VMS allows for the automated orchestration and lifecycle management of virtual network functions (VNFs) running on Cisco's Enterprise Network Compute System (ENCS) in clouds and virtual branches. The ENCS provides an NFV infrastructure optimized for branch and campus deployments, with features like hardware acceleration and integrated switching. VMS provides a simplified way for service providers to deliver virtualized managed services to enterprise customers.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
1) Cisco's 5G platform promises significant improvements in network performance including 10x increases in data rates, 20x reductions in latency, and 7.5x increases in cell site capacity.
2) 5G networks will need to support growing mobile traffic and new services enabled by technologies like IoT. They will also need to lower costs and support cloud platforms.
3) Cisco's 5G PowerX platform is a cloud-native, programmable, and automated network that connects everyone and everything from cloud to client through converged core, network slicing, edge computing, and other innovations.
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
This document discusses Cisco SD-WAN and its ability to deliver intent-based networking to branches and the WAN. It begins by noting the business challenges of traditional network architectures in supporting modern needs around mobility, cloud applications, and security. It then introduces Cisco SD-WAN as a software-defined solution that provides automated, predictive, and business-intent driven networking through centralized control, application-aware policies, hybrid WAN transport, and integrated security and analytics capabilities. Key components of the Cisco SD-WAN architecture are also summarized, including the data, control, management, and orchestration planes.
Cisco Powered Presentation - For CustomersCisco Powered
The document discusses Cisco Powered, a program that provides cloud and managed services through validated partners using Cisco technologies. It highlights key aspects of the Cisco Powered methodology including a broad services portfolio, security everywhere, enabling fast IT, choice of consumption models, services and networks designed together, strategic alignment with ecosystem partners, enterprise-class SLAs, independently validated services, and industry innovation leadership. The document also provides information on finding a Cisco Powered services provider.
This document discusses Colt's On Demand network and services. It summarizes that Colt has transformed its services from end-to-end products to modular components that customers can use to build their own services. Customers can now reserve ports, create connections, and modify bandwidth in real time through a portal or API. The document also outlines new capabilities like SDN federation across domains, programmable optical SDN, a unified NFV architecture, and using AI/ML for intelligent networking functions.
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
The document discusses Cisco Meraki's cloud-managed networking solutions. It provides an overview of Meraki's products and cloud-based management platform, highlighting benefits like simplified administration, scalability, and cost savings. Example customer use cases demonstrate how Meraki can be used to configure SD-WAN networks and securely enable new applications across wired and wireless networks.
How to Evaluate, Rollout and Operationalize Your SD-WAN ProjectsThousandEyes
The document discusses how to evaluate, rollout, and operationalize SD-WAN projects. It begins with an agenda that covers why a network transformation is needed, a comprehensive approach to implementation, and how Cisco can help. It then discusses that most customers demand fast and reliable digital experiences, and that when digital experiences go wrong it can significantly impact businesses. A network transformation is needed to support today's hybrid work environments and digital demands. The document outlines Cisco's approach to helping with visibility, intelligence, and workflows to optimize digital experiences for customers, workers and infrastructure.
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
Patomphon Vimolket introduces Cisco's vision for enabling next-generation data center transformations through software-defined technologies. The document discusses challenges like evolving threats, manual operations, and digital disruption. It presents Cisco's data center reference architecture and portfolio including Cisco CloudCenter, Nexus, UCS, HyperFlex, ACI, Intersight, and security solutions like Tetration and AppDynamics. These provide application visibility, infrastructure optimization, and security to help businesses adapt to challenges like multicloud, microservices, and more dynamic environments.
Colt provides network services to over 25,000 business customers across 3 continents and 28 countries. Their world-class network includes over 187,000 km of fiber and connectivity to over 200 cities. They are investing in software defined networking (SDN) and network functions virtualization (NFV) to transform their network and provide customers with on-demand, cloud-like services. Their Novitas program delivers services like Ethernet on Demand that allow customers to provision bandwidth in real-time through a portal. This provides benefits like faster delivery, elastic bandwidth, and a more flexible network. Colt is also developing SD-WAN services and a distributed NFV platform to further advance their SDN/NFV capabilities.
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
The document discusses Cisco's next generation SD-WAN technology. It summarizes that the traditional WAN/branch market is undergoing disruption as customers demand SD-WAN solutions with virtualized services. Cisco acquired Viptela in 2017, recognizing it as the market leader in SD-WAN. The presentation then provides overviews of Cisco's SD-WAN solution components, including the vEdge routers, vSmart controllers, vBond orchestrator, and vManage network management platform.
This document provides an overview and summary of a Cisco technical presentation on delivering Cisco Next Generation SD-WAN with Viptela. The presentation introduces Cisco SD-WAN architecture and components including vManage, vSmart, vBond and WAN Edge. It discusses SD-WAN fabric establishment and common enterprise use cases such as critical application SLA, multi-cloud onramp and secure branch segmentation. The presentation also covers SD-WAN migration sequence and includes a live demo.
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
The document discusses network slicing, which is the next step in virtualization for 4G/5G mobile networks. Network slicing allows the core network to be partitioned into multiple logical networks or "slices", each with its own network functions to support the requirements of different services. This approach enables network resources and functions to be allocated to specific services or customer segments in a flexible manner. It reduces complexity compared to existing networks that must support many different services and customers on a single common infrastructure. The key benefits of network slicing include improved network agility and the ability to support diverse service requirements.
Cisco and F5 accelerate Application DeliveryShashi Kiran
This document discusses the partnership between Cisco and F5 and their focus on application-centric infrastructure. It highlights key capabilities of Cisco's Application Centric Infrastructure (ACI) including policy-driven automation, integration with F5's BIG-IP and BIG-IQ solutions, and addressing joint customer needs. It also provides an overview of WWT's Advanced Technology Center and how they help customers prove and adopt new technologies like ACI through demo environments and other services.
Similar to Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBranch Managed Services (20)
The document summarizes a Cisco presentation on next-generation datacenter security. It discusses how the majority of security teams' time is spent securing servers and data in the datacenter. It then covers challenges such as budget constraints, product overload, and complexity of threats. The presentation introduces Cisco's architectural approach to datacenter security focusing on threat prevention, visibility, segmentation, threat intelligence, automation, and analytics. It provides examples of Cisco solutions that integrate to deliver firewall, access control, analytics, and other capabilities.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
The document discusses Cisco's solutions for securing mobility, including Meraki SM, Cisco AMP for Endpoint, Cisco Umbrella, Cisco Cloudlock, Cisco Cloud Email Security, Cisco Threat Response, Identity Service Engine, and Cisco DUO Security. Representatives from Cisco provide overviews of each solution for securing users, data, and applications across SaaS, PaaS, and IaaS environments.
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Cisco Connect Montreal provided information on Cisco's Webex Hybrid Services which allow for integration between on-premises and cloud collaboration solutions. The key services discussed included Hybrid Directory Service for user synchronization, Hybrid Calendar Service for calendaring integration, Hybrid Call Service for calling capabilities, Hybrid Message Service for messaging interoperability, and the new Cisco Webex Edge service for enhanced audio, video mesh, and media experiences.
Integration cisco et microsoft connect montreal 2018Cisco Canada
The document discusses Cisco and Microsoft integrations for collaboration. It describes major areas of integration including calling, messaging, meetings, email/calendar, content management, and instant messaging. It provides details on Cisco and Microsoft integrations for meetings, with examples of joining internal and external participants. The document also discusses Cisco Spark and Webex capabilities for open collaboration across organizations and platforms.
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
This document summarizes a presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG Development Kit (YDK) SDK, and telemetry. It defines key concepts like model-driven manageability, native and open data models, protocol operations, and the benefits of the YDK for simplifying application development through model-driven abstractions. Example code demonstrates basic YDK usage and a potential peering configuration use case is outlined. Resources for further information are also provided.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Robert Barton from Cisco presented on Cisco Kinetic, an IoT analytics platform. Cisco Kinetic consists of three modules: the Gateway Management Module for onboarding and managing IoT gateways at scale, the Edge and Fog Processing Module for analyzing IoT data in real-time at the edge, and the Data Control Module for securely routing IoT data between edge, fog, and cloud according to data policies. Cisco Kinetic aims to enable end-to-end IoT analytics across the entire network from device to cloud.
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Hank Preston, a Cisco engineer, gave a presentation on DevNet and how it is helping developers. He discussed how DevNet has grown significantly, now with over 100,000 members and 500,000 learning labs completed. DevNet provides resources like APIs, sandboxes, and training to help developers build applications and automate networks. Preston emphasized that networks are becoming more programmable and automated through DevNet tools and platforms.
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
The document discusses Cisco's DNA Assurance solution. It provides an agenda that covers business requirements, context, learning, user requirements, technology requirements, and the various components of DNA Assurance including client assurance, network assurance, application assurance, and machine learning. It discusses challenges around network operations including time spent troubleshooting and replicating issues. It also covers how DNA Assurance uses concepts like context, learning, and design thinking to provide insights and automate remediation.
Cisco Connect Toronto 2018 network-slicingCisco Canada
The document discusses network slicing, which is the partitioning of network resources and functions to run selected applications, services, or connections in isolation from each other for specific business purposes. This allows mobile operators to offer virtual private networks on a common infrastructure through network slicing on an end-to-end basis across access, transport, and core networks. Slicing enables new revenue opportunities through network slices optimized for different vertical industries while simplifying service delivery and management.
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
The document discusses Cisco Meraki's intelligent network and SD-WAN capabilities. It highlights that Meraki has over 14,000 customers using its SD-WAN, it has a renewal rate over 95%, and its newest product is WAN assurance. The presentation provides an overview of Meraki's cloud-managed solutions for wireless, switching, security, and other IT functions. It demonstrates Meraki's network monitoring and troubleshooting tools through examples and a demo of its capabilities.
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
The document discusses automating security tasks through various solutions from Cisco. It introduces the Cisco Advanced Malware Protection (AMP) solution, which uses machine learning to detect known and unknown malware across endpoints, networks, and email. It also introduces Cisco Cognitive Threat Analytics, which analyzes web traffic using machine learning to detect anomalous and malicious activity inside organizations. The document provides examples of how these solutions can automate tasks like hunting for threats, detecting anomalies, and attributing suspicious activity to specific entities. It includes demos of the AMP and Cognitive Intelligence user interfaces.
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1Cisco Canada
The document summarizes Santiago Álvarez's presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG development kit (YDK) model-driven SDK, and telemetry. Key points include how model-driven approaches using YANG models and protocols like NETCONF and gRPC provide structure, simplify development, and enable automation of network management and monitoring through telemetry.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
41. Freedom of Choice from VMS
Cisco Intelligent Branch
Virtual Router
Virtual Services
UCS C-Series
Branch and Campus NFV
Physical Router
Virtual Services
4000 Series ISR +
UCS® E-Series
Traditional
Physical Router
Cisco® 4000 Series ISR
Centralized services
Fixed integrated services
Conservative
Upgradable hardware
Deterministic routing
performance
Elastic routing and services
Performance
Early adopter
Virtual Managed
Services for SPs
License
Portability
Investment
Protection
Access to Ongoing
Innovation
Elastic routing and services
Router / Server Hybrid
Virtual Router
Virtual Services
Enterprise Network
Compute System (ENCS)
42. Cisco 4000 Series ISR +
UCS® E-Series
Cisco® UCS
C-Series
Enterprise Network Compute
System
(ENCS)
Network Functions Virtualization Infrastructure Software (NFVIS)
Virtual Managed Services (VMS & NSO for SPs)
Introducing Cisco NFV managed by VMS
Network Services in Minutes
Virtual Router
(ISRv / vEdge)
Virtual Firewall
(ASAv, FTDv)
Virtual WAN
Optimization
(vWAAS)
Virtual Wireless
LAN Controller
(vWLC)
Third-Party VNFs
43. Platform Built for Branch/Campus NFV
ENCS 5000 Series for the Branch
Enterprise Network Compute System
Best of Routing
& Compute
Complete
Virtualized Services
Open for Third Party
Services and Apps
ENCS 5400 Series
ENCS 5100 Series
45. ENCS 5400 Series – I/O Side
6, 8, or 12-Core
Intel Xeon-D
16 - 64 GB
DRAM
8 Integrated LAN Ports
with Optional POE
Network Interface Module
for LTE & WAN
Dedicated Board
Management Controller
2 HDD or SSD
RAID 0 & 1
Internal
M.2 Storage
64 – 400 GB
USB 3.0
Storage
2 Onboard Gigabit
Ethernet ports
with SFP
Optional Hardware
RAID Controller
Integrated
Power Supply
Hardware Acceleration for
VM Traffic
Shipping Now
Roadmap
46. ENCS 5100 Series - I/O Side
4-Core AMD
CPU
16 & 32 GB
DRAM
Optional
4G / LTE WAN
(Roadmap)
M.2 Storage
64 – 400 GB
2 x USB 3.0
Storage
4 GE ports
with 2 SFPs
Integrated
Power Supply
Size: 1 RU
13” x 10”
Console
& MGMT
Q3 CY 2017
47. ENCS 5100 & 5400 Series Comparison
5100 Series 5400 Series
CPU Vendor / Model AMD Merlin Falcon, RX-421ND Intel Xeon Broadwell D-1500 Series
CPU Cores / Frequency 4-core @ 3.4 GHz 6, 8, 12-core with Hyper-threading @ 1.5 – 2.0 GHz
CPU L2 Cache Size 2 MB 1.5 MB per core
Memory 16 – 32 GB 16 – 64 GB
Storage (M.2 SATA) 64 – 400 GB 64 – 400 GB
Storage (SFF) - 2 disks with RAID (SATA, SAS, SED, SSD)
Dimensions 12.7” x 10” x 1RU 17.5” x 12” x 1RU
WAN Options 4 x GE, Cellular 2 x GE, Cellular, T1, DSL, Serial
LAN - 8 port Switch with Optional PoE
Hardware Offload - VM – VM Traffic, Crypto
Lights-out Management - Built-in CIMC
ISRv Performance 500 Mbps 2.5 Gbps
48. ENCS 5400 NIM Support
Managed simply by VMS
Category Description Availability on ENCS
WAN 4G LTE (CAT3) USA, Canada, Europe, Australia & selected LATAM / APAC Now
WAN 4G LTE (CAT6) USA, Canada, Europe, Australia & selected LATAM / APAC Now
WAN T1/E1 1, 2, 4 & 8 ports Now
Serial Asynchronous Serial: 16 & 24 ports Q1 CY18
WAN xDSL Multi-mode VDSL2 / ADSL Annex A, B & M Q1 CY18
WAN Ethernet Dual-PHY: 1 & 2 ports Q1 CY18
LAN Ethernet Switches: 4 & 8 ports Q2 CY18
WAN Serial Synchronous Serial: 1, 2 & 4 ports Roadmap
Voice T1/E1, FXS, FXO Roadmap
50. Network Functions simply managed from VMS
Cisco and 3rd Party Virtual Network Functions (VNFs)
LinuxWindows Server
Active Directory,
File Share,
Server Applications
Custom Applications
DNS/DHCP
3rd Party
Network Services
Management & Monitoring
Viptela vEdge
SD-WAN
High Performance
Rich Features
59. VMS managed ENCS advantages
over white box server
• Hardware acceleration of VM-to-VM traffic
flow
• WAN module support
• 4G/LTE
• T1/E1
• xDSL
• Enterprise class grade components
(comparable to an ISR)
• Branch Form factor
• Shock, vibration, acoustic
• Secure Management of all VNFs from a single
multi-tenant, multi-service platform (VMS)
• Support for Cisco and 3rd Party VNFs, securely
managed by VMS
• Crypto hardware offload
• Secure VNF Lifecycle management
• BMC/CIMC – Lights out (server) management
• Support for Software and Hardware RAID on 12”
chassis
• LTE modules can support Dying gasp support that
is available on NIMs.
• Remote recovery of system over LTE modules
• Ability for increasing switch port density with NIMs.
Superior Hardware Engineering Superior Operational Platform