This document discusses EVPN solutions and applications for data center (DC) and service provider (SP) segments. It provides an overview of EVPN, including its capabilities for multi-homing, fast convergence, and load balancing. The document outlines various IETF drafts related to EVPN for applications like DC fabrics, inter-route bridging (IRB), and inter-DC connectivity. It compares EVPN to other layer 2 VPN solutions and discusses uses of EVPN for VPWS, E-Tree, and in conjunction with Provider Backbone Bridging (PBB-EVPN).
Segment Routing Advanced Use Cases - Cisco Live 2016 USAJose Liste
The document discusses segment routing and its use for inter-domain connectivity at scale. Segment routing allows source routing by encoding a path as an ordered list of segments in packet headers. It can be used to interconnect massive-scale datacenters and networks with hundreds of thousands of nodes. Segment routing scales through the use of globally unique prefix segments, redistribution of routing information only from the core to edges, and segment routing path computation elements. The path computation elements use segment routing native algorithms to optimize paths while maintaining equal-cost multipath routing.
Basic interview question for Ether Channel.INFitunes
In this slide determine about Defination of ether channel,
1. Why Ether channel used for ?
2. How many port on ether channel ?
3. How many channel can be created on ether channel?
4. Is that works as a redundancy ?
5. Advantage of ether channel and Protocols like static , Lacp(Link aggregation control protocol). pagp(port aggregation protocol),On (for static.)
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
This document provides an overview and agenda for a hands-on lab on the Network Service Orchestrator (NSO). It includes details on connecting to the lab environment, an introduction to NSO, installing NSO, using packages in NSO, and using the NETSIM network simulator. The lab will cover device and service management in NSO, YANG modeling, and service design. Attendees are provided credentials to access their assigned POD containing simulated network devices to complete the guided exercises over a 4 hour period.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
The document discusses techniques for BGP multihoming. It begins by explaining why organizations multihome and the various options for doing so. It then covers defining multihoming and autonomous system numbers, preparing the network for multihoming through configuration of policies, and basic versus provider multihoming techniques. The presentation aims to help understand what multihoming means and how to implement it.
EVPN in Service Provider network
- EVPN allows service providers to create new revenue streams through network fabric designs that provide Ethernet Layer 2 and Layer 3 services. It protects investments by unifying networks on a single overlay and simplifying protocols and operations. EVPN can be deployed easily through seamless integration with existing networks and provides the same operational experience as IP VPNs.
The document discusses Ethernet VPN (EVPN) use cases and applications. It provides background on EVPN, describing how it uses BGP to advertise MAC addresses and next hops. EVPN supports multi-homing and provides integrated Layer 2 and Layer 3 forwarding. The document outlines several use cases for EVPN including data center and data center interconnect, service chaining using policy-based routing to virtual network functions, Internet exchange points, and provider VPNs.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
Segment Routing Advanced Use Cases - Cisco Live 2016 USAJose Liste
The document discusses segment routing and its use for inter-domain connectivity at scale. Segment routing allows source routing by encoding a path as an ordered list of segments in packet headers. It can be used to interconnect massive-scale datacenters and networks with hundreds of thousands of nodes. Segment routing scales through the use of globally unique prefix segments, redistribution of routing information only from the core to edges, and segment routing path computation elements. The path computation elements use segment routing native algorithms to optimize paths while maintaining equal-cost multipath routing.
Basic interview question for Ether Channel.INFitunes
In this slide determine about Defination of ether channel,
1. Why Ether channel used for ?
2. How many port on ether channel ?
3. How many channel can be created on ether channel?
4. Is that works as a redundancy ?
5. Advantage of ether channel and Protocols like static , Lacp(Link aggregation control protocol). pagp(port aggregation protocol),On (for static.)
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
This document provides an overview and agenda for a hands-on lab on the Network Service Orchestrator (NSO). It includes details on connecting to the lab environment, an introduction to NSO, installing NSO, using packages in NSO, and using the NETSIM network simulator. The lab will cover device and service management in NSO, YANG modeling, and service design. Attendees are provided credentials to access their assigned POD containing simulated network devices to complete the guided exercises over a 4 hour period.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
The document discusses techniques for BGP multihoming. It begins by explaining why organizations multihome and the various options for doing so. It then covers defining multihoming and autonomous system numbers, preparing the network for multihoming through configuration of policies, and basic versus provider multihoming techniques. The presentation aims to help understand what multihoming means and how to implement it.
EVPN in Service Provider network
- EVPN allows service providers to create new revenue streams through network fabric designs that provide Ethernet Layer 2 and Layer 3 services. It protects investments by unifying networks on a single overlay and simplifying protocols and operations. EVPN can be deployed easily through seamless integration with existing networks and provides the same operational experience as IP VPNs.
The document discusses Ethernet VPN (EVPN) use cases and applications. It provides background on EVPN, describing how it uses BGP to advertise MAC addresses and next hops. EVPN supports multi-homing and provides integrated Layer 2 and Layer 3 forwarding. The document outlines several use cases for EVPN including data center and data center interconnect, service chaining using policy-based routing to virtual network functions, Internet exchange points, and provider VPNs.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
The document provides information on converting configurations from Cisco and Juniper devices to Cumulus Linux. It covers topics such as interface configuration, VLANs, trunks, access ports, EtherChannels/bonds, spanning tree, and access lists. Configuration examples are provided side-by-side for Cumulus Linux and Cisco/Juniper/Arista/Nexus syntax to highlight the differences.
The document describes the packet flow for a compute node in OpenStack. It outlines 7 steps for the packet flow within the compute node, including the instance tap interface forwarding to the Linux bridge, security group rules handling on the bridge, and tagging by Open vSwitch bridges. It then describes 4 steps for the physical network infrastructure, including VLAN tag handling by switches and routing by a router between the provider and external networks.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
This document provides an overview of BGP (Border Gateway Protocol) basics and configuration for internet service providers. It discusses BGP attributes, path selection, and applying routing policies. The key points covered include the purpose of BGP in exchanging routing information between autonomous systems, BGP neighbor configuration for internal and external peers, and using attributes like AS path, local preference, communities to influence best path selection.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
BFD is a protocol that can quickly detect failures in the forwarding path between two adjacent routers, including interfaces, data links, and forwarding planes. It operates in two modes: asynchronous mode where it periodically sends control packets, and demand mode where it only sends packets when needed. When a failure is detected, BFD triggers routing protocol actions to recalculate the routing table and reduce convergence time. It provides fast failure detection independently of media, encapsulation, topology, or routing protocol. Configuring BFD involves setting intervals at the interface level and enabling it for routing protocols.
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPROIDEA
Ethernet VPN (EVPN) is a new standards-based protocol that interconnects Layer 2 domains over a shared IP/MPLS network. It improves on previous protocols like VPLS by supporting features like all-active multi-homing and control plane learning of MAC addresses. EVPN is ideally suited for datacenter interconnectivity but can also be used in other cases beyond just data centers. Major networking vendors support EVPN as shown by their participation in the relevant IETF working group.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
This document provides an overview and configuration instructions for deploying Carrier Ethernet services on the Cisco ASR 9000 router. It begins with an introduction to Carrier Ethernet and the Cisco ASR 9000 platform. It then covers the configuration of Ethernet flow points (EFPs) to classify and rewrite VLAN tags. The document details various Ethernet service types including point-to-point local connect and VPWS services, as well as multipoint bridging and VPLS services. It concludes with sections on operations, administration, and maintenance (OAM) and best practices.
This document discusses overlay networking using VXLAN. It provides definitions of key concepts like logical overlay networks, physical underlay networks, and tunnel end points (VTEPs). It describes how VXLAN works by encapsulating Ethernet frames with IP/UDP and a VXLAN header that includes a VNI to identify different virtual networks. It covers VXLAN terminology, frame formats, control plane options, and how broadcast, unknown, and multicast traffic is forwarded between VTEPs using either IP multicast or head-end replication.
EVPN is an Ethernet VPN technology that extends layer 2 networks over a layer 3 underlay. It uses BGP as the control plane to distribute MAC addresses and Ethernet segment information between provider edge (PE) devices. EVPN supports various data plane encapsulations like MPLS, VXLAN, and NVGRE. It provides an integrated solution for layer 2 and layer 3 VPNs that addresses scaling challenges in traditional VPLS deployments.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
Automating with NX-OS: Let's Get Started!Cisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. Cisco's flagship data center platform, the Nexus series of switches, has a variety of programming protocols to offer. This session will provide participants with an overview and code examples on various protocols: * NX-API * XMPP * Netconf
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
E-VPN and PBB-EVPN are next generation MPLS-based L2VPN technologies that use BGP to distribute Ethernet segment and MAC address reachability information across the MPLS core. They provide all-active multi-homing and load balancing capabilities to maximize bandwidth utilization. PBB-EVPN encapsulates customer frames with backbone MAC addresses to enable split horizon filtering and optimize multicast forwarding.
The document discusses Ethernet VPN (EVPN) which introduces a new control plane approach for delivery of Ethernet services using MP-BGP. EVPN provides benefits like integrated Layer 2 and Layer 3 services, network efficiency, design flexibility, and greater network control. It describes key EVPN operations like all-active multihoming, split horizon, proxy ARP/ND, MAC mobility, and default gateway inter-subnet forwarding. EVPN can use different data plane encapsulations including MPLS, PBB, and VXLAN. It provides an overview of EVPN status and specifications being standardized in the IETF.
The document provides information on converting configurations from Cisco and Juniper devices to Cumulus Linux. It covers topics such as interface configuration, VLANs, trunks, access ports, EtherChannels/bonds, spanning tree, and access lists. Configuration examples are provided side-by-side for Cumulus Linux and Cisco/Juniper/Arista/Nexus syntax to highlight the differences.
The document describes the packet flow for a compute node in OpenStack. It outlines 7 steps for the packet flow within the compute node, including the instance tap interface forwarding to the Linux bridge, security group rules handling on the bridge, and tagging by Open vSwitch bridges. It then describes 4 steps for the physical network infrastructure, including VLAN tag handling by switches and routing by a router between the provider and external networks.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
This document provides an overview of BGP (Border Gateway Protocol) basics and configuration for internet service providers. It discusses BGP attributes, path selection, and applying routing policies. The key points covered include the purpose of BGP in exchanging routing information between autonomous systems, BGP neighbor configuration for internal and external peers, and using attributes like AS path, local preference, communities to influence best path selection.
The document discusses the configuration of static MPLS label switched paths (LSPs) across a network topology consisting of routers in various cities. It describes how each router is configured to either push a label, swap a label, or pop the top label as packets traverse the LSP from Jakarta to Makasar and back. Traceroute outputs are provided to show the functioning LSP paths versus normal IGP routing. Complete configuration snippets are included in an appendix.
BFD is a protocol that can quickly detect failures in the forwarding path between two adjacent routers, including interfaces, data links, and forwarding planes. It operates in two modes: asynchronous mode where it periodically sends control packets, and demand mode where it only sends packets when needed. When a failure is detected, BFD triggers routing protocol actions to recalculate the routing table and reduce convergence time. It provides fast failure detection independently of media, encapsulation, topology, or routing protocol. Configuring BFD involves setting intervals at the interface level and enabling it for routing protocols.
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPROIDEA
Ethernet VPN (EVPN) is a new standards-based protocol that interconnects Layer 2 domains over a shared IP/MPLS network. It improves on previous protocols like VPLS by supporting features like all-active multi-homing and control plane learning of MAC addresses. EVPN is ideally suited for datacenter interconnectivity but can also be used in other cases beyond just data centers. Major networking vendors support EVPN as shown by their participation in the relevant IETF working group.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
This document provides an overview and configuration instructions for deploying Carrier Ethernet services on the Cisco ASR 9000 router. It begins with an introduction to Carrier Ethernet and the Cisco ASR 9000 platform. It then covers the configuration of Ethernet flow points (EFPs) to classify and rewrite VLAN tags. The document details various Ethernet service types including point-to-point local connect and VPWS services, as well as multipoint bridging and VPLS services. It concludes with sections on operations, administration, and maintenance (OAM) and best practices.
This document discusses overlay networking using VXLAN. It provides definitions of key concepts like logical overlay networks, physical underlay networks, and tunnel end points (VTEPs). It describes how VXLAN works by encapsulating Ethernet frames with IP/UDP and a VXLAN header that includes a VNI to identify different virtual networks. It covers VXLAN terminology, frame formats, control plane options, and how broadcast, unknown, and multicast traffic is forwarded between VTEPs using either IP multicast or head-end replication.
EVPN is an Ethernet VPN technology that extends layer 2 networks over a layer 3 underlay. It uses BGP as the control plane to distribute MAC addresses and Ethernet segment information between provider edge (PE) devices. EVPN supports various data plane encapsulations like MPLS, VXLAN, and NVGRE. It provides an integrated solution for layer 2 and layer 3 VPNs that addresses scaling challenges in traditional VPLS deployments.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
Automating with NX-OS: Let's Get Started!Cisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. Cisco's flagship data center platform, the Nexus series of switches, has a variety of programming protocols to offer. This session will provide participants with an overview and code examples on various protocols: * NX-API * XMPP * Netconf
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
E-VPN and PBB-EVPN are next generation MPLS-based L2VPN technologies that use BGP to distribute Ethernet segment and MAC address reachability information across the MPLS core. They provide all-active multi-homing and load balancing capabilities to maximize bandwidth utilization. PBB-EVPN encapsulates customer frames with backbone MAC addresses to enable split horizon filtering and optimize multicast forwarding.
The document discusses Ethernet VPN (EVPN) which introduces a new control plane approach for delivery of Ethernet services using MP-BGP. EVPN provides benefits like integrated Layer 2 and Layer 3 services, network efficiency, design flexibility, and greater network control. It describes key EVPN operations like all-active multihoming, split horizon, proxy ARP/ND, MAC mobility, and default gateway inter-subnet forwarding. EVPN can use different data plane encapsulations including MPLS, PBB, and VXLAN. It provides an overview of EVPN status and specifications being standardized in the IETF.
This document provides an overview and configuration guide for VxLAN routing and control plane capabilities on Nexus 9000 series switches. It begins with an introduction to VxLAN and MP-BGP EVPN technologies. It then covers MP-BGP EVPN control plane functions and design options for VXLAN deployment. The document concludes with instructions for configuring MP-BGP EVPN VXLAN on Nexus 9000 switches and an overview of their VxLAN capabilities.
This document discusses advanced VPLS techniques including:
1. Using P2MP LSPs to improve VPLS scaling by distributing replication across the network instead of concentrating it on the first hop link.
2. Interworking between BGP and LDP signaling to allow for both manual and automated VPLS provisioning.
3. Employing mesh groups to interconnect LDP and BGP VPLS domains and control flooding between them.
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
This document discusses Virtual Private LAN Service (VPLS) and provides an overview of VPLS technical concepts. VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network by emulating an Ethernet bridge. Key components of VPLS include provider edge devices, pseudowires to connect customer sites, and virtual switch instances to segment customer traffic. VPLS supports both direct attachment and hierarchical architectures. Loop prevention is achieved through a full mesh of pseudowires between provider edges and split horizon forwarding in the MPLS core.
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPROIDEA
The document discusses deploying Next-Generation Multicast VPN (NG-MVPN) and migrating from draft-Rosen to NG-MVPN. It provides:
1) An overview of NG-MVPN including its control plane using BGP and data plane options using P2MP LSPs or mGRE tunnels.
2) Details on the BGP control messages and procedures used for multicast auto-discovery and exchange of multicast routes between PEs.
3) A description of Juniper's NG-MVPN implementation in JUNOS including the routing information flow.
4) Options for smoothly migrating an existing mVPN from draft-Rosen to N
This document discusses data center interconnect and virtual private LAN service (VPLS) technologies. It provides an overview of data center edge functions, collapsed WAN and aggregation solutions, data center LAN configurations, and layer 2 loop detection capabilities. It also covers multi-chassis link aggregation, data center WAN connectivity options using IP/MPLS or VPLS, and the advantages of Ethernet VPN (EVPN) over VPLS. Finally, it discusses challenges and solutions related to virtual machine mobility and provides a comparison analysis of PBB-EVPN versus EVPN.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
Spirent's EVPN emulation package allows testing of complex EVPN topologies by emulating vast numbers of virtual network devices. It provides wizards to easily configure topologies and validate performance and scalability under scenarios like unicast, multicast, and multi-homing. The package comprehensively supports EVPN protocols, encapsulations like MPLS, VXLAN, and traffic types on Ethernet interfaces from 1G to 100G.
This document provides information about various VPN protocols and technologies, including their layer of operation, security implementation, control and transport protocols, and key advantages and limitations. It compares protocols like SSL, VXLAN, VPLS, EVPN, MPLS IP VPN, GRE, and IPsec. For example, it notes that VXLAN operates at layer 2, uses UDP for transport, can extend VLAN scaling, and has limited hashing entropy. MPLS IP VPN operates at layer 3, uses BGP for signaling, and depends on service provider infrastructure but offers flexibility, scalability, and interoperability.
Flexible NFV WAN interconnections with Neutron BGP VPNThomas Morin
[talk given during the OpenStack Summit, May 2018 in Vancouver, BC]
Telcos use OpenStack to deploy virtualized network functions, and have specific requirements to interconnect these OpenStack deployments to their backbones and mobile backhaul networks. These interconnections, in particular, need to involve dynamic routing and interconnections with operators internal VPNs.
This talk will explain the role that the networking-bgpvpn Neutron Stadium project plays to address this need, from the basics of the BGPVPN Interconnection API, to more advanced uses made possible by evolutions of this API delivered in Queens.
The more interesting use cases will be the opportunity for a step by step demo.
We'll give a status of where the project stands today in terms of feature coverage, look at the set of SDN controllers providing an implementation for this API beyond the implementation in reference drivers, and last, look at the future of the project.
VXLAN Design and Deployment discusses considerations for deploying VXLAN in a data center fabric. It covers why VXLAN is used to create overlay networks, VXLAN fundamentals like encapsulation and tunneling, and important factors for the underlay network like ensuring sufficient MTU for the VXLAN overhead, using point-to-point interfaces and protocols like OSPF or IS-IS for routing, enabling IP multicast, and deploying iBGP with a route reflector to distribute VTEP reachability. The document also discusses control plane protocols, evolution of VXLAN, and hardware support on Cisco platforms.
The document discusses Colt's network evolution towards next generation technologies. It describes moving from separate IP and Ethernet networks running different MPLS protocols to a single converged network using Segment Routing as the unified MPLS control plane. This provides simplified design and operations as well as improved scalability, resiliency and service flexibility. Ethernet services are also evolving from per-pseudowire implementations to EVPN using BGP for unified control and faster convergence. Virtualization of network functions like route reflectors is another focus. Key takeaways include a simplified architecture delivering faster service and lower costs.
The document discusses using SDN and overlay networking techniques like VXLAN and EVPN to build flexible Layer 2 and Layer 3 VPN services. It proposes using SDN controllers to program "smart edge, dumb core" CPE devices and transport customer traffic over any underlying IP network in a virtualized manner. This approach aims to simplify VPN provisioning and interworking with traditional networks while improving scalability, control, and service chaining compared to traditional IP VPN models.
Juniper Networks announced updates to its Junos operating system and release model. Key highlights include:
- Junos will move to a twice-yearly major release schedule focused on quality, along with four innovation releases per year for new features.
- Major releases will receive 3 years of engineering support and 6 months of service support. Innovation releases will receive 6 months of each.
- The new release model is aimed at providing customers more choice and a faster time to market for new features while improving release maturity.
- Programmability enhancements include expanding automation frameworks like Puppet and Chef, as well as enabling Python scripting directly on Juniper devices.
A novel way of creating overlay networks for OpenNebula is presented here. Using BGP Ethernet VPN (EVPN) with VXLAN data-plane encapsulation. This provides scalable Layer 2 over IP networks.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
Leonardo Sambrana of Extreme Networks gave a presentation covering MPLS LSP load sharing, selective VLAN mapping to VPLS, and MPLS in an SDN environment. The presentation discussed how LSP load sharing improves traffic distribution over link aggregation groups. It also explained how selective VLAN mapping allows multiple VLANs to be mapped to a single VPLS service. Finally, it compared traditional MPLS deployments to an SDN-based approach using OpenDaylight and discussed using MPLS traffic engineering and L3 VPNs with SDN.
PLNOG14: Evolved Programmable Network, architektura dla sieci operatorskich -...PROIDEA
Krzysztof Konkowski - Cisco Systems
Language: English
Service Provider networks evolve to benefit from virtualisation, programmability, automation and other cutting edge technologies, enabling SPs to streamline their services and keep profitable on competitive market. Being able to adopt new technologies is bound to alleging network architecture, adding new components on top of Access, Aggregation, Core, and Service Edge. Cisco for past years has been developing CVD program - Cisco Validated Design. One of the work groups is dedicated to creating and maintaining EPN solution - Evolved Programmable Network - along with documentation based on cyclic test campaigns, Design & Implementation Guides, and other information. The session will cover EPN - its fundamental blocks, scenarios & equipment tested, where to search for information and how to use them.
Register for the next PLNOG edition: krakow.plnog.pl
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A