This document provides an overview of overlay networks. It defines an overlay network as a computer network built on top of another network that connects nodes through virtual links corresponding to physical paths. Overlay networks can provide performance, reliability, scalability, security and low cost - addressing deficiencies of the traditional internet. The document describes different types of overlay networks including caching overlays to improve availability and performance for cacheable content, routing overlays to find better paths for dynamic content, and security overlays to mitigate DDoS attacks by using shared resources to filter traffic. It provides examples of how these overlays improve metrics like speed, origin offload, and security.
Do you run an MPLS network to some or all of your branches? If so, you are likely wasting MPLS capacity backhauling Internet traffic.
For many organizations, a lot of the traffic is Internet-bound due to increased cloud-usage. Backhauling Internet traffic over an expensive MPLS service adds latency and puts pressure on limited and expensive MPLS capacity.
A NEW ARCHITECTURE PROPOSAL TO INTEGRATE OPC UA, DDS & TSN.
Suppliers and end users need a complete solution to address the complexity of future industrial automation systems. These systems require:
• Interoperability to allow devices and independent software applications from multiple suppliers to work together seamlessly
• Extensibility to incorporate future large or intelligent systems
• Performance and flexibility to handle challenging deployments and use cases
• Robustness to guarantee continuity of operation despite partial failures
• Integrity and fine-grained security to protect against cyber attacks
• Widespread support for an industry standard
This document proposes a new technical architecture to build this future. The design combines the best of the OPC Unified Architecture (OPC UA), Data Distribution Service (DDS), and Time-Sensitive Networking (TSN) standards. It will connect the factory floor to the enterprise, sensors to cloud, and real-time devices to work cells. This proposal aims to define and standardize the architecture to unify the industry.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
Demonstrates the automatic deployment and scalability of Hadoop-based big data platforms using MiCADO. Challenges in existing Hadoop deployments. Hadoop and cloud native computing. MiCADO overview. Containerizing big data tools. Creating big data ADT for MiCADO.
Data continues to grow exponentially – especially with the advent of social content. Approximately 70% of data is unstructured. This impacts on storage costs and management, Data Protection, and SLAs.
New deployment options such as cloud provide alternatives but how do you know what you should move to the cloud?
Project DRAC: Creating an applications-aware networkTal Lavian Ph.D.
Intelligent networking and the ability for applications to more effectively use all of the network’s capability, rather than just the transport “pipe,” have been elusive. Until now. Nortel has developed a proof-of-concept software capability — service-mediation “middleware” called the Dynamic Resource Allocation Controller (DRAC) — that runs on any Java platform and opens up the network to applications with proper credentials,making available all of the properties of a converged network, including service topology, time-of-day reservations, and interdomain connectivity options. With a more open network, applications can directly provision and invoke services, with no need for operator involvement or point-and click sessions. In its first real-world demonstrations in large research networks, DRAC is showing it can improve user satisfaction while reducing network operations and investment costs.
Do you run an MPLS network to some or all of your branches? If so, you are likely wasting MPLS capacity backhauling Internet traffic.
For many organizations, a lot of the traffic is Internet-bound due to increased cloud-usage. Backhauling Internet traffic over an expensive MPLS service adds latency and puts pressure on limited and expensive MPLS capacity.
A NEW ARCHITECTURE PROPOSAL TO INTEGRATE OPC UA, DDS & TSN.
Suppliers and end users need a complete solution to address the complexity of future industrial automation systems. These systems require:
• Interoperability to allow devices and independent software applications from multiple suppliers to work together seamlessly
• Extensibility to incorporate future large or intelligent systems
• Performance and flexibility to handle challenging deployments and use cases
• Robustness to guarantee continuity of operation despite partial failures
• Integrity and fine-grained security to protect against cyber attacks
• Widespread support for an industry standard
This document proposes a new technical architecture to build this future. The design combines the best of the OPC Unified Architecture (OPC UA), Data Distribution Service (DDS), and Time-Sensitive Networking (TSN) standards. It will connect the factory floor to the enterprise, sensors to cloud, and real-time devices to work cells. This proposal aims to define and standardize the architecture to unify the industry.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
Demonstrates the automatic deployment and scalability of Hadoop-based big data platforms using MiCADO. Challenges in existing Hadoop deployments. Hadoop and cloud native computing. MiCADO overview. Containerizing big data tools. Creating big data ADT for MiCADO.
Data continues to grow exponentially – especially with the advent of social content. Approximately 70% of data is unstructured. This impacts on storage costs and management, Data Protection, and SLAs.
New deployment options such as cloud provide alternatives but how do you know what you should move to the cloud?
Project DRAC: Creating an applications-aware networkTal Lavian Ph.D.
Intelligent networking and the ability for applications to more effectively use all of the network’s capability, rather than just the transport “pipe,” have been elusive. Until now. Nortel has developed a proof-of-concept software capability — service-mediation “middleware” called the Dynamic Resource Allocation Controller (DRAC) — that runs on any Java platform and opens up the network to applications with proper credentials,making available all of the properties of a converged network, including service topology, time-of-day reservations, and interdomain connectivity options. With a more open network, applications can directly provision and invoke services, with no need for operator involvement or point-and click sessions. In its first real-world demonstrations in large research networks, DRAC is showing it can improve user satisfaction while reducing network operations and investment costs.
This Presentation will useful to Enrich your knowledge on Cloud Computing Regarding to Networking. Use this presentation for Your reference purpose. Thankyou
Data-Centric and Message-Centric System ArchitectureRick Warren
Presentation from April, 2010 summarizing the principles of data-centric design and how they apply to DDS technology. Message-centric design is presented by way of contrast.
The network layer and its requisite analytics can be a gating factors to an initiative’s success. Critically important is the oft-overlooked network performance monitoring of business flows that are rooted in the network itself.
We’ll cover how analytics provides the essential link between:
* Resource usage
* Application performance
* Ultimate success of servicing the business.
If you’re an IT structure that is deploying these mission-critical modern applications, it can be hard to imagine maximum success without the inclusion of the performance analytics that come from the network itself.
To view the full recorded webinar:
http://www.pluribusnetworks.com/resources/webinar-forrester-research-modern-applications-demand-network-analytics/
This Presentation will useful to Enrich your knowledge on Cloud Computing Regarding to Networking. Use this presentation for Your reference purpose. Thankyou
Data-Centric and Message-Centric System ArchitectureRick Warren
Presentation from April, 2010 summarizing the principles of data-centric design and how they apply to DDS technology. Message-centric design is presented by way of contrast.
The network layer and its requisite analytics can be a gating factors to an initiative’s success. Critically important is the oft-overlooked network performance monitoring of business flows that are rooted in the network itself.
We’ll cover how analytics provides the essential link between:
* Resource usage
* Application performance
* Ultimate success of servicing the business.
If you’re an IT structure that is deploying these mission-critical modern applications, it can be hard to imagine maximum success without the inclusion of the performance analytics that come from the network itself.
To view the full recorded webinar:
http://www.pluribusnetworks.com/resources/webinar-forrester-research-modern-applications-demand-network-analytics/
Overview of Cloud Computing, Infrastructure as a Service, Platform as a Service, Software as a Service.
Cloud computing means transferring ICT resources (servers, hosts, applications, databases, platforms etc.) to a cloud service provider (CSP) with the goal of reducing capital expenditures (CapEx).
Cloud computing differs from legacy hosting services in that CSPs offer standardized services on a massive scale which results in economy-of-scale effects thus further reducing operating expenses (OpEx).
Different cloud models such as public, private and hybrid clouds address different customer needs.
The 3 categories for the functional level of cloud services are IaaS (Infrastructure as a Service),
PaaS (Platform as a Service) and SaaS (Software as a Service). Countless models emerge almost daily such as MaaS (Management as a Service), BaaS (Backend as a Service) and NaaS (Network as a Service).
To accommodate increases in processing power, cloud services offer the possibility to scale-up or scale-out.
Cloud Computing intends a trend in computing model arises many security issues in all levels such as: network, application, data and host.
These models put up different challenges in security
Depending on consumers, models QOS(quality of service) requirements. Privacy, authentication, secre-cy are main concern for both consumers and cloud providers. IaaS serves as base for other models, if the security in this model is uncertain; it will affect the other models too. This paper delivers a examine the countermeasures and exposures. As a research we project security Assessment and improvement in Iaas layer.
AESIT has just launched it's NEW SD-WAN service!
Take a look at this brief presentation to learn how your organization or home can benefit from this new technology!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Content
Internet
Deficiencies of Internet
What is Overlay Network ?
Type of Overlay Network
Why Overlay Network ?
Overlay Network Performance & Benefit
Architecture
Types of Overlay
Performance benefits
Internet Security Report
Conclusion
3. The Internet is transforming every aspect of communication in human
society by enabling a wide range of applications for business, commerce,
entertainment, news, and social interaction.
Requirements of Modern applications
Performance
Reliability
Scalability
Security
low cost
Internet
4. Network layer
Defines addressing, routing, and service model for communication
between hosts.
Default IP- routing
Hierarchical structures (IGP and BGP)
Allow flexibility and distributed management
Achieve global reachability/connectivity
CIDR allows route aggregation for announcements, leading to smaller
routing tables
Traditional Internet Infrastructure
5. Routing anomalies impact network/service availability
Trade-off performance of scalability
New services need new capabilities
Mobility? Multicast service?
Solution Space:
Change the existing network layer, or
Bridge the gap is use of overlay on top of existing networks.
Why its not good enough ?
6. What is Overlay Network?
An overlay network is a computer network that is built on top
of another network.
Nodes in the overlay network can be thought of as being
connected by virtual or logical links, each of which corresponds
to a path, perhaps through many physical links, in the
underlying network.
Example : Internet is overlay network & Virtualization
7. An overlay network is built on top of the public Internet to provide
the exact requirements that rich Internet-based services need.
Basic Diagram of overlay network
8. CDN – Resilience overlay network
P2P
VPN
MPLS
IPv4 to IPv6
GRE
Multicast
VoIP
Frame Relay
Type of Overlay Network
9. Need for Overlay Network?
Due to following drawbacks/limitation of Internet
Outages
Congestion
Lack of scalability
Slow adaptability
Lack of security
10. (2008 and 2013) -16 Outage
Last outage – 22-26 October 2015 (Due to fiber cut)
Internet Outage example
11. Outages
Congestion
Lack of scalability
Slow adaptability
Lack of security
Drawbacks/Limitation of Internet
13. Overlay Architecture
To deliver the content, applications and services to users on behalf of content providers.
Examples: E commerce sites, news channels, social networks, web portals, banks, credit
card companies.
A large distributed system consisting of hundreds of thousands of globally deployed
servers that run sophisticated algorithms.
15. Overlay Architecture:
Origins
One or a few,
locates in core
Edge servers
Hundreds thousand
Locates at the edges,
close to users
Transport system
High reliability and performance
18. Caching Overlay
Caching overlay is used for the content which is cached over a period
of time.
Usage
Static objects can be cached for some period
Embedded image on a web page, a movie, a music file, a
software download, or a software update.
Benefits
Availability, performance and origin offload
19. Caching Overlay
Architecture – Mapping System
Performance benefits
Edge Hit rate
Speedup time
The caching overlay is used for content that can be cached for some
period of time.
The key benefits that a caching overlay provides are greater
availability, performance, origin offload, and scalability.
Origin offload
21. Performance Benefits
30 agents located in Asia, Europe, and North America
The agents hourly download a popular web page
Origin servers located in Dallas NA
23. Origin Offload Benefits
Origin offload
Is equal to the ratio of the volume of traffic served by the origin without
the overlay to the volume of traffic served by the origin with the overlay.
A large decrease in server, bandwidth, operational expenses.
Popular vs cold traffic
Cache hierarchy
Adding a layer of parent servers to reduce the flow of traffic to origin server.
Increases the origin offload, easy to implement .
26. Routing Overlay
For Internet-based applications such as shopping, banking, and gaming,
the downloaded content is dynamic and hence uncacheable.
Therefore, in order to improve performance and availability, routing
overlay is used.
It improve performance and availability by discovering better “overlay
paths” from the origin to the user.
27. An overlay construction algorithm is used to compute a set of overlay
paths that each edge server can use to reach each of the origins.
Overlay construction algorithm metric :
Latency
Packet loss
Bandwidth
Server load
Based on metric find RANK for best path : Request / Response
Algorithm construct path by solving multi-commodity flow
Routing Overlay Architecture
30. Performance Benefits
The significantly greater performance in file download is due to the ability of the
routing overlay to find alternate paths that avoid the failed links between different
parts of Asia to the Boston origin.
31. Performance Benefits
Even when there is no major Internet outage, the routing
overlay provides a significant performance benefit by
discovering and using better performing overlay paths for
communication.
32. Performance Benefits
In Figure (a), shows the performance benefit of a large routing overlay uses a single
optimized path .
Value of speedups increases as user moves away from the origin.
In Figure (b), shows the performance benefits for a different smaller routing overlay that
uses multiple optimized paths for each communication.
In figure (b), the speedups are less compared to (a) as fewer choices for alternate paths
and edge servers are less proximal to users.
34. Why Security Overlay
An Internet-based service needs to defend itself from distributed denial of
service (DDoS) attacks
SYN Flood,
UDP Flood,
Brute force attack.
Defending against DDoS and hacker attacks requires a vast amount of
spare capacity, Cost and Security expertise team to mitigate attack on
distributed large shared platform.
35. DDoS attacks on the rise: 71% increase since Q3 2015
New record DDoS attack: 623 Gbps in Q3 2016
Mega attacks over 100 Gbps on the rise: 138% increase since
Q3 2015
427 DDOS attack launched against a single organization in Q3
2016
Reference : Q3 2016 state of the internet security report
Security Overlay
38. Security Architectural Elements
Shared spare capacity
Shared expertise and lower costs
Advanced security features
Shielding the origin
Control Design
40. Performance benefits
-->Figure (a) shows a sudden increase in
the traffic of the content provider’s
website due to the DDoS attack. The web
site that is normally accessed at a rate
less than 50 pages/second was accessed
at a much higher rate of 9000 pages/sec
during the attack.
Figure (b) shows firewall rules getting
triggered in response to the attack and
denying over 90% of the attackers’
requests, and protecting the origin from
the significant surge of traffic.
41. Conclusion
Overlays hold the keys to the rapid evolution of Internet services,
even as the underlying Internet architecture is slow to change.