Network Virtualization with MidoNet in CloudStack
Presented at CloudStack Collaboration Conference, June 2013 in Santa Clara, by Yoshi Tamura and Dave Cahill
Michael Ritter discusses the inclusion of an IEEE 1588v2 mini-Grandmaster clock on the ADVA FSP 150 family of mobile backhaul products and its impact on LTE-Advanced radio access networks.
Helmut Griesser from ADVA Optical Networking discusses quantum-safe cryptography and quantum key distribution. He explains that quantum computers pose a threat to current public key encryption algorithms. Quantum key distribution provides absolute security by using quantum properties, but has limitations such as decreasing key rates with distance. Post-quantum or quantum-safe cryptography relies on unproven computational assumptions rather than physical properties. The best approach may be to combine diverse key exchange mechanisms like post-quantum, quantum key distribution, and classic public key encryption to strengthen security.
You Can Build Your OpenStack and Consume it TooPLUMgrid
The power of the community is what makes open source initiatives extremely transformational—like OpenStack. On the other hand, enterprise users who are looking at adopting this solution need to go through a steep learning curve and deep transformation of their internal team structure. The power of OpenStack is actually greatly amplified by the ecosystem of vendors around it that look at important aspects like support and hardening as well as augmentation of specific aspects (e.g. scalability and performance) that are needed in production environments bringing the most value to users. Join Rackspace and PLUMgrid product specialists to learn how we jointly enable our Private Cloud enterprise users to consume OpenStack and Software Defined Networks (SDN) as ONE solution that brings comprehensive security, scalability and performance and a rich set of operational tools.
This document discusses container networking challenges and how Nuage Networks provides an overlay network solution using MP-BGP. It summarizes that Nuage Networks can scale to support 100,000 containers across 200 networks and virtual routing contexts with convergence times under 10 minutes. It also describes how Nuage Networks can integrate containers running on VMs with physical servers and provide multi-tenancy, security and connectivity across cloud environments.
The Impact of Advanced Optical Technologies on Transport SDNADVA
Achim Autenrieth presented this slide set at the Future Internet Assembly in March 2014. It's all about the impact of advanced optical technologies on transport SDN.
This document discusses Mellanox's ConnectX-3 Pro networking adapter, which provides hardware offloading for overlay networks like VXLAN and NVGRE. This dramatically lowers CPU overhead, allowing more virtual machines to be supported per server. Test results show that with hardware offloading, VXLAN throughput is higher and CPU utilization is lower compared to software-only implementations. Offloading also reduces capital and operating expenses through increased server utilization and efficiency.
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...Midokura
This document discusses network virtualization in Infrastructure as a Service (IaaS) clouds. It outlines the requirements for cloud networks, including tenant isolation, L2-L3 segmentation, fault tolerance, and services like load balancing and firewalls. Traditional approaches like VLANs do not meet these requirements. The document proposes using edge-to-edge overlays with a scalable control plane as the best architecture. With overlays, virtual networks are decoupled from the physical network and intelligence is placed at the edge. MidoNet is presented as an example of an overlay network with a distributed control plane designed for IaaS clouds.
Michael Ritter discusses the inclusion of an IEEE 1588v2 mini-Grandmaster clock on the ADVA FSP 150 family of mobile backhaul products and its impact on LTE-Advanced radio access networks.
Helmut Griesser from ADVA Optical Networking discusses quantum-safe cryptography and quantum key distribution. He explains that quantum computers pose a threat to current public key encryption algorithms. Quantum key distribution provides absolute security by using quantum properties, but has limitations such as decreasing key rates with distance. Post-quantum or quantum-safe cryptography relies on unproven computational assumptions rather than physical properties. The best approach may be to combine diverse key exchange mechanisms like post-quantum, quantum key distribution, and classic public key encryption to strengthen security.
You Can Build Your OpenStack and Consume it TooPLUMgrid
The power of the community is what makes open source initiatives extremely transformational—like OpenStack. On the other hand, enterprise users who are looking at adopting this solution need to go through a steep learning curve and deep transformation of their internal team structure. The power of OpenStack is actually greatly amplified by the ecosystem of vendors around it that look at important aspects like support and hardening as well as augmentation of specific aspects (e.g. scalability and performance) that are needed in production environments bringing the most value to users. Join Rackspace and PLUMgrid product specialists to learn how we jointly enable our Private Cloud enterprise users to consume OpenStack and Software Defined Networks (SDN) as ONE solution that brings comprehensive security, scalability and performance and a rich set of operational tools.
This document discusses container networking challenges and how Nuage Networks provides an overlay network solution using MP-BGP. It summarizes that Nuage Networks can scale to support 100,000 containers across 200 networks and virtual routing contexts with convergence times under 10 minutes. It also describes how Nuage Networks can integrate containers running on VMs with physical servers and provide multi-tenancy, security and connectivity across cloud environments.
The Impact of Advanced Optical Technologies on Transport SDNADVA
Achim Autenrieth presented this slide set at the Future Internet Assembly in March 2014. It's all about the impact of advanced optical technologies on transport SDN.
This document discusses Mellanox's ConnectX-3 Pro networking adapter, which provides hardware offloading for overlay networks like VXLAN and NVGRE. This dramatically lowers CPU overhead, allowing more virtual machines to be supported per server. Test results show that with hardware offloading, VXLAN throughput is higher and CPU utilization is lower compared to software-only implementations. Offloading also reduces capital and operating expenses through increased server utilization and efficiency.
Introduction to Network Virtualization for IaaS Cloud by Midokura at LinuxCon...Midokura
This document discusses network virtualization in Infrastructure as a Service (IaaS) clouds. It outlines the requirements for cloud networks, including tenant isolation, L2-L3 segmentation, fault tolerance, and services like load balancing and firewalls. Traditional approaches like VLANs do not meet these requirements. The document proposes using edge-to-edge overlays with a scalable control plane as the best architecture. With overlays, virtual networks are decoupled from the physical network and intelligence is placed at the edge. MidoNet is presented as an example of an overlay network with a distributed control plane designed for IaaS clouds.
Kazuya Hashimoto
Executive Vice President
NEC Europe Ltd.
Plenaries Session
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...PLUMgrid
This document discusses the need for improved visualization and monitoring of OpenStack networks. Traditional tools provide limited views of virtual and physical network resources that are disconnected and text-heavy. This makes it difficult for operations teams to correlate issues across layers. The PLUMgrid CloudApex platform aims to bridge this gap with a real-time, configurable visualization of both virtual and physical resources. It provides heatmap and topology views to help operations teams more easily isolate problems in private cloud environments. The remainder of the document advertises an upcoming demo of the CloudApex capabilities.
Creating New Business Services for the IoT With Network Functions VirtualizationADVA
Check out details of our joint demo at SDN & OpenFlow World Congress with BT and Alchera Technologies. It’s all about delivering managed services with network functions virtualization.
Check out Stephan Rettenberger’s slides from Next Generation Optical Networking 2014 in Nice, France. This one’s all about where SDN fits in the data center.
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV SolutionsADVA
In a market where big data centers are considered the best way to serve customers, DartPoints is showing that the micro data center can be enormously successful. Read how NFV-enabled services based on ADVA Optical Networking’s Intel-powered FSP 150vSE and Ensemble Orchestrator software are a key driver for this success.
Meetup 1st _ SDN/NFV Use case in Operators' Networks: vCPEOPNFV_Vietnam
This document discusses virtual customer premises equipment (vCPE) as a top network functions virtualization (NFV) and software-defined networking (SDN) use case for network operators. It analyzes different deployment models for vCPE, including distributed, on the aggregation switch/provider edge router, and centralized. Centralized vCPE places virtualized customer equipment functions on network infrastructure virtualization in the edge point of presence. This allows simplified management and flexibility through SDN control. While each model has advantages, a hybrid approach combining centralized and distributed vCPE may be a new trend that operators are pursuing.
Hands-on Lab: Test Drive Your OpenStack NetworkPLUMgrid
Neutron is deployed in the majority of OpenStack clouds but it still constitutes one of the key areas of concerns for organizations world-wide. The transition from traditional hardware-centric networking to the software defined model takes time and learning and requires a mental shift as well as a change in workflows, procedures, tools and best-practices. In this session each participant will be provided with a personal sandbox OpenStack running a live Liberty-based environment and will work on common use cases and applications of SDNs in an OpenStack Cloud. The class will focus on test cases that will move beyond the basics of L2 and L3 and deploy VNFs such as NAT and security policies on top of a 3-tier application topology. The class will also go through exercises that are focused on monitoring and troubleshooting SDNs in an OpenStack cloud.
This document discusses network virtualization and its application to optical transport networks. It describes how network virtualization uses software abstraction to create logically isolated virtual networks. It then discusses some of the challenges in virtualizing complex optical networks, including technology differences between vendors. The document proposes using virtual overlay networks to virtualize optical networks while hiding their complexity from clients. It describes how optical networks can be exposed as virtual links or nodes to clients. Finally, it outlines various constraints in optical networks, like transponder tunability ranges, that would need to be abstracted and potentially exposed to properly construct virtual overlay networks over the physical optical domain.
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...ADVA
Our FSP 150 ProVM is a first for the industry. It’s the only carrier-grade virtual network functions edge solution on the market that can deliver comprehensive service assurance for both its integrated server as well as the connecting network.
Joint presentation on behalf of the Society of Cable Telecommunications Engineers (SCTE) between Cox Communications (Mazen Khaddem) and Cisco Systems (Dr. Loukas Paraschis). Presentation covers different SDN categories, NFV examples in business services, and use cases for WAN SDN.
Deploying HPC Cluster with Mellanox InfiniBand Interconnect Solutions Mellanox Technologies
This document provides guidance on deploying a high-performance computing (HPC) cluster with Mellanox InfiniBand interconnect solutions. It covers designing a fat-tree topology, performance calculations, communication library and quality of service support, subnet manager configuration, installation, verification and testing procedures. Best practices for cabling, labeling, and stress testing the cluster are also outlined.
The document discusses Mellanox's interconnect solutions for high performance computing and cloud environments. It notes that computing needs are growing exponentially, driving the need for faster interconnect technologies. Mellanox provides InfiniBand and Ethernet solutions that deliver the highest performance and return on investment, maintaining a generation lead over competitors. Mellanox's open platforms allow for flexibility and freedom of choice in software and management.
Mellanox provides end-to-end interconnect solutions including ICs, adapter cards, switches, software, and cables to connect data centers, metro areas, and WANs. Mellanox's Connect-IB adapters deliver the highest performance and ROI for clustering, with the world's first 100Gb/s adapter card and a 4x increase in messages per second over competitors. Connect-IB also provides the highest application performance, with up to 200% faster performance than competitors for WIEN2k and 54% faster performance for WRF simulations. Mellanox's GPUDirect RDMA technology further accelerates GPU-GPU communication with 69% lower latency and 3x higher throughput between nodes.
SDN will simplify network operation. Our demo this week at TNC combines automated provisioning with network slicing. All the details are in this flyer.
Mellanox's Chief Technology Officer Michael Kagan presented on Mellanox's technological advantage and roadmap. He discussed how the volume of data is growing exponentially and will reach 20 zettabytes by 2020. Mellanox is addressing this growth through innovations in high-speed interconnects like InfiniBand that use RDMA to provide high bandwidth and low latency connectivity for data centers and cloud computing. Mellanox has also achieved a strong track record of executing on its product roadmap over the past 15 years to deliver successive generations of InfiniBand and Ethernet adapters, switches, and software.
Our Ensemble Simulator precisely mirrors production networks for risk-free testing, training and development. Hosted on a self-provided server or in the cloud, this powerful new software tool enables multiple users to work independently in a virtual sandbox to evaluate configurations, verify APIs and simulate what-if scenarios. With Ensemble Simulator, optical network operators can significantly reduce the cost and unpredictability of network upgrades, accelerate innovation adoption and improve quality of experience for end users.
The document discusses EMC's ViPR software-defined storage platform. ViPR aims to virtualize storage from multiple vendors into a single pool and automate provisioning to reduce provisioning times from hours to seconds. It also provides data services and tools to help enable hybrid cloud storage capabilities.
This document discusses IPv6 deployment in wireless networks and the telco cloud. It summarizes that IPv6 is necessary as IPv4 addresses deplete. It has achieved global traffic growth but challenges remain around network complexity when introducing virtualization and services. Proper support of IPv6 is still needed in areas like OpenStack and mobile core virtualization to fully realize benefits. Future areas like 5G, fog computing and IoT will further drive the need for IPv6 deployment and management. The long term goal is full removal of IPv4 from networks.
Mellanox demos presented at Interop Tokyo, 2014 by Kazusa Tomonaga, Sr. System Engineer for Mellanox. The event was held June 11-13, 2014 at Makuhari Messe, Chiba Pref., Japan
Kazuya Hashimoto
Executive Vice President
NEC Europe Ltd.
Plenaries Session
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...PLUMgrid
This document discusses the need for improved visualization and monitoring of OpenStack networks. Traditional tools provide limited views of virtual and physical network resources that are disconnected and text-heavy. This makes it difficult for operations teams to correlate issues across layers. The PLUMgrid CloudApex platform aims to bridge this gap with a real-time, configurable visualization of both virtual and physical resources. It provides heatmap and topology views to help operations teams more easily isolate problems in private cloud environments. The remainder of the document advertises an upcoming demo of the CloudApex capabilities.
Creating New Business Services for the IoT With Network Functions VirtualizationADVA
Check out details of our joint demo at SDN & OpenFlow World Congress with BT and Alchera Technologies. It’s all about delivering managed services with network functions virtualization.
Check out Stephan Rettenberger’s slides from Next Generation Optical Networking 2014 in Nice, France. This one’s all about where SDN fits in the data center.
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV SolutionsADVA
In a market where big data centers are considered the best way to serve customers, DartPoints is showing that the micro data center can be enormously successful. Read how NFV-enabled services based on ADVA Optical Networking’s Intel-powered FSP 150vSE and Ensemble Orchestrator software are a key driver for this success.
Meetup 1st _ SDN/NFV Use case in Operators' Networks: vCPEOPNFV_Vietnam
This document discusses virtual customer premises equipment (vCPE) as a top network functions virtualization (NFV) and software-defined networking (SDN) use case for network operators. It analyzes different deployment models for vCPE, including distributed, on the aggregation switch/provider edge router, and centralized. Centralized vCPE places virtualized customer equipment functions on network infrastructure virtualization in the edge point of presence. This allows simplified management and flexibility through SDN control. While each model has advantages, a hybrid approach combining centralized and distributed vCPE may be a new trend that operators are pursuing.
Hands-on Lab: Test Drive Your OpenStack NetworkPLUMgrid
Neutron is deployed in the majority of OpenStack clouds but it still constitutes one of the key areas of concerns for organizations world-wide. The transition from traditional hardware-centric networking to the software defined model takes time and learning and requires a mental shift as well as a change in workflows, procedures, tools and best-practices. In this session each participant will be provided with a personal sandbox OpenStack running a live Liberty-based environment and will work on common use cases and applications of SDNs in an OpenStack Cloud. The class will focus on test cases that will move beyond the basics of L2 and L3 and deploy VNFs such as NAT and security policies on top of a 3-tier application topology. The class will also go through exercises that are focused on monitoring and troubleshooting SDNs in an OpenStack cloud.
This document discusses network virtualization and its application to optical transport networks. It describes how network virtualization uses software abstraction to create logically isolated virtual networks. It then discusses some of the challenges in virtualizing complex optical networks, including technology differences between vendors. The document proposes using virtual overlay networks to virtualize optical networks while hiding their complexity from clients. It describes how optical networks can be exposed as virtual links or nodes to clients. Finally, it outlines various constraints in optical networks, like transponder tunability ranges, that would need to be abstracted and potentially exposed to properly construct virtual overlay networks over the physical optical domain.
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...ADVA
Our FSP 150 ProVM is a first for the industry. It’s the only carrier-grade virtual network functions edge solution on the market that can deliver comprehensive service assurance for both its integrated server as well as the connecting network.
Joint presentation on behalf of the Society of Cable Telecommunications Engineers (SCTE) between Cox Communications (Mazen Khaddem) and Cisco Systems (Dr. Loukas Paraschis). Presentation covers different SDN categories, NFV examples in business services, and use cases for WAN SDN.
Deploying HPC Cluster with Mellanox InfiniBand Interconnect Solutions Mellanox Technologies
This document provides guidance on deploying a high-performance computing (HPC) cluster with Mellanox InfiniBand interconnect solutions. It covers designing a fat-tree topology, performance calculations, communication library and quality of service support, subnet manager configuration, installation, verification and testing procedures. Best practices for cabling, labeling, and stress testing the cluster are also outlined.
The document discusses Mellanox's interconnect solutions for high performance computing and cloud environments. It notes that computing needs are growing exponentially, driving the need for faster interconnect technologies. Mellanox provides InfiniBand and Ethernet solutions that deliver the highest performance and return on investment, maintaining a generation lead over competitors. Mellanox's open platforms allow for flexibility and freedom of choice in software and management.
Mellanox provides end-to-end interconnect solutions including ICs, adapter cards, switches, software, and cables to connect data centers, metro areas, and WANs. Mellanox's Connect-IB adapters deliver the highest performance and ROI for clustering, with the world's first 100Gb/s adapter card and a 4x increase in messages per second over competitors. Connect-IB also provides the highest application performance, with up to 200% faster performance than competitors for WIEN2k and 54% faster performance for WRF simulations. Mellanox's GPUDirect RDMA technology further accelerates GPU-GPU communication with 69% lower latency and 3x higher throughput between nodes.
SDN will simplify network operation. Our demo this week at TNC combines automated provisioning with network slicing. All the details are in this flyer.
Mellanox's Chief Technology Officer Michael Kagan presented on Mellanox's technological advantage and roadmap. He discussed how the volume of data is growing exponentially and will reach 20 zettabytes by 2020. Mellanox is addressing this growth through innovations in high-speed interconnects like InfiniBand that use RDMA to provide high bandwidth and low latency connectivity for data centers and cloud computing. Mellanox has also achieved a strong track record of executing on its product roadmap over the past 15 years to deliver successive generations of InfiniBand and Ethernet adapters, switches, and software.
Our Ensemble Simulator precisely mirrors production networks for risk-free testing, training and development. Hosted on a self-provided server or in the cloud, this powerful new software tool enables multiple users to work independently in a virtual sandbox to evaluate configurations, verify APIs and simulate what-if scenarios. With Ensemble Simulator, optical network operators can significantly reduce the cost and unpredictability of network upgrades, accelerate innovation adoption and improve quality of experience for end users.
The document discusses EMC's ViPR software-defined storage platform. ViPR aims to virtualize storage from multiple vendors into a single pool and automate provisioning to reduce provisioning times from hours to seconds. It also provides data services and tools to help enable hybrid cloud storage capabilities.
This document discusses IPv6 deployment in wireless networks and the telco cloud. It summarizes that IPv6 is necessary as IPv4 addresses deplete. It has achieved global traffic growth but challenges remain around network complexity when introducing virtualization and services. Proper support of IPv6 is still needed in areas like OpenStack and mobile core virtualization to fully realize benefits. Future areas like 5G, fog computing and IoT will further drive the need for IPv6 deployment and management. The long term goal is full removal of IPv4 from networks.
Mellanox demos presented at Interop Tokyo, 2014 by Kazusa Tomonaga, Sr. System Engineer for Mellanox. The event was held June 11-13, 2014 at Makuhari Messe, Chiba Pref., Japan
PLNOG 8: Piotr Głaska - Data Center Networking - Trends and suggestions PROIDEA
The document discusses data center networking trends and makes suggestions. It analyzes technologies like TRILL, FCoE/DCB, and Ethernet virtual bridging. It finds that TRILL/802.1aq faces challenges scaling beyond a few thousand servers and suggests using clustering for smaller deployments. FCoE/DCB integration faces standardization and industry chain issues. The network should balance security, sharing, and isolation for cloud environments.
Next Generation Optical Networking: Software-Defined Optical NetworkingADVA
Check out Stephan Rettenberger’s presentation from the Next Generation Optical Networking Conference in Monaco. It's all about Software Defined Optical Networking.
NAB2022: Essentials for Media over IP Network DesignKoji Oyama
When you try to build an ST-2110 based network, your first question may be "how should I design a specific Media-over-IP (MoIP) network?". Even if you design according to JT-NM TR-1001-1 guideline, you may still face on a lot of abbreviations about network technology during your detailed design phase, because most of which are what you, a broadcasting engineer, seldom hear so far. Especially it would be a big difference from SDI network design that we have to consider not only structural design for physical cable connections, but also logical and functional connections which are multiplexed bidirectionally in fiber cables.
This presentation provides you a basic design flow and elemental technologies that network engineers should know when they configure network switches on their MoIP networks. The technologies include VLAN, VRF, Multicast routing, IGMP, PIM, OSPF, LAG, and LACP, which are essentials for ST-2110 network but rarely heard in home network design.
I have been designing several MoIP networks by combining these elemental technologies. I also have been proving some trainings on the basics of IP network design for broadcast engineers. So, I would like to introduce realistic design process based on my experience. In addition, I am going to explain some design tips from a lot of my try-and-errors and my failures. The targeted audience is broadcasting engineers who are about to study how to build a MoIP network. I hope this presentation will guide them on what they need to learn to design network design techniques at the beginning.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
The document discusses ADVA's optical networking solutions for data center interconnectivity and security. It provides an overview of ADVA's dense wavelength division multiplexing (DWDM) hardware portfolio and solutions for applications such as data center interconnect, metro and long-haul networks, and synchronization. Specific products highlighted include the FSP 3000 for open optical networking and the FSP 150 for Ethernet and IP services. The document also covers how ADVA's solutions can provide secure connectivity between data centers with features like optical encryption.
Simple, Scalable and Secure Networking for Data Centers with Project CalicoEmma Gordon
Traditional overlay networks using VXLAN are more complicated to setup and diagnose than is necessary for the majority of data centers. Calico offers an alternative Layer 3 solution - aside from simplicity, this also offers benefits in terms of improved scale and security.
These are the Calico slides from the SDN Switzerland meetup on 13/11/2015,
A Novel Use of Openflow and Its Applications in Connecting Docker and Dummify...DaoliCloud Ltd
This document proposes a novel use of Openflow and its applications in connecting Docker containers and simplifying cloud deployment. Some key points:
- It aims to divide cloud infrastructure into smaller, independent parts to simplify deployment and scaling while using SDN techniques to reassemble them into a cloud with unlimited scalability.
- Near term applications include a zero-configuration plug-and-play cloud that reduces costs and expedites cloud maturity. Long term it could enable inter-cloud connectivity.
- It analyzes problems with current cloud networking practices and proposes using Openflow to map overlay entities to unique identifiers and route packets without encapsulation, eliminating the need for overlay entities to know each other.
This document provides an overview of emerging machine learning architectures, including cloud, edge, fog, and mist computing. It discusses the timeline of remote and machine learning computing from early cloud computing to current edge and fog approaches. The need for edge computing to address latency issues for applications like augmented reality and face recognition is explained. Key aspects of fog computing like its role in scalably extending cloud computing to network edges are covered. The document also provides an example of implementing deep learning for an IoT video recognition application across edge and cloud resources.
One of the key challenges for all public cloud providers, not just Oracle, is how to securely and reliably connect cloud services to their customers’ existing systems. This presentation provides an impartial view of Oracle Network Cloud’s three offerings, with a more detailed drill down into the VPN available for shared compute cloud.
First delivered by Simon Haslam on 6 December 2016 at the UKOUG Tech16 conference
The Top Outages of 2022: Analysis and TakeawaysThousandEyes
The document summarizes a presentation given by ThousandEyes on notable internet outages that occurred in 2022. It discusses the digital service building blocks of DNS, BGP, CDNs and cloud services. It then provides a top 10 countdown of major outages for services like Twitter, AWS, Zoom and WhatsApp. Each outage highlights lessons learned around the importance of monitoring applications and dependencies, avoiding single points of failure, and having visibility to understand complex network issues. The presentation concludes with general lessons around planning for BGP threats, cloud monitoring, and ensuring resiliency through architecture.
The document summarizes a presentation given by ThousandEyes on notable internet outages that occurred in 2022. It discusses outages that impacted services like Twitter, Google, AWS, British Airways and others. For each outage, it provides details on the impact and duration, and concludes with lessons learned regarding issues like single points of failure, cloud dependencies, BGP routing issues and the importance of network visibility. The presentation contained an agenda, descriptions of ThousandEyes capabilities, and a top 10 outage countdown with analysis of root causes and recommendations.
5g technology is a unique combination of high speed internet access , low latency , high reliability & seamless coverage which will support no. of vehicles & transport infrastructure. 5G platform will impact many industries like automotive , entertainment, agriculture , manufacturing and IT. As per the research forecast “IOT will account for one quarter of the global 41 million 5G connections in 2024”, out of these ¾ of the devices will be auto industry via embedded vehicle connections.
There are wide range of applications that will benefit from 5G ultra fast networks and real time responsiveness of the network.These properties of 5G technology are very important for many applications of IOT e.g self driven cars , intelligent transportation which demands very low latency .This will be a great boom for interactive mobile gaming which is bandwidth hungry application. 5G technology enables us to control more devices remotely in various applications where real time network performance is critical, like remote control of vehicles. It focuses on worker safety as well as monitoring environment. 5G technology is not focusing on improving speed , but this will prove best in evolution of business etc. IOT in 5G have excelled in connecting number of phones , tablets and other devices, however connecting cars , meters, sensors require more advanced business models.
5g technology is a unique combination of high speed internet access , low latency , high reliability & seamless coverage which will support no. of vehicles & transport infrastructure. 5G platform will impact many industries like automotive , entertainment, agriculture , manufacturing and IT. As per the research forecast “IOT will account for one quarter of the global 41 million 5G connections in 2024”, out of these ¾ of the devices will be auto industry via embedded vehicle connections.
There are wide range of applications that will benefit from 5G ultra fast networks and real time responsiveness of the network.These properties of 5G technology are very important for many applications of IOT e.g self driven cars , intelligent transportation which demands very low latency .This will be a great boom for interactive mobile gaming which is bandwidth hungry application. 5G technology enables us to control more devices remotely in various applications where real time network performance is critical, like remote control of vehicles. It focuses on worker safety as well as monitoring environment. 5G technology is not focusing on improving speed , but this will prove best in evolution of business etc. IOT in 5G have excelled in connecting number of phones , tablets and other devices, however connecting cars , meters, sensors require more advanced business models.
Building managedprivatecloud kvh_vancouversummitmatsunota
In 2013, KVH began looking to broaden its market by offering more open cloud solutions besides VMware cloud to its customer base. KVH quickly settled on OpenStack as the foundation for a new type of managed private data center, but also wanted to create an environment where customers could easily place application workloads in any of its data centers. Today, using OpenStack and MidoNet, KVH offers managed a private cloud service for enterprises, all while meeting a wide range of their specific requirements and minimizing operation complexity.
With TeraStream, Deutsche Telekom builds a drastically simplified IP end to end architecture. As part of TeraStream, network I/O optimized datacenters were tightly integrated with the IP infrastructure – the Infrastructure Cloud. As TeraStream is an IPv6-only network where IPv4 is delivered as a service, produced in the Infrastructure Cloud, the Infrastructure Cloud also needs to support IPv6 natively. This presentation covers DT's early experience out of the TeraStream pilots in Croatia and Germany, as well as an overview on the solution we are currently implementing.
Similar to Network Virtualization with MidoNet in CloudStack (20)
Journey to an Intelligent Industrial Network - Pino de Candia, CTO MidokuraMidokura
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity?
During his session at the Open IOT Summit, Pino de Candia, CTO of Midokura, shared examples drawn from real IIoT use cases and discussed the variety of operations and maintenance tools to support proactive, policy-based flow analysis for edge computing or fog nodes.
Midokura Enterprise MidoNet is a commercial product combining the most stable, production-hardened version of MidoNet for Network Virtualization with MidoNet Manager, longer term support and enterprise class 24X7 service level agreement.
MidoNet is an open source, software-only, highly scalable and resilient, network virtualization system. With its distributed architecture it allows enterprises and service providers to build, run, and manage virtual networks at scale with increased control, security and flexibility.
MidoNet is an open, software-only, highly scalable and resilient, network virtualization system. With its distributed architecture it allows enterprises and service providers to build, run, and manage virtual networks at scale with increased control, security and flexibility.
MidoNet allows users to build isolated networks in software and overlays the existing network hardware infrastructure.
http://www.midokura.com/
This document discusses MidoNet, an overlay network virtualization platform. It lists pros of MidoNet including deploying over IP, decoupling of workloads from the network, and distributed L2-L4 services. A caveat mentioned is poor visibility when the underlying network is not working and weak quality of service. The document also covers MidoNet's logical and physical views, private IP networking, fabric integration goals including monitoring and troubleshooting, hybrid clouds, multi-cloud federation, and policy networking.
This document discusses software-defined networking (SDN) as it relates to cloud networking. It provides an overview of SDN and how it addresses some of the challenges with traditional network architectures. Specifically:
- Traditional networks separate the control plane and data plane, which limits flexibility. SDN abstracts the network through centralization of the control plane.
- SDN is useful for cloud service providers to provide multi-tenancy, security isolation, scalable routing/switching, and programmability through APIs. Edge-to-edge overlays are a good model for cloud networking by decoupling virtual networks from the physical underlay.
- While overlays address some issues, a scalable SDN
This document discusses the requirements and challenges of networking in an Infrastructure as a Service (IaaS) cloud environment. It proposes using distributed overlay-based network virtualization as a solution. Key points include:
- Traditional networking devices do not scale well for IaaS clouds with high churn and micro-granularity needs.
- An overlay-based approach using encapsulation can build a virtual network that decouples from the physical network and handles network intelligence at the edge.
- The Midokura solution presented uses this approach with a distributed control plane, centralized database, and packet processing at ingress points.
- It integrates with popular cloud stacks like OpenStack and CloudStack to provide scalable L
Midokura is launching MidoNet, its software-defined virtual network, in the US market. MidoNet will be introduced at the OpenStack conference on October 15th. It provides fully distributed and decentralized networking that is built for IaaS stacks. MidoNet addresses issues with existing cloud networking by automating provisioning and scaling, providing network isolation between tenants, and ensuring resiliency through its distributed architecture. It also lowers costs by running network intelligence in software on standard hardware. MidoNet integrates tightly with OpenStack.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.