Joon-Myung Kang and Mario A. Sánchez's presentation at the 2017 Open Networking Summit.
Intent-based networking has gained a lot of interest in recent years with several different open source communities (including ONF, OpenDaylight and ONOS). However, network diagnosis and troubleshooting remain two essential aspects of network management that still require massive manual effort and extensive expert knowledge. So far, no approach has focused on troubleshooting the network at the intent level. We argue that providing reasoning capabilities about why an observed network state happens according to specified input policies can help simplify this complexity. In this talk, we present our work on network troubleshooting at the intent level. Our solution provides capabilities to enable posing what-if type questions at the policy level –e.g. when a new input policy is introduced– to help answer reachability questions both at the policy and infrastructure level.
Istio ambient mesh uses a sidecar-less data plane that focuses on ease of operations, incremental adoption, and separation of security boundaries for applications and mesh infrastructure.
In this webinar, we'll explore:
- The forces of modernization and compliance pressures,
- How Zero Trust Architecture (ZTA) can help, and
- How Istio ambient mesh lowers the barrier for establishing the properties necessary to achieve Zero Trust and compliance
The CSA STAR Programs will provide your organization an additional assessment to showcase your overall compliance program.
Cloud security providers are in an ever changing world. Traditionally the CCM was pointed to as an authoritative guidance. Now organizations have the opportunity to undergo third party assessments, through the STAR Programs to validate maturity level or control activities.
This slideshow will cover:
• A background and overview of the programs.
• A deep-dive of the CSA Attestation/Certification methodology and testing.
• A side by side comparison.
• The benefits and challenges.
Information Security between Best Practices and ISO StandardsPECB
Main points covered:
• Information Security best practices (ESA, COBIT, ITIL, Resilia)
• NIST security publications (NIST 800-53)
• ISO standards for information security (ISO 20000 and ISO 27000 series)
- Information Security Management in ISO 20000
- ISO 27001, ISO 27002 and ISO 27005
• What is best for me: Information Security Best Practices or ISO standards?
Presenter:
This webinar was presented by Mohamed Gohar. Mr.Gohar has more than 10 years of experience in ISM/ITSM Training and Consultation. He is one of the expert reviewers of CISA RM 26th edition (2016), ISM Senior Trainer/Consultant at EGYBYTE.
Link of the recorded session published on YouTube: https://youtu.be/eKYR2BG_MYU
IBM InfoSphere Guardium provides the simplest, most robust solution for assuring the privacy and integrity of trusted information in your data center (SAP, PeopleSoft, Cognos, Siebel, etc.) and reducing costs by automating the entire compliance auditing process in heterogeneous environments.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Istio ambient mesh uses a sidecar-less data plane that focuses on ease of operations, incremental adoption, and separation of security boundaries for applications and mesh infrastructure.
In this webinar, we'll explore:
- The forces of modernization and compliance pressures,
- How Zero Trust Architecture (ZTA) can help, and
- How Istio ambient mesh lowers the barrier for establishing the properties necessary to achieve Zero Trust and compliance
The CSA STAR Programs will provide your organization an additional assessment to showcase your overall compliance program.
Cloud security providers are in an ever changing world. Traditionally the CCM was pointed to as an authoritative guidance. Now organizations have the opportunity to undergo third party assessments, through the STAR Programs to validate maturity level or control activities.
This slideshow will cover:
• A background and overview of the programs.
• A deep-dive of the CSA Attestation/Certification methodology and testing.
• A side by side comparison.
• The benefits and challenges.
Information Security between Best Practices and ISO StandardsPECB
Main points covered:
• Information Security best practices (ESA, COBIT, ITIL, Resilia)
• NIST security publications (NIST 800-53)
• ISO standards for information security (ISO 20000 and ISO 27000 series)
- Information Security Management in ISO 20000
- ISO 27001, ISO 27002 and ISO 27005
• What is best for me: Information Security Best Practices or ISO standards?
Presenter:
This webinar was presented by Mohamed Gohar. Mr.Gohar has more than 10 years of experience in ISM/ITSM Training and Consultation. He is one of the expert reviewers of CISA RM 26th edition (2016), ISM Senior Trainer/Consultant at EGYBYTE.
Link of the recorded session published on YouTube: https://youtu.be/eKYR2BG_MYU
IBM InfoSphere Guardium provides the simplest, most robust solution for assuring the privacy and integrity of trusted information in your data center (SAP, PeopleSoft, Cognos, Siebel, etc.) and reducing costs by automating the entire compliance auditing process in heterogeneous environments.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.
(Source : RSA Conference USA 2017)
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Jonathan Pollet and Mark Heard of Red Tiger Security at S4x15 OTDay.
The NIST Cybersecurity Framework (CSF) has been out for a year now, and some owner/operators have begun to use it to help create an ICS cyber security program. The Red Tiger Security team discusses what the CSF is and there experience in using it with real world clients.
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaEdureka!
** Cybersecurity Online Training: https://www.edureka.co/cybersecurity-certification-training**
This Edureka tutorial talks about the Top 10 Reasons to Learn Cybersecurity and what makes the Cybersecurity a lucrative career choice.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
If your business is registered in Australia or you plan to expand your website or app to the Australian market, you must comply with the Privacy Act of 1988.
This presentation discusses the Act and how you can comply with its privacy principles to protect your company from liability.
Read the related blog article here:
https://termsfeed.com/blog/australia-privacy-act-1988/
How to perform an Infrastructure Security Gap AnalysisCarlo Dapino
This presentation was designed to share and propose a methodology across the cyber security community, to perform Infrastructure Security Architecture Gap Analysis. This methodology is adopting a threat analysis model to infrastructure design, allowing a reusable process to score the infrastructure security controls maturity and overall security maturity posture. This methodology was crafted by Carlo Dapino, aka Acklost , for more information visit my website https://carlo.dapino.info
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
To help organizations identify optimal solutions and best practices in support of CIAM objectives, leading IT research firm Enterprise Management Associates (EMA) conducted survey-based research of organizations actively employing CIAM solutions.
These slides provide some of the key findings from this research as well as actionable guidance on how to optimize your organizations CIAM deployments.
How To Set Security Awareness Strategic Goals, KPIs and MetricsTerranova Security
Understand the difference between goals, KPIs and metrics in security awareness.
Set strategic goals, objectives, KPIs & metrics based on your organisations needs and culture.
Collect and analyse data related to compliance, behavior and culture.
SOC 2 Type 2 Checklist - Part 1 - V2.pdfInfosectrain3
Looking for answers related to SOC? Here's a 𝐒𝐎𝐂 𝟐 𝐓𝐲𝐩𝐞 𝟐 𝐂𝐡𝐞𝐜𝐤𝐥𝐢𝐬𝐭 to help you keep an eye out for these critical aspects in your #SOC. Don't forget to save this checklist for your SOC compliance journey!
Running or planning on deploying a large ClearPass cluster? See what others are doing in larger environments to improve their deployments This session is designed to help customers that run the largest and most demanding networks learn how to deal with multiple locations, 100k+ endpoints, and strict SLA’s. Come to this session to discuss architecture for distributed deployments and how to better design your install for high performance, high availability needs. This is the one session where we’ll include the most experienced ClearPass team members for what will be a highly interactive session.
The development and deployment of an enterprise Security Policy that defines the what and how of enterprise security is now mandated by numerous regulatory and industry standards, such as HIPAA and PCI-DSS. The development of a Security Policy, however, generally takes specialized skills that most organizations do not have. As a result, the process either takes a significant amount of time, or a significant amount of money.
Info-Tech’s Security Policy Solution Set will help you:
•Understand what goes into a Security Policy and why.
•Determine which specific policies are required by your organization.
•Streamline the creation of a policy set via customizable standards-based templates.
•Implement policies in an order that makes sense.
•Understand policy enforcement.
Use this material to build the Policies you need to be protected and compliant without spending a penny.
EMA’s market research, “Network Observability: Delivering Actionable Insights to Network Operations,” establishes a roadmap for how vendors should improve their products to deliver deep visibility and actionable insights. More importantly, this research will help IT buyers understand what network management vendors mean when they talk about network observability and how they can turn that understanding into NetOps success.
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
"Email security guidelines 2019, by RBI"
For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Key takeaways included an actionable plan to refactor and upgrade your IT systems in bite-sized phases, to meet the updated requirements.
In this webinar Sunil Uttam, Co-founder of Mithi covered:
1. Why email has to be secured and preserved in banks.
2. Understanding RBI's 2019 cyber security guidelines for email use in banks.
3. Common queries asked by RBI auditors and how to prepare for them.
4. Best practices to build a secure email platform.
Network Intent Composition in OpenDaylightOpenDaylight
There is a flurry of activity on policy and intent in Software-defined Networks. The NIC project in OpenDaylight focuses on enabling the controller to manage and direct network services and network resources based on app-described “Intents”. The Intent based NBI allows for a descriptive way to get what is desired from the infrastructure, unlike the current SDN interfaces which are based on describing how to provide different services. The Network Intent Composition function will use existing OpenDaylight Network Service Functions and Southbound Plugins to control both virtual and physical network devices.
Presentation of the status of my PhD in 2012 done to ABLE group at Carnegie Mellon.
Years later from that appeared
https://github.com/iTransformers/netTransformer
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.
(Source : RSA Conference USA 2017)
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Jonathan Pollet and Mark Heard of Red Tiger Security at S4x15 OTDay.
The NIST Cybersecurity Framework (CSF) has been out for a year now, and some owner/operators have begun to use it to help create an ICS cyber security program. The Red Tiger Security team discusses what the CSF is and there experience in using it with real world clients.
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaEdureka!
** Cybersecurity Online Training: https://www.edureka.co/cybersecurity-certification-training**
This Edureka tutorial talks about the Top 10 Reasons to Learn Cybersecurity and what makes the Cybersecurity a lucrative career choice.
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
If your business is registered in Australia or you plan to expand your website or app to the Australian market, you must comply with the Privacy Act of 1988.
This presentation discusses the Act and how you can comply with its privacy principles to protect your company from liability.
Read the related blog article here:
https://termsfeed.com/blog/australia-privacy-act-1988/
How to perform an Infrastructure Security Gap AnalysisCarlo Dapino
This presentation was designed to share and propose a methodology across the cyber security community, to perform Infrastructure Security Architecture Gap Analysis. This methodology is adopting a threat analysis model to infrastructure design, allowing a reusable process to score the infrastructure security controls maturity and overall security maturity posture. This methodology was crafted by Carlo Dapino, aka Acklost , for more information visit my website https://carlo.dapino.info
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
To help organizations identify optimal solutions and best practices in support of CIAM objectives, leading IT research firm Enterprise Management Associates (EMA) conducted survey-based research of organizations actively employing CIAM solutions.
These slides provide some of the key findings from this research as well as actionable guidance on how to optimize your organizations CIAM deployments.
How To Set Security Awareness Strategic Goals, KPIs and MetricsTerranova Security
Understand the difference between goals, KPIs and metrics in security awareness.
Set strategic goals, objectives, KPIs & metrics based on your organisations needs and culture.
Collect and analyse data related to compliance, behavior and culture.
SOC 2 Type 2 Checklist - Part 1 - V2.pdfInfosectrain3
Looking for answers related to SOC? Here's a 𝐒𝐎𝐂 𝟐 𝐓𝐲𝐩𝐞 𝟐 𝐂𝐡𝐞𝐜𝐤𝐥𝐢𝐬𝐭 to help you keep an eye out for these critical aspects in your #SOC. Don't forget to save this checklist for your SOC compliance journey!
Running or planning on deploying a large ClearPass cluster? See what others are doing in larger environments to improve their deployments This session is designed to help customers that run the largest and most demanding networks learn how to deal with multiple locations, 100k+ endpoints, and strict SLA’s. Come to this session to discuss architecture for distributed deployments and how to better design your install for high performance, high availability needs. This is the one session where we’ll include the most experienced ClearPass team members for what will be a highly interactive session.
The development and deployment of an enterprise Security Policy that defines the what and how of enterprise security is now mandated by numerous regulatory and industry standards, such as HIPAA and PCI-DSS. The development of a Security Policy, however, generally takes specialized skills that most organizations do not have. As a result, the process either takes a significant amount of time, or a significant amount of money.
Info-Tech’s Security Policy Solution Set will help you:
•Understand what goes into a Security Policy and why.
•Determine which specific policies are required by your organization.
•Streamline the creation of a policy set via customizable standards-based templates.
•Implement policies in an order that makes sense.
•Understand policy enforcement.
Use this material to build the Policies you need to be protected and compliant without spending a penny.
EMA’s market research, “Network Observability: Delivering Actionable Insights to Network Operations,” establishes a roadmap for how vendors should improve their products to deliver deep visibility and actionable insights. More importantly, this research will help IT buyers understand what network management vendors mean when they talk about network observability and how they can turn that understanding into NetOps success.
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
"Email security guidelines 2019, by RBI"
For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Key takeaways included an actionable plan to refactor and upgrade your IT systems in bite-sized phases, to meet the updated requirements.
In this webinar Sunil Uttam, Co-founder of Mithi covered:
1. Why email has to be secured and preserved in banks.
2. Understanding RBI's 2019 cyber security guidelines for email use in banks.
3. Common queries asked by RBI auditors and how to prepare for them.
4. Best practices to build a secure email platform.
Network Intent Composition in OpenDaylightOpenDaylight
There is a flurry of activity on policy and intent in Software-defined Networks. The NIC project in OpenDaylight focuses on enabling the controller to manage and direct network services and network resources based on app-described “Intents”. The Intent based NBI allows for a descriptive way to get what is desired from the infrastructure, unlike the current SDN interfaces which are based on describing how to provide different services. The Network Intent Composition function will use existing OpenDaylight Network Service Functions and Southbound Plugins to control both virtual and physical network devices.
Presentation of the status of my PhD in 2012 done to ABLE group at Carnegie Mellon.
Years later from that appeared
https://github.com/iTransformers/netTransformer
If your business is heavily dependent on the Internet, you may be facing an unprecedented level of network traffic analytics data. How to make the most of that data is the challenge. This presentation from Kentik VP Product and former EMA analyst Jim Frey explores the evolving need, the architecture and key use cases for BGP and NetFlow analysis based on scale-out cloud computing and Big Data technologies.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...Cisco Canada
Loukas Paraschis, Technology Solution Architecture at Cisco presents software innovation and control plane evolution in the new SDN transport at Cisco Connect Toronto 2015.
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
Lila Rousseaux, Consulting Systems Engineer, Enterprise Networks and Tim Szigeti, Technical Marketing Engineer discusses SDN in the enterprise at Cisco Connect Toronto 2015.
Many thanks to Nick McKeown (Stanford), Jennifer Rexford (Princeton), Scott Shenker (Berkeley), Nick Feamster (Princeton), Li Erran Li (Columbia), Yashar Ganjali (Toronto)
Cisco Automation with Puppet and onePK - PuppetConf 2013Puppet
"Cisco Automation with Puppet and onePK" by Jason Pfeifer Technical Marketing Engineer, Cisco.
Presentation Overview: This session will provide an overview of the cisco developed puppet functionality for management and configuration of Cisco devices.
Speaker Bio: Jason is a Cisco Technical Marketing Engineer focusing on programmability and automation of Cisco network devices. He is currently supporting, discussing, evangelizing, and writing applications against Cisco's onePK SDK. He also has a long term love affair with Cisco's Embedded Event Manager.
Выявление и локализация проблем в сети с помощью инструментов RiverbedElena Marianenko
В условиях непрерывного роста сложности сетевой инфраструктуры и приложений, ИТ крайне необходим комплексный подход к мониторингу. С другой стороны, принимая во внимание, что больше половины рабочего времени ИТ тратит на расследование обращений конечных пользователей, важность именно проактивного мониторинга неоспорима. Но что делать, когда все выглядит хорошо, но пользователь продолжает жаловаться на плохую работу сети и приложений?
Доклад посвящен не только платформе проактивного мониторинга компании Riverbed — лидера на рынке мониторинга производительности сети и приложений — но также и решениям для устранения «узких мест» в сетевой инфраструктуре.
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
Question 7 of 30 . Which type of hardware can.pdfaman05bhatia1
Question 7 of 30 . Which type of hardware can be reprogrammed to the desired application or
functionality requirements after manufacturing? FPGA ASIC CPU Accelerator Mark for follow
up Question 8 of 30. What is an advantage for L1 Inline (or full L1 accelerator) acceleration for
5G? Relieve the general-purpose CPUs (GPPs) from the ultra-high L1processing demands.
Supports multiple vDU SW vendors. Supports acceleration for only LDPC forward error
correction. Using a in-line acceleration leaves the CPU free to use itscycles to process other L1
useful tasks. Mark for follow up Question 9 of 30 . Which type of Cloud deployment is used for
exclusive use of the owner? Public Cloud Private Cloud Hybrid Cloud Mark for follow up
5G Cloud Native RAN Orchestration \& Automation Question 18 of 30 . What procedure of the
Life Cycle Management involves uninstalling a container network function to free up resources
on the cluster? Termination Deletion Onboarding Instantiation Mark for follow up Question 19
of 30. In the O-RAN architecture, which component is responsible for the cloud management
and orchestration functions? SMO Non-Real time RIC. Near-Real time RIC. DMS Mark for
follow up Question 20 of 30. True False Mark for follow up
Test - Nokia Bell Labs 5G Cloud Native RAN Exam | BL00460-E-2207 5G Cloud Native RAN
Evolution and Challenges Question 10 of 30 . How does the RAN Intelligent Controller use
AI/ML in the RAN? Enables external applications to control aspects of the 5G network. Enables
RAN programmability. RIC is deployed in Edge data centers and can support classical and cloud
RAN. Provides O1 interface towards SMO. Mark for follow up Question 11 of 30. Which of the
following challenges applies to DevSecOps ? Capability to push new code into real production.
Non-Optimal performances with generic code. Separation of tightly intertwined functions from
application and platform. Adding modularity increases system complexity. Mark for follow up
Question 12 of 30 . Which of the following is a challenge in implementing a microservice
architecture for cloud native RAN?
Test - Nokia Bell Labs 5G Cloud Native RAN Exam | BL00460-E-2207 5G Cloud Native RAN
Open Interfaces and API Question 13 of 30 . The fronthaul interface protocol specified by O-
RAN is based. CPRI eCPRI OBSAI PDH Mark for follow up Question 14 of 30 . In the O-RAN
ALLIANCE specified fronthaul low level split (LLS) options, which two protocol functions are
moved to the RU in 7-2e compared to 7-2? Beamforming and RF. IRC and Channel estimation.
MAC and RLC. RRC and PDCP. Mark for follow up Question 15 of 30 . What is the purpose of
the E1 interface in the gNB?
Question 21 of 30 . Why do we need automation in network operations for 5G ? (Choose 2)
Reduced network complexity enables easier automation to save costs. New business dimensions
and opportunities to support specialized and customized services. Increased network complexity
requires automation to help manage and deploy. Container-as.
This presentation focuses on the networking requirements using open source to treat diseases through cell-based analysis at the molecular level. Transporting this knowledge across devices and centers requires a whole new structure and networking. Terabits per second with high-availability and guaranteed delivery is required to meet the needs. Shared knowledge is the critical for real-time analysis. This will discuss data flows, open networking, and databases that are all open source and have been optimized for this problem.
Keynote presentation by Amin Vahdat on behalf of Google Technical Infrastructure and Google Cloud Platform. Presentation was delivered at the 2017 Open Networking Summit.
SD-WAN is a hot technology that is moving from the drawing board to production. It has changed the WAN equation forever and resulted in enterprises looking at the Connectively and Carrier Services quite differently.
It is an SDN use case to connect enterprise locations over large distances. It promises to reduce enterprises’ IT expenses by using broadband connections and running managed services in the cloud.
It simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. Panel will discuss details of use cases that standards and Operators are deploying e.g. including major multi-operator MEF reference implementation of Orchestrated L3VPN.
In this presentation, the SDN-Based Enterprise Connectivity Service Architecture of China Unicom will be introduced. And the four use cases will be discussed, including: “Flexible access for enterprise, Cloud access and resource centralized, High efficiency, elastic transport for DCI, Extensible VAS deployment for services”. Finally, some commercial experience in China Unicom will be shared.
Traditional carriers' transport networks consist of vertically-integrated devices with vendor-proprietary interfaces, that causes "vendor lock in" environment and interferes with adopting software based control and configuration for carriers' transport networks. NTT Communications are trying to adopt disaggregation approach for them to transform our operations by integrating commoditized multi-vendor components and SDN technology.
In this presentation, we will talk about our expectations for disaggregated transport networks and its controller architecture with multiple SDN controllers including open source software. Furthermore, we will show our internal evaluation result of disaggregated transport network feasibility and discuss future development plans.
Disaggregated Networking - The Drivers, the Software & The High AvailabilityOpen Networking Summit
Dis-agregration is real… This trend started with SDN and the separation of Data plane and Control plane. The scope has expanded to include separate of hardware and software and created a whole new industry of white boxes, general purpose X86 commodity hardware. All three markets - Cloud, Enterprise and Carriers are now engaged in various solutions inside the Data Center. The disaggregation is impacted all parts of the network including Access and Edge layers.
amounts of IoT data from connected devices and building infrastructure while simultaneously guaranteeing sensitive information remains private. To do this many factors need to be considered: policy for traffic prioritization, techniques for network partitioning, common APIs and standards, and shared data and security models. Should a smart city network be a shared infrastructure following a public utility model? To what extent do smart city networks need to be open while remaining secure? What open network initiatives do we need to enable building large scale networks for smart cities?
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Networking Summit
Prem Sankar's presentation from the 2017 Open Networking Summit.
Microservice is gaining increased adoption in the Telco NFV world. It is key to understand the design and deployment methodologies involved in developing Microservice based VNF. This talk provides an opensource practitioner approach to building and deploying a Microservice based VNF and includes the following: - Design patterns, workflow models - Design models for VNF placement, capacity management, scale-in/out and resiliency - Deployment considerations that includes handing of scale and fault tolerant VNF using well known Opensource tools
Martin Šuňal's presentation from Open Networking Summit 2017.
Network Function Virtualization (NFV) and Service Function Chaining (SFC) have been hot topics for some time, but many users are still finding it difficult to adopt these concepts in the real world. Since network functions are getting virtualized/containerized and service chaining is a requirement in many NFV use cases, there is a need for container service chaining. This presentation discusses problems with existing approaches, potential solutions and benefits of container service chaining.
Arachne: How does Uber check the health of its Network Infrastructure every 1...Open Networking Summit
One of the major challenges and requirements in achieving a very high (>99.99%) reliability of operation of any major network infrastructure (i.e. data center, enterprise, campus, etc.) is the ability to design and deploy an always-on active system that performs end-to-end functional testing of all the network-connected infrastructure components and, as a result, monitors the infrastructure and its dependent external services with high accuracy and granularity (down to the packet level) in the most efficient way; consuming the least amount of computational or network resources.
When it comes to packet loss detection, metrics reported by the original manufacturers cannot be relied upon; their tools may either be buggy or, in most cases, do not provide APIs for extracting measurements. Therefore, we needed to create our own tool; this is the gap Arachne is filling.
In this talk, we present Arachne. Arachne is a packet loss detection system and an underperforming path detection system. It provides fast and easy active end-to-end functional testing of all the components in Data Center (DC) and Cloud infrastructures. Arachne is able to detect intra-DC, inter-DC, DC-to-Cloud, and DC-to-External-Services issues by generating minimal traffic.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. Software-Defined Networking
Application Plane
(SDN Apps)
Control Plane
(OpenDaylight, ONOS, etc.)
Infrastructure (Data) Plane
(Cloud/IT/SDN/NFV)
Open APIs
Program Languages
Abstraction
SDN Northbound Interfaces
Infrastructure Control Interfaces
Vendor specific
Low-level specifics
Manual operations
…
3
4. Software-Defined Networking
Application Plane
(SDN Apps)
Control Plane
(OpenDaylight, ONOS, etc.)
Infrastructure (Data) Plane
(Cloud/IT/SDN/NFV)
Open APIs
Program Languages
Abstraction
SDN Northbound Interfaces
Infrastructure Control Interfaces
Vendor specific
Low-level specifics
Manual operations
…
4
5. Intent-based Networking
Application Plane
(SDN Apps)
Control Plane
(OpenDaylight, ONOS, etc.)
Infrastructure (Data) Plane
(Cloud/IT/SDN/NFV)
INTENT North Bound Interface
Infrastructure Control Interfaces
− Application Plane says “What” (doesn’t care how)
− Control Plane reasons “How” (doesn’t care why)
Intent
− “what”, not “how” (non-prescriptive)
− Is portable
− Is universal
− Is compose-able
− Is invariant
− Is scale-able
Source: Dave Lenrow, “Intent As The Common Interface to Network Resources,” Intent Based Network Summit 2015 ONF Boulder: Intent NBI
Intent
“I want my headache
to stop”
Prescription
“Give me two
aspirins”
5
8. Intent-based Networking
Open Source Efforts
– ONF Open Source SDN Boulder
– Define Intent North Bound Interface (NBI)
– http://opensourcesdn.org/projects/project-boulder-intent-northbound-interface-nbi/
– https://community.opensourcesdn.org/wg/IntentNBI/dashboard
– OpenDaylight NIC
– Network Intent Composition
– Manage and direct network services and network resources based on
the given “Intent”
– https://wiki.opendaylight.org/view/Network_Intent_Composition:Main
– ONOS Intent Framework
– Allows applications to specify their network control desires in form
of policy rather than mechanism (Intent)
– https://wiki.onosproject.org/display/ONOS/Intent+Framework
ONF Intent NBI – Definition and Principles, Draft Version 6, Sep. 2016
https://wiki.opendaylight.org/view/Network_Intent_Composition:Graph
8
10. PGA is Real
Public resources
ACM SIGCOMM 2015
London, UK
Research Paper and Demo Running System and Open Source Contributions
OpenStack Summit
2015, 2016
OpenDaylight Summit
2015, 2016
10
12. Policy Graph Abstraction (PGA)
Mktg&Cmp-B
&Normal
Engg&Cmp-A
&Normal
HTTP Web&
Cloud
DNS
DB&
Cloud
Remedy
Service
Engg&Cmp-A
&Qn
Mktg&Cam-B
&Qn
Ping,SSH
HTTP
monitor
SQL, monitor
sync,
monitor
monitor
DNS DNS
*
*
BC
BC
BCLBFW
BCLBFW
DPIDPI
BC
BC
graph
composition
Quarantined
Remedy
Service
Policy sources Graph abstraction Unified, conflict-free policy graph Deploy
12
13. PGA Example
− Label namespace across cloud services and network, capturing overlap vs. disjoint relations between labels
13
CPU
Utilization
> 90% <= 90%
14. PGA Example
− Label namespace across cloud services and network, capturing overlap vs. disjoint relations between labels
− 4 individual input policies
(a) Departments admin
Engg. Mktg
Ping,SSH
Cloud
monitor
Quarantined
Remedy
Service
*
(b) Application admin
(d) Cloud operator(c) SDN app: HPE Net Protector
Campus Cloud
*
*
HTTP
Empl Web
SQL
sync
DBLB
Normal DNS
DNS
(a) Enterprise IT admin
DPI FW BC
BC
Cmp-AMktg
Empl App
Web CampusDB
Net
Protector
Status
Normal Qn
Tenant
Location
Engg: Campus-A
Mktg: Campus-B
Application: Cloud
Empl: Net protector
Engg
Label Namespace
Label Mappings
disjoint
Cloud
Cmp-B
14
15. PGA Example
− 4 individual input policies
− Label namespace across cloud services and network, capturing overlap vs. disjoint relations between labels
− Proactive, automatic composition
− Scalable algorithm: 13 mins to compose 20K ACL + service chain policies
(a) Departments admin
Engg. Mktg
Ping,SSH
Cloud
monitor
Quarantined
Remedy
Service
*
(b) Application admin
(d) Cloud operator(c) SDN app: HPE Net Protector
Campus Cloud
*
*
HTTP
Empl Web
SQL
sync
DBLB
Normal DNS
DNS
(a) Enterprise IT admin
DPI FW BC
BC
Mktg&Cmp-B
&Normal
Engg&Cmp-A
&Normal
HTTP
Web&
Cloud
DNS
DB&
Cloud
Remedy
Service
Engg&Cmp-A
&Qn
Mktg&Cam-B
&Qn
Ping,SSH
HTTP
monitor
SQL, monitor
sync,
monitor
monitor
DNS DNS
*
*
BC
BC
BCLBFW
BCLBFW
DPIDPI
BC
BC
compose
Cmp-AMktg
Empl App
Web CampusDB
Net
Protector
Status
Normal Qn
Tenant
Location
Engg: Campus-A
Mktg: Campus-B
Application: Cloud
Empl: Net protector
Engg
Label Namespace
Label Mappings
disjoint
Cloud
Cmp-B
15
16. PGA
Current status
PGA implementation and impact
− PGA model, composition, deployment, and tool to convert ACL policy configuration to PGA
intent specification
− PGA prototype for OpenStack (Juno ~ Newton)
− PGA Intent APIs and graph compiler contributed to ODL/NIC Beryllium release
− Troubleshooting for intent based policy management
− Conflict detection
− Composition correctness verification
− Intent addition/modification/deletion
16
20. Network debugging/troubleshooting a difficult task
Picture sources:
http://simplearchitectures.blogspot.com/2013/08/addressing-data-center-complexity.html
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/ServerFarmSec_2-
1/ServSecDC/8_NIDS.html
WEB NO CONNECT
Picture source:
http://www.ntstn.com/category/troubleshooting/network-
troubleshooting
Policy
Network
ping
traceroute
tcpdump
SNMP
sflow
21. Systematic troubleshooting
–Know intent of the operator
–Check network behavior against operator intent
Intent-based networking
–Policy is a first-class citizen
–Intent explicitly expressed at policy layer
–Forwarding semantics explicitly defined
–Code compiles policy description into lower-level configuration
Difficult to achieve
in legacy networks
Opportunity to
rethink network
debugging
22. Intent-based Networking
Application Plane
(SDN Apps)
Controller Plane
(OpenDaylight, ONOS, etc.)
Infrastructure (Data) Plane
(Cloud/IT/SDN/NFV)
INTENT North Bound Interface
Infrastructure Control Interfaces
– Control Apps
– Specify routing/access control policies
– Logical view
– Simplified/abstract representation of network
– Physical view
– One-to-one correspondence with the physical network
– Controller’s job to configure the network devices
(OpenFlow)
23. Intent-based Networking
Application Plane
(SDN Apps)
Controller Plane
(OpenDaylight, ONOS, etc.)
Infrastructure (Data) Plane
(Cloud/IT/SDN/NFV)
INTENT North Bound Interface
Infrastructure Control Interfaces
– Control Apps
– Specify routing/access control policies
– Logical view
– Simplified/abstract representation of network
– Physical view
– One-to-one correspondence with the physical network
– Controller’s job to configure the network devices
(OpenFlow)
• Each layer performs one piece of translation process
• Every layer should correctly map to every other layer
• Most errors in SDN are mistranslations between layers
24. Checking network behavior against intent
–Early debugging tools for OpenFlow-enabled networks
–Ndb, OFRewind, NetSight, netwatch, netshark, nprof…
–Easier to discover the source of network problems
[Faulty device firmware, inconsistent flow rules, faulty routing…]
–Testing and verification complement network troubleshooting and debugging
[Loop freedom, black holes, performance of OpenFlow switches…]
Too low level!
25. Knowing the operator’s intent
Does the Actual Network Behavior Match the Policy?
–If NO…
Match the symptoms to responsible system component
–If YES…
The policy itself is the problem, a human must resolve the discrepancy
–If unwanted behavior persists & all state layers are equivalent:
–The configured policy must not match the operator’s intent
26. Troubleshooting System
Composed graph
User/App1 User/App2 User/Appn
User Intents
Input graphs
Infrastructure Controllers
PGA
Results
Metadata
GUI
Query
Query Examples
– Reachability/Connectivity checking
– Can A talk to B?
– Security vulnerability or Risk
assessment
– Addition/removal/edition correctnessTroubleshooting
System
27. Troubleshooting Examples
Reachability
–Can A talk to B?
–What EPG do nodes belong to?
–Is there an edge connecting both EPGs?
–What security groups should be checked?
–What middleboxes should be checked?
28. Troubleshooting example
Troubleshooting network connectivity (reachability)
(a) Departments
admin
Engg. Mktg
Ping,SSH
Cloud
monitor
Quarantined
Remedy
Service
*
(b) Application admin
(d) Cloud operator(c) SDN app: HP Net Protector
Campus Cloud
*
*
HTTP
Empl Web
SQL
sync
DBLB
Normal DNS
DNS
(a) Enterprise IT admin
DPI FW BC
BC
Mktg&Cmp-B
&Normal
Engg&Cmp-A
&Normal
HTTP
Web&
Cloud
DNS
DB&
Cloud
Remedy
Service
Engg&Cmp-A
&Qn
Mktg&Cam-B
&Qn
Ping,SSH
HTTP
monitor
SQL, monitor
sync,
monitor
monitor
DNS DNS
*
*
BC
BC
BCLBFW
BCLBFW
DPIDPI
BC
BC
compose
Cmp-
A
Status
Tenant
Empl App
Mktg
Web DB Campus Cloud Net
Protector
Normal Qn
Location
Engg: Campus-A
Mktg: Campus-B
Application: Cloud
Empl: Net protector
Cmp-
B
Eng
g
Label Namespace
Label Mappings
disjoint
web
Engg client HR site
29. Troubleshooting example
Intent addition/modification/removal
(a) Departments
admin
Engg. Mktg
Ping,SSH
Cloud
monitor
Quarantined
Remedy
Service
*
(b) Application admin
(d) Cloud operator(c) SDN app: HP Net Protector
Campus Cloud
*
*
HTTP
Empl Web
SQL
sync
DBLB
Normal DNS
DNS
(a) Enterprise IT admin
DPI FW BC
BC
Mktg&Cmp-B
&Normal
Engg&Cmp-A
&Normal
HTTP
Web&
Cloud
DNS
DB&
Cloud
Remedy
Service
Engg&Cmp-A
&Qn
Mktg&Cam-B
&Qn
Ping,SSH
HTTP
monitor
SQL, monitor
sync,
monitor
monitor
DNS DNS
*
*
BC
BC
BCLBFW
BCLBFW
DPIDPI
BC
BC
Cmp-
A
Status
Tenant
Empl App
Mktg
Web DB Campus Cloud Net
Protector
Normal Qn
Location
Engg: Campus-A
Mktg: Campus-B
Application: Cloud
Empl: Net protector
Cmp-
B
Eng
g
Label Namespace
Label Mappings
disjoint
compare
29
30. Troubleshooting example
Risk Assessment
Indicator may be composed using different data points:
e.g. # of compromised hops; # of network functions
traversed, etc.
What if a host from “Web&Cloud” is compromised?
What EPGs might be able to reach host ‘x’ (through intermediate host compromise)?
34. Summary
–Intent-based Networking is beneficial to simplify network control & management
–Policy Graph Abstraction (PGA) is one of the well-defined intent-based
management framework and we presented possible troubleshooting examples
34
35. Summary
–Intent-based Networking is beneficial to simplify network control & management
–Policy Graph Abstraction (PGA) is one of the well-defined intent-based
management framework and we presented possible troubleshooting examples
–Intent-level troubleshooting can help to easily do troubleshooting network
problems
35
36. Summary
–Intent-based Networking is beneficial to simplify network control & management
–Policy Graph Abstraction (PGA) is one of the well-defined intent-based
management framework and we presented possible troubleshooting examples
–Intent-level troubleshooting can help to easily identify network problems
–What’s next
– More More More practical experiences from network operators/administrators/developers…
36