This document discusses challenges faced by service providers and proposes an evolved programmable network architecture to address them. It summarizes that service providers face a degraded business climate, diminished relevance as services are commoditized, and strained legacy infrastructure. A new architecture is proposed using virtualization, automation, and programming to simplify processes, optimize service delivery, and leverage secure hybrid clouds. This evolved approach aims to streamline costs, increase innovation rates, provide elastic scalable services, and optimize network delivery through automation.
A review of Autonomous System Numbers: what is it, how to get it, and why it’s important. It highlights the challenges of the 2-byte ASN run-out and adoption of 4-byte ASN, and how Indonesia fare compared to other economies. It then looks at the distribution of ASNs in Indonesia, and more importantly how the ASNs are interconnected locally and internationally. The presentation ends with how ASN usage may change in the future, and what role network operators can play in building a robust Internet by adopting best current practice in deploying and managing ASNs.
A review of Autonomous System Numbers: what is it, how to get it, and why it’s important. It highlights the challenges of the 2-byte ASN run-out and adoption of 4-byte ASN, and how Indonesia fare compared to other economies. It then looks at the distribution of ASNs in Indonesia, and more importantly how the ASNs are interconnected locally and internationally. The presentation ends with how ASN usage may change in the future, and what role network operators can play in building a robust Internet by adopting best current practice in deploying and managing ASNs.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
GTRI and Cisco discuss how using the internet to run branch network traffic provides a better user experience and reduces costs. You’ll learn the basics of Software-Defined WAN (SD-WAN) and the benefits, including:
- Reduced costs
- Reliability and security
- Flexibility to choose service providers
- Optimized traffic flows
Presented by Mani Ganesan of Cisco and Michael Edwards of GTRI (http://www.gtri.com) in a webinar on August 10, 2016. Webinar recording at https://youtu.be/08_QpBT07pU.
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
A leading Tier-1 Operator in APAC was evaluating new technologies to deliver enhanced managed network services for its Enterprise customers. With the growth in the demand for these services driven by the region’s growing consumption of web-based content and applications, the full-fledged telecommunications company embarked on an initiative to enhance the capacity and capabilities of its managed network services, with the aim of positioning itself as the best-in-class provider of next-generation cloud data center services.
As part of this transformation, the Operator identified NFV-based intelligent service orchestration, leveraging SDN and NFV technologies to pioneer the development of a portfolio of managed network services and invited vendors to participate in a Proof of Concept (PoC) to validate solutions that will be able to deliver these capabilities.
In response to the initiative, Anuta Networks in collaboration with the Tier-1 Operator, HPE and Logicalis, a leading IT solutions and managed services provider, conducted a PoC that saw the company validating the first end-to-end Managed Network Service Delivery using the IETF YANG Modeling Framework.
The PoC saw the deployment of Anuta Networks' NFV Orchestrator and VNF Lifecycle Manager - Anuta NCX - which provides carrier-grade NFV orchestration for instantiating, managing, and chaining Virtual Network Functions (VNFs) in accordance to IETF’s Management and Orchestration (MANO) guidelines. HPE provided the NFVI including Helion OpenStack, HP Compute, HPE Virtual Router (VRS) and HPE DCN SDN (OEM version of ALU Nuage VSP) controller.
First of its kind, the highly successful PoC demonstrated capabilities of Anuta Networks via its NCX solution to deliver carrier-grade NFV orchestration while dynamically and intelligently provisioning computing, storage and networking resources to enable the Tier 1 Operator to efficiently deliver next-generation cloud services to clients across the region.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
GTRI and Cisco discuss how using the internet to run branch network traffic provides a better user experience and reduces costs. You’ll learn the basics of Software-Defined WAN (SD-WAN) and the benefits, including:
- Reduced costs
- Reliability and security
- Flexibility to choose service providers
- Optimized traffic flows
Presented by Mani Ganesan of Cisco and Michael Edwards of GTRI (http://www.gtri.com) in a webinar on August 10, 2016. Webinar recording at https://youtu.be/08_QpBT07pU.
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
A leading Tier-1 Operator in APAC was evaluating new technologies to deliver enhanced managed network services for its Enterprise customers. With the growth in the demand for these services driven by the region’s growing consumption of web-based content and applications, the full-fledged telecommunications company embarked on an initiative to enhance the capacity and capabilities of its managed network services, with the aim of positioning itself as the best-in-class provider of next-generation cloud data center services.
As part of this transformation, the Operator identified NFV-based intelligent service orchestration, leveraging SDN and NFV technologies to pioneer the development of a portfolio of managed network services and invited vendors to participate in a Proof of Concept (PoC) to validate solutions that will be able to deliver these capabilities.
In response to the initiative, Anuta Networks in collaboration with the Tier-1 Operator, HPE and Logicalis, a leading IT solutions and managed services provider, conducted a PoC that saw the company validating the first end-to-end Managed Network Service Delivery using the IETF YANG Modeling Framework.
The PoC saw the deployment of Anuta Networks' NFV Orchestrator and VNF Lifecycle Manager - Anuta NCX - which provides carrier-grade NFV orchestration for instantiating, managing, and chaining Virtual Network Functions (VNFs) in accordance to IETF’s Management and Orchestration (MANO) guidelines. HPE provided the NFVI including Helion OpenStack, HP Compute, HPE Virtual Router (VRS) and HPE DCN SDN (OEM version of ALU Nuage VSP) controller.
First of its kind, the highly successful PoC demonstrated capabilities of Anuta Networks via its NCX solution to deliver carrier-grade NFV orchestration while dynamically and intelligently provisioning computing, storage and networking resources to enable the Tier 1 Operator to efficiently deliver next-generation cloud services to clients across the region.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
In early March, Harbour IT hosted a breakfast session in conjunction with VMware – “vForum Wrap – All the best bits from VMware’s vForum 2010”.
Held in both the Norwest and Sydney offices, local customers were given a VMware update from guest speaker, Bo Leksono. The presentation covered the latest VMware technology and the steps to follow on your journey to the cloud
Come sfruttare al meglio la sinergia tra Kemp LoadMaster e il prodotti VMware
http://vinfrastructure.it/it/2015/10/webinar-kemp-lm-e-vmware-vsphere-la-sinergia-perfetta/
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN AppsCisco DevNet
We've all heard about SDN and how SDN provides flexible networks to solve networks operation challenges. With respect to SDN Applications, the most obvious conversation is about network applications and services. But today we will discuss how we at Cisco are addressing business challenges and impact business outcomes directly by connecting two disparate worlds of Enterprise applications (EA) and Networking stack using Cisco Integration Platform (CIP).
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions.
In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours.
Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers.
The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible.
In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. Challenges faced by Operators
Degraded
Business Climate
Shrinking value in core
telecommunication services
in favor for Internet services
Diminishing Service
Provider Relevance
SP services being
commoditized in favor for
OTT and content providers
Stretched Legacy
Infrastructure
Legacy physical
infrastructure based on
vertical scale challenged by
recent market changes
3. Operator Revenues
Value Migration and Threat to Operators
$0
$10,000
$20,000
$30,000
$40,000
$50,000
$60,000
2010 2011 2012 2013 2014 2015 2016
Loss of operator SMS revenues to OTT messaging
Source: Ovum Research 2013
millions
On-Line Video
$10B, +49%
Cloud Services
$43B, +27%
Location
$15B, +24%
Sources: ABI, IDC, In-Stat, Insight, Ovum,
Parks, Screen Digest, Strategy Analytics
4. Operator Expenses
Inefficiencies Bloating Operating Costs
§ Overall spending growing YoY
§ Current inefficiencies contributing
to OPEX growth
§ Limited software orientation in
network driving provisioning and
management costs
§ Operators are looking to reduce
overall expenditure, especially
OPEX
CAPEX and OPEX for Asian SPs
as % of Revenue
Source: GSMA Intelligence
0%
20%
40%
60%
80%
100%
Q1 2009 Q1 2010 Q1 2011 Q1 2012 Q1 2013
CAPEX
OPEX
6. Addressing New Service Economics
Service
Dimensioning
New ways to add
elastic capacity
dynamically and
reduce overhangs
Service
Resiliency
New ways to deliver
resiliency and scale
linearly with orders
coming in
Service
Provisioning
Automate processes to
cut OPEX sprawl, reduce
time to market, change the
competitive landscape
Transform SP Networks to Address New Service Economics
7. Key Business Outcomes
1. Efficiency - Cut down on OPEX for complex service provisioning by
automating tasks, enabling self-care and making the network programmable
2. Innovation - Increase rate of innovation to more than 20-30 new services
per year compared to current level of 2-3 per year
3. Elasticity - Capacity grows on demand to match business growth and
eliminates stranded and underutilized assets
4. Optimized – Automatically optimize service delivery across both Datacenter
and SP Network
8. Evolved Programmable Network
Video
Business
Cloud
Mobility
Modern Service Provider Architecture
NCS NCS
APIs
APIs
EDGE
CORE
Access
VM VM
Edge
Core
VM
Agility
Optimized
Revenue ¥£€$
Always “ON”
On-Demand
Services
Anywhere
Dynamic Scale
Application
Interaction
Seamless
Experience
Policy
Real-Time Analytics
Fully
Virtualized
Intelligent
Convergence
Automated
Open and
Programmable
Access
Evolved Services Platform
VM / Storage
Control
Service CatalogService
Orchestration Apps
VM
Applications and Services
CDN
9. 1. Virtualize Network Functions
Static => Dynamic Elastic Programmable
Existing Hardware / Appliance
based Network Functions (NFs)
Decouple software from underlying
hardware and port it as a VM on x86
platform running as a Network Function
NAT
VM
Firewall
VM
SBC
VM
dDOS
VM
Virus
Scan
VM
IPS
VM
DPI
VM
CGN
VM
Portal
VM
PCRF
VM
DNS
VM
DHCP
VM
BRAS
VM
SDN
Control
VM
RaaS
VM
WLC
VM
WAAS
VM
CDN
VM
Caching
VM
NMS
VM
NFs running as VM on x86 Platform
• Decouple from Physical Appliances that are inefficient to scale with SP’s business
• Do More with Less Infrastructure
• Elastic use of Pooled Resources
• Enables Automation and Programming of Resources
12. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
Service Request
InterCloud
Private Public
Evolved Services Platform
13. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
Check Network conditions to
determine optimum DC
Evolved Services Platform
14. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
Dynamically Create and
Configure Virtual Appliances
in SP Cloud
Evolved Services Platform
15. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
Automatically Connect Users
to Services and Optimize the
Performance on the Network
FW
VM
DPI
VM
WAAS
VM
Evolved Services Platform
16. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
FW
VM
DPI
VM
WAAS
VM
Connect appropriate Virtual
Appliances into Service
Chains and Optimize DC
fabric
Evolved Services Platform
17. 2. Automate Processes With Unified Platform
Manual => Automations, Optimizations, Open Interfaces
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
FW
VM
DPI
VM
WAAS
VM
Continuously monitor health
of virtual functions. Grow/
shrink them according to
changing demands
Evolved Services Platform
18. 3. Leverage Programming, Self Service and Automation
Cut Time, Effort, Costs for Service Creation up to 75%
Open Programmable API
ComputeCompute Storage Storage Services Services
Programmable Provisionable
CoreAccess/Aggregation
DatacenterService Provider Network
InterCloud
Private Public
FW
VM
DPI
VM
WAAS
VM
Evolved Services Platform
Service
Catalog
Programmable
Interface
Users External Systems
19. Evolved Programmable Network
Open Programmable API
ComputeCompute Storage Storage Services Services
InterCloud
Private Public
Service Provider Programmable Infrastructure
Applications and Services
Business VPN Mobile Internet Cloud Services Videoscape
PROGRAMMABILITY
VIRTUALIZATION
Evolved Services Platform
Service
Profile
Orchestration
Engine
Virtual
Functions
Service Catalog
Service Broker
20. Summary and Benefits
1. Simplify SP processes to streamline OPEX and enable service innovation by
removing constraints of legacy approaches
2. Automation increase SP addressable share of value chain
3. Optimize delivery of non-conventional services as they are added to the
network to keep network in balance and remediate congestion
4. Leverage secure hybrid cloud to keep cost optimized based on service needs
5. Self-service and orchestration removes cost barriers to service provisioning