Watch the replay: http://cs.co/90028sLgC
We’re going to make this as simple as Cisco’s new Software-Defined Access makes building and managing more secure enterprise networks:
Do you want to streamline device provisioning and host onboarding? Automate policy and segmentation? Get performance insights you didn’t think possible? Of course you do.
Register for the workshop today to get performance insights you didn’t think possible.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
Watch the replay: http://cs.co/90028sLgC
We’re going to make this as simple as Cisco’s new Software-Defined Access makes building and managing more secure enterprise networks:
Do you want to streamline device provisioning and host onboarding? Automate policy and segmentation? Get performance insights you didn’t think possible? Of course you do.
Register for the workshop today to get performance insights you didn’t think possible.
Resources:
Watch the New Era of Networking playlist: http://cs.co/90058sI1U
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A first look at some of the work-in-progress features due in the upcoming CloudStack 4.18 release.
Boris is a committer and PMC at Apache CloudStack also works at ShapeBlue and is devoted to testing CloudStack.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Overview of the upcoming 802.11ac standard and what to expect from wave 1 and wave 2 products.
Customer expectations vs. the real features which are going to be available in "wave 1" and "wave 2" products. To avoid the unnecessary frustration...
Introduction to Software Defined WANs, by Alastair Johnson.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
Group of independent servers interconnected through a dedicated network to work as one centralized data processing resource.
Clusters are capable of performing multiple complex instructions by distributing workload across all connected servers.
Clustering improves the system's availability to users, its aggregate performance, and overall tolerance to faults and component failures.
Network functions virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualized entire classes of network node functions into building blocks that may connect, or chain together, to create communication services.
The international keynote speech of Prof. Augusto Neto at the II MOBISLICE workshop, co-located in the IEEE MFV/SDN 2019: “NECOS Project: Vision Towards Deeper Cloud Network Slicing”.
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A first look at some of the work-in-progress features due in the upcoming CloudStack 4.18 release.
Boris is a committer and PMC at Apache CloudStack also works at ShapeBlue and is devoted to testing CloudStack.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Overview of the upcoming 802.11ac standard and what to expect from wave 1 and wave 2 products.
Customer expectations vs. the real features which are going to be available in "wave 1" and "wave 2" products. To avoid the unnecessary frustration...
Introduction to Software Defined WANs, by Alastair Johnson.
A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
Group of independent servers interconnected through a dedicated network to work as one centralized data processing resource.
Clusters are capable of performing multiple complex instructions by distributing workload across all connected servers.
Clustering improves the system's availability to users, its aggregate performance, and overall tolerance to faults and component failures.
Network functions virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualized entire classes of network node functions into building blocks that may connect, or chain together, to create communication services.
The international keynote speech of Prof. Augusto Neto at the II MOBISLICE workshop, co-located in the IEEE MFV/SDN 2019: “NECOS Project: Vision Towards Deeper Cloud Network Slicing”.
The presentation slides of my Ph.D. thesis. For more information - https://kkpradeeban.blogspot.com/2019/07/my-phd-defense-software-defined-systems.html
Network slicing is a method of creating multiple unique logical and virtual networks on a common multi-domain infrastructure.
A different approach to view is that network slicing overlays multiple virtual networks on a shared network. Each part of the network can have its own logical topology, security rules and performance characteristics-within the limits imposed by the basic physical network.
Network slicing is a key function of 5G.
5G network slicing is a virtual network architecture that belongs to the same family as Software-defined Networking (SDN) and Network Function Virtualization (NFV).
The benefits of network slicing are:
It can help network operators reduce expenditure (OPEX) and capital expenditure (CAPEX).
It greatly improves the operational efficiency and time to market for delivering 5G network services.
A single network can be used to provide various services according to user needs and various use cases.
Network operators can allocate the proper amount of required resources as per network slice.
It overcomes all the shortcomings of the most popular QoS solution "DiffServ".
Fundamentals of 5G Network Slicing Training by Tonex
Fundamentals of 5G Network Slicing Training focuses on key principles, architecture and implementation of 5G network slicing.
Participants discover the way to effectively use network slicing across 5G core, RAN and transport networks. you'll also find out how network slicing is one among key components that provide 5G operation.
Audience:
Software Engineers
Network Design Engineers
Managers
Product management, marketing, planning, operations and employees with little or no experience in 5G or network slicing.
People who have 5G network experience but have never received any formal training on network slicing.
Learning Objectives:
How to implement network slicing in 5G networks
How to lay the foundation for 5G network slicing monetization
How to plan and design the lifecycle management of network slicing
How to implement network slicing and be able to support various services with specific performance or control requirements on a common network platform
Summary of 5G use cases and applications
5G network overview
How to implement operational KPIs on slice/service instantiation, termination, activation, deactivation, usage events, dynamic resource consumption based on slice/service/network functions, and performance and analysis events based on the set of network slice performance indicators
Course Agenda:
Overview of 5G Networks
Digital Transformation and Network Slicing
Network Slicing Deployment
Learn More;
https://www.tonex.com/training-courses/fundamentals-of-5g-network-slicing/
This is the 2nd defense of my Ph.D. double degree.
More details - https://kkpradeeban.blogspot.com/2019/08/my-phd-defense-software-defined-systems.html
Slides from the October 2016 meetup presentation of the Massachusetts Microservices Meetup group.
Kenzan
Twitter: @kenzanmedia
Linkedin: www.linkedin.com/company/kenzan-media
Blog: techblog.kenzan.com
Facebook: www.facebook.com/kenzanmedia/
The presentation slides of my Ph.D. thesis proposal ("CAT" as known in my university). I received a score of 18/20.
Supervisors:
Prof. Luís Veiga (IST, ULisboa)
Prof. Peter Van Roy (UCLouvain)
Jury:
Prof. Javid Taheri (Karlstad University)
Prof. Fernando Mira da Silva (IST, ULisboa)
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
1. EEDC
34330
NaaS: Networking as a
Execution Service, a new business
Environments for
model for network
Distributed
operators
Computing
Master in Computer Architecture,
Networks and Systems - CANS
EEDC Project
Group number: EEDC-2
Group members:
Muhammad Anis uddin Nasir
Emmanouil Dimogerontakis
2. Outline
● NaaS
● NaaS & Cloud
● Solution Approaches
● The Future of NaaS
*
3. Outline
● NaaS
● NaaS & Cloud
● Solution Approaches
● The Future of NaaS
*
5. The Service Trend NaaS
"Decoupling infrastructure management from service
management can lead to innovation, new business models,
and a reduction in the complexity of running services. It is
happening in the world of computing, and is poised to
happen in networking."
Jennifer Rexford, Eric Keller
*
6. Outline
● NaaS
● NaaS & Cloud
○ Cloud Limitations
○ Customer Interests
○ Other Possibilities
● NaaS Solutions
● The Future of NaaS
*
8. Cloud Limitations NaaS & Cloud
Limited visibility of network resources
○ No network monitoring
○ No multicast services
○ No custom path selection
Limited Security
○ No VPN establishment
○ Limited Network policies
○ Lack middlebox interposition
*
9. Customer Interests NaaS & Cloud
● Configure specific network policies
● Access to Data Plane
● Implement in-network services
● Performance
*
10. Other Possibilities NaaS & Cloud
Distinct network services can be provided by
○ Cloud-providers
○ Third-party providers
○ Research approaches
○ Network Virtualization (Overlay Networks etc.)
But a central efficient framework does not
exist.
*
11. Outline
● NaaS
● NaaS & Cloud
● NaaS Solutions
○ The Single Router
○ NaaS Boxes
○ CloudNaaS
● The Future of NaaS
*
12. The Single Router NaaS Solutions
"Basic Connectivity is Not Enough"
Goal: Provide in-network functionality for
● Customer controlled routing
● Cloud computing
● Gaming and Live video streaming
● Network Monitoring
*
13. The Single Router NaaS Solutions
What it provides?
○ Interactive Program (API)
○ Routing Policies
○ Access to Data Plane
○ General-purpose processing
*
15. The Single Router NaaS Solutions
Challenge:
Infrastructure is distributed
Solutions:
○ Choose a placement
○ Configure inter-processor communication
○ "Tune" the switch
○ Dynamic Adaptation
*
16. The Single Router NaaS Solutions
Challenge:
Infrastructure is shared
Solutions:
○ Single control process handling all customer's routing
sessions
○ tag with customer ID and and process each using
the particular customers policy
*
17. The Single Router NaaS Solutions
Benefits
● Automate configuration
● Manage separate services independently
● Simplify management
● Outsourced IT
*
22. NaaS Boxes NaaS Solutions
Benefits
● Fine grained control over small fraction of
applications:
○ Improve overall network efficiency
○ Improve performance for individual
customer
● Considers limited processing capabilities of network
components
*
23. CloudNaaS NaaS Solutions
SDN + Indirection + Host-Based
vSwitches
Goal: Deploy extensible set of network functions such as
● fine-grained network isolation
● custom addressing
● flexible interposition of various middleboxes
● optimizations for performance and availability
*
28. CloudNaaS NaaS Solutions
Benefits
● Allows network functions for production
enterprise applications in IaaS clouds
● Optimized for use in cloud
● Supported by experiments and simulations
● Innovative networking technology and
standards
● Existing prototype
*
29. Outline
● NaaS
● NaaS & Cloud
● NaaS Solutions
● The Future of NaaS
*
30. Future of NaaS
Opportunities:
● New business model
● New research horizons regarding NaaS:
○ Scalability, Performance, Isolation,
Programmability
○ pricing model
○ WAN extension
*
31. Conclusion
Network as a Service
● Provide to the users access to network infrastructure
● Must have: High level API, Security, Scalability
● Issues: Performance, Isolation, Programmability
● Different approaches proposed - still open research area
● NaaS can lead to new business models
*
32. References
1. Benson, T., Akella, A., Shaikh, A., & Sahu, S. (2011). CloudNaaS.
Proceedings of the 2nd ACM Symposium on Cloud Computing - SOCC ’11
(pp. 1-13). New York, New York, USA: ACM Press. doi:10.1145/2038916.
2038924
2. Chen, C.-C., Yuan, L., Greenberg, A., Chuah, C.-N., & Mohapatra, P.
(2011). Routing-as-a-Service (RaaS): A framework For tenant-directed
route control in data center. 2011 Proceedings IEEE INFOCOM (pp. 1386-
1394). Ieee. doi:10.1109/INFCOM.2011.5934924
3. Costa, P., Migliavacca, M., Pietzuch, P., & Wolf, A. L. (2012). NaaS:
Network-as-a-Service in the Cloud. USENIX. Retrieved from http://www.
doc.ic.ac.uk/~costa/papers/costa12naas.pdf
*
33. References
4. Dudkowski, D., Tauhid, B., Nunzi, G., & Brunner, M. (2011). A Prototype for
In-Network Management in NaaS-enabled Networks, 81-88.
5. Keller, E., & Rexford, J. (2010). The Platform as a service model for
networking. conference on Research on enterprise networking, (Section 3).
Retrieved from http://dl.acm.org/citation.cfm?id=1863137
6. Kim, H., Voellmy, A., Burnett, S., & Feamster, N. (2012). Lithium: Event-
Driven Network Control. Retrieved from http://smartech.gatech.
edu/handle/1853/43377
*
35. EEDC
34330
NaaS: Networking as a
Execution Service, a new business
Environments for
model for network
Distributed
operators
Computing
Master in Computer Architecture,
Networks and Systems - CANS
EEDC Project
Group number: EEDC-2
Group members:
Muhammad Anis uddin Nasir
Emmanouil Dimogerontakis