This document discusses OSPF area types and router roles. It explains that an OSPF domain can be divided into areas with routers only aware of their area's topology. A backbone area connects all other areas and distributes routing information between them. Area Border Routers connect multiple areas, including the backbone. Autonomous System Border Routers redistribute external routes into OSPF. The document defines regular, stub, totally stub, and NSSA areas, explaining the LSAs each type permits and how routing information is distributed between areas.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Segment Routing for IPv6 (SRv6 in short) is the instantiation of the Segment Routing (SR) architecture for the IPv6 data plane. SRv6 is based on loose source routing: a list of segments (represented as IPv6 addresses) can be included in the IPv6 packet headers. According to the “SRv6 Network Programming Model”, the segments can represent both topological way-points (nodes to be crossed along the path towards the destination) and specific operations on the packet to be performed in a node. Examples of such operations are encapsulation and decapsulation, lookup into a specific routing table. More in general, arbitrarily complex behaviors can be associated with an SRv6 segment, like those that are executed in a Virtual Network Function (VNF).
The SRv6 standardization activity in IETF is progressing at a good pace. Recently, several large-scale deployments of SRv6 in operator networks have been disclosed. SRv6 implementations from different vendors are available. Linux supports SRv6 since Feb 2017.
In this tutorial, we first discuss the SRv6 architecture and the SRv6 Network Programming model. We present the main use case scenarios (SRv6 Overlays, Traffic Engineering, Fast Restoration). We introduce the ecosystem of SRv6, which includes different hardware and software implementations (proprietary and Open Source). We analyze the Linux kernel SRv6 implementation, also discussing its packet forwarding performance. Finally, we show how to build SRv6 based services using Linux on a Mininet emulation.
Many network operators still struggle with which type of data-plane encoding they should use for segment routing. The world is hyper-connected and we can’t afford to be late to deliver 5G. Using IPv4, IPv6 and MPLS data-plane encoding keeps us moving forward.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
Multi-Area OSPF explained. Presentation by CoderGenie Technologies. CoderGenie Technologies provide best training on OpenStack, CCIE, CCIE SP, CCIE Security, CCIE DC
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Segment Routing for IPv6 (SRv6 in short) is the instantiation of the Segment Routing (SR) architecture for the IPv6 data plane. SRv6 is based on loose source routing: a list of segments (represented as IPv6 addresses) can be included in the IPv6 packet headers. According to the “SRv6 Network Programming Model”, the segments can represent both topological way-points (nodes to be crossed along the path towards the destination) and specific operations on the packet to be performed in a node. Examples of such operations are encapsulation and decapsulation, lookup into a specific routing table. More in general, arbitrarily complex behaviors can be associated with an SRv6 segment, like those that are executed in a Virtual Network Function (VNF).
The SRv6 standardization activity in IETF is progressing at a good pace. Recently, several large-scale deployments of SRv6 in operator networks have been disclosed. SRv6 implementations from different vendors are available. Linux supports SRv6 since Feb 2017.
In this tutorial, we first discuss the SRv6 architecture and the SRv6 Network Programming model. We present the main use case scenarios (SRv6 Overlays, Traffic Engineering, Fast Restoration). We introduce the ecosystem of SRv6, which includes different hardware and software implementations (proprietary and Open Source). We analyze the Linux kernel SRv6 implementation, also discussing its packet forwarding performance. Finally, we show how to build SRv6 based services using Linux on a Mininet emulation.
Many network operators still struggle with which type of data-plane encoding they should use for segment routing. The world is hyper-connected and we can’t afford to be late to deliver 5G. Using IPv4, IPv6 and MPLS data-plane encoding keeps us moving forward.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
Multi-Area OSPF explained. Presentation by CoderGenie Technologies. CoderGenie Technologies provide best training on OpenStack, CCIE, CCIE SP, CCIE Security, CCIE DC
The OSPF (Open Shortest Path First) protocol is one of a family of IP Routing...cherryfieldbd
The OSPF (Open Shortest Path First) protocol is one of a family of IP Routing protocols, and is an Interior Gateway Protocol (IGP) for the Internet, used to distribute IP routing information throughout a single Autonomous System (AS) in an IP network.
Open Shortest Path First
Basics and fundamentals of networking for Cisco Devices. Best for the beginners who are starting in IT Network - Cisco Vendors.
Providing you the essentials knowledge for Interviews in IT Companies.
This is a very brief introduction to IP networking. Has explained the concept of IP version 4 Class and Addressing. Moreover the IP concepts are applied to RadioMobile enviroment related to Packet transmit towards IP network (Packet Switching)
VPN mainly depends on :-
different geographical area.
different service providers.
For this, VPN information has to mutually redistributed.
VPN mainly depends on :-
different geographical area.
different service providers.
For this, VPN information has to mutually redistributed.
Inter ISP’s. allow VPN information to redistributed between adjacent MPLS.
So client sites communicate with each other across multiple ISP’s
OSPF Beyond Stump-the-Chump_Interview_Questions - Part 01 -Duane Bodle
This presentation is meant to help other network engineers to understand and put OSPF into the production networks correctly and with the least pain possible. Make no mistake, OSPF designed and deploy incorrectly can and is a bad experience.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Area concept
• An OSPF domain can be divided into areas, which are
just a collections of Routers and Networks (links)
• Routers are only aware of the topology in its connected
areas
• In order to distribute the routing information between
areas, a special area is maintained – backbone area
• OSPF protocol maintains a strict hierarchy, where all
areas need to connect to the backbone area.
3. Router Roles
• Router connected to multiple areas is called Area Border
Router (ABR).
• Cisco definition of ABR requires a connection to the
backbone area
• A router redistributing external information into OSPF is
called Autonomous System Border Router (ASBR).
4. Distribution Between Areas
• Data (prefix reachability) distribution between areas is done
in a distance vector manner.
• Prefixes reachable from an area are advertised to other
connected areas in a form of inter-area announcements
• Loop prevention – only backbone area inter-area prefixes
are considered by ABR during the route calculation
• All intra-area and inter-area prefixes are advertised from
backbone area to non-backbone areas
• Only intra-area routes are advertised from
non-backbone area to backbone area
5. Area Types
• OSPF defines multiple area types, depending on what
LSAs are permitted to be flooded and generated inside
the area
• Regular area – all type of LSAs are flooded over it
• Backbone area is by definition a regular area
• Stub Area
• Totally Stub Area
• NSSA Area
• All routers in an area have to agree on an area type
6. Stub Area
• External LSAa (Type 5) are not flooded into the Stub
area
• External LSAs are not originated in Stub area
• ASBR cannot be placed inside the ASBR
• Virtual link cannot go through Stub area as this is part
of the backbone ( type 5 flooding capable)
• In order to assure reachability to external destinations
a default route ( LSA type 3 ) is advertised by the ABRs
into the Stub area.
• Possible sub-optimal path to external destinations
7. Totally Stub Area
• Inter area prefixes (Type 3 LSA) are not flooded to this
area
• routers within the area rely on default route for Inter Area
and External routing
• the price to pay is the sub-optimal routing outside of an
area
• Only ABRs in the Stub Area need to be configured as
Totally Stub as they have to inject type 3 LSA
8. NSSAArea
• NSSA area has the same restriction as Stub - no type 5 is
flooded into this area
• an ASBR can be placed inside this area
• The external information in NSSA area are flooded in
form of Type-7 LSAs.
• Type-7 LSAs have area flooding scope – never leave
area where they were generated
• To allow external information generated inside NSSA
area to be distributed outside of an area Type-7 LSAs
can be translated by the NSSA ABR to Type-5 LSAs,
which are flooded domain wise.
9. NSSAArea (cont.)
• To allow routers inside the NSSA area to reach external
destinations generated outside of an NSSA area, NSSA
ABR can be configured to generate a default route inside
NSSA area
• NSSA ABR generates Type-7 default route
• Required configuration
• nssa default-information-originate
10. Totally NSSAArea
• NSSA area where inter-area prefixes are not allowed,
similar to totally stub area
• Default route generated on NSSA ABR guarantees the
reachability for any destination outside of an area
• Configuration
•nssa no-summary
11. Location of Different LSAs
External
RIP
Network
ASB
R
DR
Area
11
ABR
ASBR
RIP Network
ABR
Area 0
Area 10ASBR
ABR Summary (type 3))
IRABRIR Router Link (type 1)
IRIR
External (type 5)
ASBR IRASBR Summary (type 4)
ABR IR (about ASBR)
Network link
(type 2)
DR IR
External (type 7)
ASBRIR
(only in NSSA)