Describing how Segment Routing is laying the foundations for controller based TE in Google's RSVP based B2 network. Solving network hyperscale challenges one step at a time.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
The document discusses SRv6 (Segment Routing IPv6) network programming and deployment use cases. It provides an overview of SRv6, including how it encodes the network path in packet headers, its scalability benefits, and support across industry. Specific functions of SRv6 LocalSIDs are explained, along with examples of fast reroute protection, traffic engineering, VPN overlays, and centralized vs distributed control planes. SRv6 is proposed as a simplification that can eliminate protocols for various use cases.
This document discusses segment routing and how it simplifies IP/MPLS networks. Segment routing encodes paths through a network as a list of segments carried in packet headers. This eliminates the need for protocols like RSVP-TE and LDP, reducing control plane complexity and overhead. Segment routing provides the same functionality as RSVP-TE for traffic engineering and fast rerouting, but with greater scalability for large networks. The main challenges are ensuring routers have large enough segment routing blocks and supporting deep label stacks on older router hardware.
MPLS SDN 2016 - Microloop avoidance with segment routingStephane Litkowski
The document discusses micro-loops in networks and how segment routing can be used to avoid them. Micro-loops are a natural phenomenon in hop-by-hop routed networks caused by transient disagreements between routers during convergence. Segment routing allows building a temporary loop-free path using a two-stage convergence - first using a precomputed loop-free label stack, then switching to the standard path once convergence is complete. This approach could help address issues caused by micro-loops like broken fast reroute and traffic loss.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF terminology and operation, including link-state routing, databases, advertisements, and algorithms. It also covers OSPF packet types, areas, router types, metrics, and configuration. The objectives are to describe OSPF functionality in different network environments and configure basic and advanced OSPF features.
This document summarizes key concepts about advanced routing protocols including classful and classless protocols, RIPv2, EIGRP, and OSPF. It describes how classful protocols like RIPv1 summarize networks based on major boundaries and cannot be used with VLSM, while classless protocols carry subnet mask information and allow routing in discontiguous networks. It provides details on configuring and components of RIPv2, EIGRP, and OSPF such as authentication, metrics, neighbor discovery, and link-state advertisements.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
The document discusses SRv6 (Segment Routing IPv6) network programming and deployment use cases. It provides an overview of SRv6, including how it encodes the network path in packet headers, its scalability benefits, and support across industry. Specific functions of SRv6 LocalSIDs are explained, along with examples of fast reroute protection, traffic engineering, VPN overlays, and centralized vs distributed control planes. SRv6 is proposed as a simplification that can eliminate protocols for various use cases.
This document discusses segment routing and how it simplifies IP/MPLS networks. Segment routing encodes paths through a network as a list of segments carried in packet headers. This eliminates the need for protocols like RSVP-TE and LDP, reducing control plane complexity and overhead. Segment routing provides the same functionality as RSVP-TE for traffic engineering and fast rerouting, but with greater scalability for large networks. The main challenges are ensuring routers have large enough segment routing blocks and supporting deep label stacks on older router hardware.
MPLS SDN 2016 - Microloop avoidance with segment routingStephane Litkowski
The document discusses micro-loops in networks and how segment routing can be used to avoid them. Micro-loops are a natural phenomenon in hop-by-hop routed networks caused by transient disagreements between routers during convergence. Segment routing allows building a temporary loop-free path using a two-stage convergence - first using a precomputed loop-free label stack, then switching to the standard path once convergence is complete. This approach could help address issues caused by micro-loops like broken fast reroute and traffic loss.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF terminology and operation, including link-state routing, databases, advertisements, and algorithms. It also covers OSPF packet types, areas, router types, metrics, and configuration. The objectives are to describe OSPF functionality in different network environments and configure basic and advanced OSPF features.
This document summarizes key concepts about advanced routing protocols including classful and classless protocols, RIPv2, EIGRP, and OSPF. It describes how classful protocols like RIPv1 summarize networks based on major boundaries and cannot be used with VLSM, while classless protocols carry subnet mask information and allow routing in discontiguous networks. It provides details on configuring and components of RIPv2, EIGRP, and OSPF such as authentication, metrics, neighbor discovery, and link-state advertisements.
MPLS WC 2014 Segment Routing TI-LFA Fast ReRouteBruno Decraene
This document discusses Topology Independent LFA (TI-LFA), a fast reroute technique that provides 100% node and link protection using Segment Routing. It begins by outlining requirements for fast reroute, then introduces TI-LFA which computes the post-convergence path and encodes it as a loop-free Segment Routing path. The document analyzes applicability on Orange network topologies and presents simulation results showing TI-LFA achieves low stack depth and path compression. It concludes that TI-LFA is a scalable solution that meets requirements by providing optimal fast reroute paths without side effects.
This presentation discusses Segment Routing over IPv6 (SRv6) and the Network Programming Model. It provides an overview of what SRv6 is, how it works, and how the Network Programming Model can be used for applications like VPNs, SD-WANs, and service function chaining. The presentation also covers SRv6 standardization efforts, open source implementations, and areas of ongoing research.
Traffic Engineering Using Segment Routing Cisco Canada
1) The document discusses using segment routing for traffic engineering. It provides an overview of segment routing technology, use cases, control and data plane operations, and how segment routing can be used for traffic engineering.
2) Key aspects covered include how segment routing works by encoding a path as an ordered list of segments, different types of segments (IGP prefixes, adjacencies, BGP), and how this allows for application-engineered end-to-end paths.
3) Traffic engineering with segment routing provides explicit routing, supports constraint-based routing without needing RSVP-TE, and uses existing IGP extensions to advertise link attributes.
This document provides an introduction to segment routing. It discusses:
- The objective of segment routing is to enable source routing without requiring state in intermediate nodes.
- Segment routing allows encoding paths as sequences of topological sub-paths called segments. Segments can represent nodes, links, or services.
- The IETF SPRING working group is standardizing segment routing to address issues with scalability of traffic engineering and fast reroute with protocols like RSVP-TE and LDP. Segment routing aims to provide these capabilities without per-flow state.
Reflexive access lists allow traffic originating from inside a network while denying traffic from outside. They generate temporary entries to allow return traffic for initiated sessions, unlike standard ACLs which only filter based on ports. Reflexive ACLs should be configured on border routers separating internal and external networks. They can be applied inbound or outbound depending on requirements. When a session starts internally, a temporary entry is added to allow return traffic and is removed after the session ends or a timeout occurs.
MPLS RSVP-TE Auto-Bandwidth provides a method for dynamically adjusting MPLS traffic engineered (TE) label switched paths (LSPs) based on measured bandwidth usage. However, the document discusses several challenges with auto-bandwidth, including difficulties adapting to changing traffic patterns, potential issues with overflow/underflow, the need for operator-configured LSP meshes, inefficient packing of large LSPs on small links, and unstable behavior under heavy traffic loads. While auto-bandwidth aims to provide more flexible bandwidth adjustment than offline modeling, the real-world performance is complex with important considerations.
This document outlines an IPv6 lab and techtorial that covers IPv6 addressing, neighbor discovery, static routing, OSPFv3, BGP, and tunneling. The agenda includes lectures on these topics as well as corresponding labs to provide hands-on experience. Prerequisites for the session are basic network engineering knowledge and interest in Cisco technologies. The document then goes on to describe IPv6 addressing formats, types of addresses, and how addresses are allocated to interfaces.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
The document discusses deploying IPv6 in OpenStack environments. It covers topics like tenant IPv6 addressing using SLAAC, stateless DHCPv6, and stateful DHCPv6. It also discusses provider networks, IPv6-only networks, IPv6 prefix delegation, and using IPv6 with Heat and L3 high availability. The agenda provides reference material and GitHub links for IPv6 Heat templates. Examples are given for creating tenant networks using different IPv6 addressing modes in Neutron. Captures from network sniffers show the router advertisements and DHCP messages used to configure IPv6 addresses and options.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
The document discusses deploying SDN on the Cisco ASR 9000 platform. It provides an overview of SDN drivers, concepts and definitions. It then describes how the ASR 9000 supports SDN through capabilities like BGP-LS, stateful PCEP, OpenFlow, NETCONF/YANG. The rest of the document discusses these protocols and technologies in more detail and provides examples and configurations for SDN on the ASR 9000.
EIGRP is an advanced distance vector routing protocol that is an evolution of IGRP. It supports features like classless routing, VLSM, route summarization, load balancing and more. For routers to exchange routing information, they must first become neighbors by discovering each other using multicast hello packets and ensuring certain fields match, like the AS number. EIGRP stores routing data in neighbor, topology, and routing tables and uses metrics like bandwidth and delay to calculate the best routes.
This document contains information about routing protocols like EIGRP, OSPF, BGP and IPv6 routing. It discusses various topics such as configuring and tuning EIGRP parameters like timers, authentication and metrics. It also covers topics related to OSPF like network types, route filtering, summarization etc. Redistribution between protocols and IPv6 routing concepts are also mentioned. The document contains practical exercises for configuring various routing features on sample networks.
The document discusses the evolution of next generation IP transport networks using a Unified MPLS approach. Key points include:
- Unified MPLS aims to simplify MPLS operations in large, complex networks through common MPLS technology across domains and hierarchical BGP routing.
- It reduces the number of operational points needed for services by minimizing static configuration and integrating previously separate MPLS islands.
- The network is divided into IGP/LDP domains with inter-domain communication handled through labeled BGP routes. This reduces route tables and the number of label switched paths required in the access domains.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
The document discusses implementing BGP, including BGP terminology, concepts, operation, neighbor relationships, and basic BGP configuration. It describes BGP as a path vector routing protocol used between autonomous systems to exchange routing and reachability information. It differentiates between external BGP which establishes relationships between routers in different autonomous systems, and internal BGP which is used within an autonomous system. Basic BGP configuration involves defining BGP neighbors, entering BGP configuration mode, and activating BGP sessions.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail AliMyNOG
This document discusses how cloud principles are being applied to routing to make it more scalable and software-driven. It outlines some of the key capabilities needed for cloud-grade routing, including simplifying protocols, automation, real-time telemetry, and system-wide programmability. Examples are provided of how these principles are being used in large customer deployments, such as with segment routing, EVPN, and programmable traffic engineering in spine-leaf architectures and cloud WANs. The goal is to transform routing using modern protocols and merchant silicon to scale in the way compute and storage have in the cloud.
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
The document discusses how segment routing can help networks support new services by providing simplified, automated, and scalable IP transport. Segment routing uses source routing techniques and standard routing protocols to enable network slicing, which allows for the efficient sharing of network resources across different services. The key capabilities of segment routing include simplification of network protocols, improved scalability, simplified traffic engineering, and universal forwarding across access and data center networks.
Segment Routing over IPv6 (SRv6) is an architecture based on the source routing paradigm that seeks the right balance between distributed (network-wide) intelligence and centralized (controller-based) programmability. Using SRv6, network devices have complete control over the forwarding paths and the network functions to be applied to packets, by combining simple network instructions. Moreover, applications can become SRv6 aware and gain control over the network-wide forwarding and processing of packets. SRv6 technology has been implemented in hardware by different vendors (e.g. CISCO, Huawei, Barefoot), in software (e.g. Linux kernel networking) and in software with I/O acceleration (e.g. FD.io Vector Packet Processing using DPDK). Several large scale deployments of SRv6 have been rolled out in 2019 (including Softbank, Iliad, ChinaTelecom, China Unicom), see https://tools.ietf.org/html/draft-matsushima-spring-srv6-deployment-status. This tutorial will provide a quick introduction to SRv6 architecture and protocols and will illustrate the design and implementation of SRv6 services with hands-on examples. The hands-on part will be based on the open-source SRv6 ecosystem developed in the ROSE project: https://netgroup.github.io/rose/
MPLS WC 2014 Segment Routing TI-LFA Fast ReRouteBruno Decraene
This document discusses Topology Independent LFA (TI-LFA), a fast reroute technique that provides 100% node and link protection using Segment Routing. It begins by outlining requirements for fast reroute, then introduces TI-LFA which computes the post-convergence path and encodes it as a loop-free Segment Routing path. The document analyzes applicability on Orange network topologies and presents simulation results showing TI-LFA achieves low stack depth and path compression. It concludes that TI-LFA is a scalable solution that meets requirements by providing optimal fast reroute paths without side effects.
This presentation discusses Segment Routing over IPv6 (SRv6) and the Network Programming Model. It provides an overview of what SRv6 is, how it works, and how the Network Programming Model can be used for applications like VPNs, SD-WANs, and service function chaining. The presentation also covers SRv6 standardization efforts, open source implementations, and areas of ongoing research.
Traffic Engineering Using Segment Routing Cisco Canada
1) The document discusses using segment routing for traffic engineering. It provides an overview of segment routing technology, use cases, control and data plane operations, and how segment routing can be used for traffic engineering.
2) Key aspects covered include how segment routing works by encoding a path as an ordered list of segments, different types of segments (IGP prefixes, adjacencies, BGP), and how this allows for application-engineered end-to-end paths.
3) Traffic engineering with segment routing provides explicit routing, supports constraint-based routing without needing RSVP-TE, and uses existing IGP extensions to advertise link attributes.
This document provides an introduction to segment routing. It discusses:
- The objective of segment routing is to enable source routing without requiring state in intermediate nodes.
- Segment routing allows encoding paths as sequences of topological sub-paths called segments. Segments can represent nodes, links, or services.
- The IETF SPRING working group is standardizing segment routing to address issues with scalability of traffic engineering and fast reroute with protocols like RSVP-TE and LDP. Segment routing aims to provide these capabilities without per-flow state.
Reflexive access lists allow traffic originating from inside a network while denying traffic from outside. They generate temporary entries to allow return traffic for initiated sessions, unlike standard ACLs which only filter based on ports. Reflexive ACLs should be configured on border routers separating internal and external networks. They can be applied inbound or outbound depending on requirements. When a session starts internally, a temporary entry is added to allow return traffic and is removed after the session ends or a timeout occurs.
MPLS RSVP-TE Auto-Bandwidth provides a method for dynamically adjusting MPLS traffic engineered (TE) label switched paths (LSPs) based on measured bandwidth usage. However, the document discusses several challenges with auto-bandwidth, including difficulties adapting to changing traffic patterns, potential issues with overflow/underflow, the need for operator-configured LSP meshes, inefficient packing of large LSPs on small links, and unstable behavior under heavy traffic loads. While auto-bandwidth aims to provide more flexible bandwidth adjustment than offline modeling, the real-world performance is complex with important considerations.
This document outlines an IPv6 lab and techtorial that covers IPv6 addressing, neighbor discovery, static routing, OSPFv3, BGP, and tunneling. The agenda includes lectures on these topics as well as corresponding labs to provide hands-on experience. Prerequisites for the session are basic network engineering knowledge and interest in Cisco technologies. The document then goes on to describe IPv6 addressing formats, types of addresses, and how addresses are allocated to interfaces.
BGP started in 1989 to connect autonomous systems in a stable, efficient manner. This document outlines advancements in BGP infrastructure, VPN enhancements, and high availability features. Infrastructure enhancements improve areas like keepalive processing and update generation. VPN enhancements support technologies like iBGP between PE and CE routers, multicast VPNs, and EVPN. High availability features include graceful shutdown, fast convergence using PIC, and non-stop routing.
The document discusses deploying IPv6 in OpenStack environments. It covers topics like tenant IPv6 addressing using SLAAC, stateless DHCPv6, and stateful DHCPv6. It also discusses provider networks, IPv6-only networks, IPv6 prefix delegation, and using IPv6 with Heat and L3 high availability. The agenda provides reference material and GitHub links for IPv6 Heat templates. Examples are given for creating tenant networks using different IPv6 addressing modes in Neutron. Captures from network sniffers show the router advertisements and DHCP messages used to configure IPv6 addresses and options.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
The document discusses deploying SDN on the Cisco ASR 9000 platform. It provides an overview of SDN drivers, concepts and definitions. It then describes how the ASR 9000 supports SDN through capabilities like BGP-LS, stateful PCEP, OpenFlow, NETCONF/YANG. The rest of the document discusses these protocols and technologies in more detail and provides examples and configurations for SDN on the ASR 9000.
EIGRP is an advanced distance vector routing protocol that is an evolution of IGRP. It supports features like classless routing, VLSM, route summarization, load balancing and more. For routers to exchange routing information, they must first become neighbors by discovering each other using multicast hello packets and ensuring certain fields match, like the AS number. EIGRP stores routing data in neighbor, topology, and routing tables and uses metrics like bandwidth and delay to calculate the best routes.
This document contains information about routing protocols like EIGRP, OSPF, BGP and IPv6 routing. It discusses various topics such as configuring and tuning EIGRP parameters like timers, authentication and metrics. It also covers topics related to OSPF like network types, route filtering, summarization etc. Redistribution between protocols and IPv6 routing concepts are also mentioned. The document contains practical exercises for configuring various routing features on sample networks.
The document discusses the evolution of next generation IP transport networks using a Unified MPLS approach. Key points include:
- Unified MPLS aims to simplify MPLS operations in large, complex networks through common MPLS technology across domains and hierarchical BGP routing.
- It reduces the number of operational points needed for services by minimizing static configuration and integrating previously separate MPLS islands.
- The network is divided into IGP/LDP domains with inter-domain communication handled through labeled BGP routes. This reduces route tables and the number of label switched paths required in the access domains.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
The document discusses implementing BGP, including BGP terminology, concepts, operation, neighbor relationships, and basic BGP configuration. It describes BGP as a path vector routing protocol used between autonomous systems to exchange routing and reachability information. It differentiates between external BGP which establishes relationships between routers in different autonomous systems, and internal BGP which is used within an autonomous system. Basic BGP configuration involves defining BGP neighbors, entering BGP configuration mode, and activating BGP sessions.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail AliMyNOG
This document discusses how cloud principles are being applied to routing to make it more scalable and software-driven. It outlines some of the key capabilities needed for cloud-grade routing, including simplifying protocols, automation, real-time telemetry, and system-wide programmability. Examples are provided of how these principles are being used in large customer deployments, such as with segment routing, EVPN, and programmable traffic engineering in spine-leaf architectures and cloud WANs. The goal is to transform routing using modern protocols and merchant silicon to scale in the way compute and storage have in the cloud.
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
The document discusses how segment routing can help networks support new services by providing simplified, automated, and scalable IP transport. Segment routing uses source routing techniques and standard routing protocols to enable network slicing, which allows for the efficient sharing of network resources across different services. The key capabilities of segment routing include simplification of network protocols, improved scalability, simplified traffic engineering, and universal forwarding across access and data center networks.
Segment Routing over IPv6 (SRv6) is an architecture based on the source routing paradigm that seeks the right balance between distributed (network-wide) intelligence and centralized (controller-based) programmability. Using SRv6, network devices have complete control over the forwarding paths and the network functions to be applied to packets, by combining simple network instructions. Moreover, applications can become SRv6 aware and gain control over the network-wide forwarding and processing of packets. SRv6 technology has been implemented in hardware by different vendors (e.g. CISCO, Huawei, Barefoot), in software (e.g. Linux kernel networking) and in software with I/O acceleration (e.g. FD.io Vector Packet Processing using DPDK). Several large scale deployments of SRv6 have been rolled out in 2019 (including Softbank, Iliad, ChinaTelecom, China Unicom), see https://tools.ietf.org/html/draft-matsushima-spring-srv6-deployment-status. This tutorial will provide a quick introduction to SRv6 architecture and protocols and will illustrate the design and implementation of SRv6 services with hands-on examples. The hands-on part will be based on the open-source SRv6 ecosystem developed in the ROSE project: https://netgroup.github.io/rose/
Segment Routing (SR) is a tunneling and traffic engineering technology that allows routers to steer traffic along an SR path that may differ from the normal shortest path. An SR path is divided into segments that connect points within the SR domain. Segments are represented by Segment Identifiers (SIDs) that can identify single hops or multiple hops. The SR header or MPLS label stack enumerates the segments in the path to forward packets. SR supports various segment types including adjacency, prefix, anycast, and binding segments. SR provides traffic engineering capabilities and flexibility in path selection within the domain.
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
The document discusses how the number 512 relates to routing table sizes on Cisco and Brocade networking equipment. It analyzes growth trends in IPv4 and IPv6 BGP routing tables based on historical data. While absolute sizes are increasing, the annual growth rates have slowed slightly. Projections indicate routing tables could continue growing within the capabilities of current router technologies for the foreseeable future if trends continue.
Jose Saldana, Luigi Iannone, Diego R. Lopez, Julian Fernandez-Navajas, Jose Ruiz-Mas, "Enhancing Throughput Efficiency via Multiplexing and Header Compression over LISP Tunnels" . In Proc. Second IEEE Workshop on Telecommunication Standards: From Research to Standards, Collocated with IEEE ICC 2013, Budapest, Hungary. ISBN 9781467357524
This article explores the possibility of using traffic optimization techniques within the context of the LISP (Locator/ Identifier Separation Protocol) framework. These techniques use Tunneling, Multiplexing and header Compression of Traffic Flows (TCMTF) in order to save bandwidth and to reduce the amount of packets per time unit. Taking into account that encapsulation is necessary in LISP, bandwidth can be drastically reduced in flows using small packets, which are typical of many real-time services. The ability of the LISP framework to manage the signaling of TCMTF options is also studied. An analytical expression of the savings, as a function of the different header sizes, is devised and used to calculate the maximum expected savings. Different services and scenarios of interest are identified, and this allows the consideration of tests with real traffic traces, showing the savings as a function of the multiplexing period, and demonstrating that the additional delays can be acceptable for real-time services.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
This document provides an overview of segment routing and how it can enable SDN 2.0. Segment routing uses source routing by encoding a path as a segment list in packet headers. It provides a simple stateless forwarding model and enables edge intelligence with the ability for controllers to program segment lists. Use cases discussed include traffic engineering, fast reroute, and integration with SDN controllers using protocols like PCEP to establish segment routing paths without signaling in the core network.
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
Respond 3 of your colleagues' postings in one or more of the following ways:
· Ask a probing question.
· Share an insight from having read your colleague’s posting.
· Offer and support an opinion.
· Validate an idea with your own experience.
· Make a suggestion.
· Expand on your colleague’s posting.
Student #1
Routing protocols can be the Interior Gateway Protocol (IGP), which is for you internal networks and the exterior routing protocol is Exterior Gateway Protocol (EGP). This protocol maintains the routing information for networks (external) to your network. It only knows how to deliver data outside your network. EGP does not know how to deliver data within your network. Border Gateway Protocol (BGP) is the only EGP in use today. BGP is the routing protocol for the Internet.
Open Shortest Path First (OSPF) is starting to become the popular interior routing protocol (Tiso, 2011). If designing a new network, I would recommend OSPF or EIGRP because of the popularity, flexibility, and fast convergence. Reason I say OSPF is because there is not limitation on the hop count like there is with RIP (15). OSPF uses IP multicast to send link-state updates ("Cisco," 2014). Updates sent when routing changes occur instead of periodically. Better convergence since routing changes is instantaneously and not periodically.
My experience with OSPF occurred back in 2003 when a team I was working with was task to put in a new video teleconference network for an intelligence agency that consisted of over 250 rooms moving from H.320 to H.323. The network would consist of CONUS and OCONUS. Fourteen years later, equipment has been upgraded routers, switches, endpoints, etc. but the same routing protocol still used.
References
Cisco Networking Academy's Introduction to Routing Dynamically. (2014). Retrieved from http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=7
Tiso, J. (2011). Designing Cisco Network Service Architectures (ARCH): Developing an Optimum Design for Layer 3 (CCDP). Retrieved from http://www.ciscopress.com/articles/article.asp?p=1763921&seqNum=6
Student #2
Enhanced Interior Gateway Routing Protocol (EIGRP) is Cisco's proprietary routing protocol, based on IGRP. EIGRP is a distance-vector routing protocol, with optimizations to minimize routing instability incurred after topology changes, and the use of bandwidth and processing power in the router. Routers that support EIGRP will automatically redistribute route information to IGRP neighbours by converting the 32-bit EIGRP metric to the 24-bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation and provides fast router convergence.
Origin: Based only on Cisco’s implementation, not an Internet RFC
Type of protocol: Hybrid distance vector
Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)
Methodology: Sends hello packets every ...
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
In this modern internet era, routing protocol
plays an important role. They forward the packets form source
to destination. There are many routing protocols are used. In
this paper, we evaluated the performance of different routing
protocol like RIP and OSPF for IPv6. OPNET simulation tool
14.5 is used to evaluate the performance of RIP and OSPF in
three network models in which two network models will
perform on one routing protocol only while the third are used to
evaluate the performance of these routing protocol are packet
delay variation, end to end delay, traffic received, traffic sent,
response time, jitter, page response time, object response time,
traffic dropped for IPv6 Etc. we designed three scenarios to
compare their performance.
Richard Li discusses limitations of IPv4 and IPv6 for 5G, B5G, and 6G mobile network applications. He notes that IPv4/IPv6 yields huge bandwidth waste for mMTC, UCBC, HCS, and short texts due to large packet overhead. Additionally, IPv4/IPv6 cannot guarantee key performance indicators like latency and packet loss required for uRLLC and RTBC. As an alternative, Li proposes an incremental evolution of IPv4/IPv6 that includes flexible addressing systems, geography-based addressing, and integration of satellite and terrestrial networks to expand its applicability for future applications and services.
This document lists 100 interview questions for a CCNA certification covering topics like the OSI model, IP addressing, switching, routing protocols like OSPF and EIGRP, WAN technologies, network security concepts, and basic Cisco device configuration and troubleshooting. The questions assess knowledge of networking fundamentals including Ethernet, TCP/IP, VLANs, STP, routing, NAT, ACLs, firewalls, VPNs, and more.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes key OSPF concepts like link-state routing, shortest path first algorithm, areas, border routers, link-state advertisements, authentication, and route redistribution. It also covers OSPF configuration and design considerations for building large networks.
IPv4 addresses are nearly exhausted while IPv6 provides a vast address space to support continued Internet growth. While IPv4 and IPv6 can coexist, IPv6 adoption is needed as the only sustainable solution. Global metrics show increasing IPv6 deployment over time through allocations, routing entries, and user access, though challenges remain around applications, skills, and justification. RIRs and IETF are committed to IPv6 to maintain the openness and development of the Internet.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
Jeff Tantsura – Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications – mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WG’s. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
LACNOG (Latin America and the Caribbean Network Operators Group) The Forum of Network Operators of Latin America and the Caribbean aimed at the discussion and exchange of technical information related to network infrastructure and promotes the debate on issues of technical implementation and operational practices among the community members.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2. Confidential + Proprietary
Asia Pacific Americas Europe, Middle East, & Africa
Google Network
Regions, PoPs, Network
HK-G (HK, GU) 2019
Havfrue (US, IE, DK) 2019
Curie (CL, US) 2019
JGA (AU, GU, JP) 2019
Network
SJC (JP, HK, SG) 2013
Unity (US, JP) 2010
Faster (US, JP, TW) 2016
PLCN (HK, LA) 2019
Monet (US, BR) 2017
Junior (Rio, Santos) 2018
Tannat (BR, UY, AR) 2018
Indigo (SG, ID, AU) 2019
Dunant (US, FR) 2020
Edge points of
presence 134
3London
3
Netherlands
3
3 Finland
3
Belgium
Los Angeles
4Iowa
3 N. Virginia
3
S. Carolina
3 Montreal
3
São Paulo
3
Tokyo
3Osaka
3
Taiwan3
Mumbai
3
Sydney
3
Singapore
3Oregon
Current region and
number of zones
Future region and
number of zones
Frankfurt
Zurich
3
3
3
Edge points of
presence 134
3
Hong Kong
3Jakarta
Presented in April 2019 at MPLS/SDN Conference
3. Confidential + Proprietary
What is B2?
B2 is the Google backbone that carries all user facing traffic
● MPLS network which uses BGP, ISIS, RSVP-TE
● Multi-Vendor platform architecture
● Provides external connectivity to Google data centres
● Peering edge consists of vendor and SDN elements (Espresso)
Presented in April 2019 at MPLS/SDN Conference
4. Confidential + Proprietary
Google B2 Backbone Growth
B2 Growth (~7x growth in last 5 years)
Presented in April 2019 at MPLS/SDN Conference
5. Confidential + Proprietary
Managing Transit RSVP State
LSP state is expected to continue growing
#ofactiveRSVPReservations
Quarter
17q1 17q3 18q1 18q3 19q1 19q3 20q1 20q3 21q1 21q3
Presented in April 2019 at MPLS/SDN Conference
6. Confidential + Proprietary
Managing RSVP HeadEndsAches
Date (month)
#ofclearLSPevents
LSPs are cleared often to speed up re-optimization
Presented in April 2019 at MPLS/SDN Conference
7. Confidential + Proprietary
Shortest Path Placement
>98% of HIPRI LSPs remain on the shortest path
Presented in April 2019 at MPLS/SDN Conference
8. Confidential + Proprietary
Path Diversity
LSP pathing does not offer enough diversity
50% chance of avoiding
a common device
0% chance of avoiding a
common device
● 60-80% of LSPs may end up
on same device in metro
● ~7% of HIPRI LSPs never had
any diversity for time
observed
● ~99% of HIPRI LSPs failed to
have at least 50% of device
diversity for 23.55h day
● Higher probability of diversity
with larger number of LSPs =
more state required
Presented in April 2019 at MPLS/SDN Conference
9. Confidential + Proprietary
Segment Routing Traffic Steering:
● Stateless paths
● Pathing granularity and isolation for labeled and unlabeled traffic
● ECMP/WECMP not limited by number of LSPs (as is the case for RSVP HE)
RSVP Co-Existence:
● Shortest path placement
● Distributed bandwidth management
Streaming Telemetry:
● Event driven low latency data
Building Blocks of a Solution
Addressing RSVP Scale and Pathing Challenges Presented in April 2019 at MPLS/SDN Conference
11. Confidential + Proprietary
Network
SR Policy: Labeled and Unlabeled Traffic Steering
● SR labels can be used to steer traffic at HeadEnd(s)
○ Static policies can be invoked in addition to BGP
○ Advertising Segment Routing Policies in BGP https://tools.ietf.org/html/draft-ietf-idr-segment-routing-te-policy-xx
○ Segment Routing Policy Architecture https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-xx
Segment Routing Traffic Steering
Labeled Path
BGP
Static
SR label stack for Path1
Policy label
IP
SR label stack for Path n
IP
IP
IP
12. Confidential + Proprietary
Network
Segment Routing Traffic Steering
SR Policy: The Endpoint conundrum
● Scaling the Edge with color-only policies
○ https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-xx
A single <HEADEND, COLOR, NULL> (color only) policy can meet the following requirements:
● Steer both IPv4 and IPv6 traffic
● Steer based on traffic-class to devices behind a destination block
1
n
DestinationBlock
EdgeDevices
13. Confidential + Proprietary
RSVP Co-Existence
SR Shortcuts
● SR traffic can avoid RSVP LSP(s) at HE devices
Share our similarities, celebrate our differences
M Scott Peck
Network
14. Confidential + Proprietary
RSVP Co-Existence
Dark Bandwidth
● SR traffic can alter RSVP Maximum-Reservable-Bandwidth
○ Recommendations for RSVP-TE and Segment Routing (SR) Label Switched Path (LSP) Coexistence
https://tools.ietf.org/html/rfc8426
max-reservable-bw
RSVP
Dark
IP
InterfaceTraffic
RSVP
Reserved
InterfaceBandwidth
RSVP
Reserved
Dark
InterfaceBandwidth
max-reservable-bw
IP IP
RSVP
Unreserved
(0-7) Unreserved(0-7)
Network
Share our similarities, celebrate our differences
M Scott Peck
15. Confidential + Proprietary
Streaming Telemetry: Open Sourced Data
● Source-timestamped
○ Accurate rates
● Event-driven
○ Push as soon as the data changes (low latency)
● Subscription-based
○ Subscriptions are provided up front by the collectors
● gRPC Network Management Interface (gNMI)
○ http://github.com/openconfig/gnmi
gNMI
Streaming Telemetry
State Collector
gNMI Collector
Cache
Client
Client
Client
Network
16. Confidential + Proprietary
Current Feature Status
● Multi-Vendor Technology Adoption (shipping code)
○ ISIS-SR
○ Dark Bandwidth, SR Shortcuts
○ Forwarding State Programming (SR Policy)
● Multi-Platform Scale Improvements (shipping code)
○ Feature Rich Platforms
○ Lean Platforms (ongoing BRCM FEC optimizations work)
● Scaling Telemetry State (shipping code)
○ Ongoing event driven work
Continue Optimizing Scale and Cost