This document discusses the evolution of Swisscom's network analytics capabilities from 2015 to the present. It begins with nationwide outages at Swisscom that revealed deficiencies in network visibility. It then summarizes the growth of Swisscom's data collection and analytics platforms over time, starting from early adopters in 2015-2016 to becoming mainstream by 2020-2022. It highlights key milestones like onboarding new platforms, scaling data ingestion rates, and expanding use cases from troubleshooting to anomaly detection and closed-loop network operations.
This document summarizes the evolution of Swisscom's network analytics capabilities from 2015 to the present. It discusses moving from basic network monitoring to a data mesh architecture enabling closed-loop network operations. Key developments include onboarding more platforms and metrics, anomaly detection, visualization, and collaborating with IETF on standards like BGP Monitoring Protocol, IPFIX, and YANG push notifications. The goal is network visibility to make informed decisions and recognize service interruptions before customers. Future work involves standardizing extensions for additional RIB coverage, segment routing, and route policies.
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
This document discusses several challenges with integrating YANG push data into a data mesh architecture, and proposes solutions to address those challenges. Specifically, it discusses:
1. The need to unify observations from network events that occur at different times into single alerts.
2. The lack of standardization around aspects of YANG push like transport protocols, encodings, subscriptions, metadata, and versioning.
3. A proposal to integrate YANG push into a data mesh to produce standardized metrics with timestamps, and control semantic changes end-to-end.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Presentation of the status of my PhD in 2012 done to ABLE group at Carnegie Mellon.
Years later from that appeared
https://github.com/iTransformers/netTransformer
Webinar - Transforming Manufacturing with IoTHARMAN Services
The Manufacturing industry is realizing the tremendous benefits in the “Internet of Things” (IoT), an inevitable evolution to traditional M2M solutions. Innovations across embedded devices, advanced analytics, and enriched user experiences all powered by cloud, has enabled new opportunities for both perpetual revenue and perpetual customer value. In this session we will break down benefits of IoT for Manufacturing with real-world examples.
Chair: Ewan Quibell, management systems and service leader, Jisc.
16:15-16:55 - The autonomous network
Speaker: Simon Parry, CTO UK public sector, Ciena.
You’ve virtualised your servers, virtualised your storage, maybe even virtualised an application, but what about the network that joins it all together? How do you build an agile, open network that responds to the new world of on-demand services, without impacting current performance and while delivering greater efficiencies?
Find out how a network operator can save money and deliver a more responsive experience and outcome for your users.
This document summarizes the evolution of Swisscom's network analytics capabilities from 2015 to the present. It discusses moving from basic network monitoring to a data mesh architecture enabling closed-loop network operations. Key developments include onboarding more platforms and metrics, anomaly detection, visualization, and collaborating with IETF on standards like BGP Monitoring Protocol, IPFIX, and YANG push notifications. The goal is network visibility to make informed decisions and recognize service interruptions before customers. Future work involves standardizing extensions for additional RIB coverage, segment routing, and route policies.
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
This document discusses several challenges with integrating YANG push data into a data mesh architecture, and proposes solutions to address those challenges. Specifically, it discusses:
1. The need to unify observations from network events that occur at different times into single alerts.
2. The lack of standardization around aspects of YANG push like transport protocols, encodings, subscriptions, metadata, and versioning.
3. A proposal to integrate YANG push into a data mesh to produce standardized metrics with timestamps, and control semantic changes end-to-end.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Presentation of the status of my PhD in 2012 done to ABLE group at Carnegie Mellon.
Years later from that appeared
https://github.com/iTransformers/netTransformer
Webinar - Transforming Manufacturing with IoTHARMAN Services
The Manufacturing industry is realizing the tremendous benefits in the “Internet of Things” (IoT), an inevitable evolution to traditional M2M solutions. Innovations across embedded devices, advanced analytics, and enriched user experiences all powered by cloud, has enabled new opportunities for both perpetual revenue and perpetual customer value. In this session we will break down benefits of IoT for Manufacturing with real-world examples.
Chair: Ewan Quibell, management systems and service leader, Jisc.
16:15-16:55 - The autonomous network
Speaker: Simon Parry, CTO UK public sector, Ciena.
You’ve virtualised your servers, virtualised your storage, maybe even virtualised an application, but what about the network that joins it all together? How do you build an agile, open network that responds to the new world of on-demand services, without impacting current performance and while delivering greater efficiencies?
Find out how a network operator can save money and deliver a more responsive experience and outcome for your users.
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
Meetup waar we samen met iedereen die interesse heeft nadenken over een open IoT architectuur voor Antwerpen.
http://www.meetup.com/DigAnt-Cafe/events/228254825/
In these slides, you will be able to learn about what we will need to do in order to enable 5G and how open source can help accelerate that transformation.
NetBrain Consultant Edition (CE) is designed to make a Consultant’s job easier by providing instant network discovery, document automation, and visual troubleshooting. NetBrain enables consultants to:
1. Carry out deep discovery of the customer network
2. Automate documentation for network assessments
3. Analyze network design visually
4. Automatically troubleshoot and collect data without custom scripts
In short, NetBrain’s visual workbench allows consultants to complete network assessment tasks much faster and with much more accuracy.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
• What are the benefits of open networking and SDN in the data center?
• How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
• How do I deploy SDN in my data center and do I need a full hardware refresh to do it?
An experience is a personal and emotional event we remember. Every experience is established based upon pre-determined expectations we conceive and create in our minds. It’s personal, and therefore, remains a moving and evolving target in every scenario. When our experience concludes and the moment has passed, the outcome remains in our memory. Think about what makes you happy when connecting with your own device and then think about what makes you really upset when things are hard, complicated, and slow. If the user has a bad experience in anyone of these areas (simple, fast, and smart), they are likely to leave, share their negative experience, and potentially never return. Users might forget facts or details about their computing environment but they find it difficult to forgot the feeling behind a bad network experience. When something goes wrong with the network or an application, do you always get the blame?
So what can Ultra Low, consistent latency deliver? Low latency is a requirement for intensive, time critical applications. Latency is measure on a port-to-port basis, that once a frame is received on a ingress port how long does it take the frame to go through the internal switching infrastructure and leave an ingress port. The Summit X670 Top of Rack switch supports latency of around 800-900usec while the Black Diamond chassis, BDX8, can switch frames in a little as 3usec. We’re big believers in the value of disaggregation – of breaking down traditional data center technologies into their core components so we can build new systems that are more flexible, more scalable, and more efficient. This approach has guided Facebook from the beginning, as we’ve grown and expanded our infrastructure to connect more than 1.28 billion people around the world.
Flatter networks. Traditional data center networks have a minimum of three tiers: top of rack (ToR), aggregation and core. Often, there is more than one aggregation tier, meaning the data center could have three or more network tiers. When network traffic is primarily best effort, this is sufficient. But as more mission-critical, real-time traffic flows into the data center, it becomes critical that organizations move to two-tier networks.
An increase in east-west traffic flows. Legacy data center networks are designed for traffic to flow from the edge of the network into the core and then back to the edge in a north-south direction. Today, however, factors such as workforce mobility, Hadoop, big data and other applications are driving east-west traffic flows from server to server.
Virtualization of other IT assets. Historically, compute resources such as processor, memory and storage were resident in the server itself. Over time, more and more of these resources are being put into “pools” that can be accessed on demand. In this case, the data center network becomes a “fabric” that acts as the backplane for the virtualized data center.
The document discusses Cisco's SD-WAN solution with Viptela. It provides an overview of the key components of Cisco's SD-WAN architecture including the management plane (vManage), control plane (vSmart), data plane (vEdge), and orchestration plane (vBond). It also summarizes capabilities like zero touch provisioning, VPN segmentation, application policies, and centralized management.
The presentation is dedicated to the main products of NUVX Technologies, which will be of interest to Telco companies, ISP providers, as well as integrators.
Our key products are: NUVX.DPI, NUVX.NAT and NUVX.QoE
Feel free to contact us in case of any questions: http://nuvx.com/contacts
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
Presentation by Parwinder Singh (Technical Specialist, NEC Technologies India Pvt Ltd.) and Satinder Jeet Singh (Group Project Manager, NEC Technologies India Pvt Ltd.)
FIWARE Global Summit
23-24 October 2019 - Berlin, Germany
This document provides a network design for a small office. It outlines the hardware requirements, including routers, switches, printers, access points, cables, and computers. It assigns IP addresses to devices on two floors and shows the network topology diagram. The physical diagram and simulation pictures demonstrate how the network will be implemented. Costs are provided for each hardware component, with a total projected cost of the network. Advantages of the design include efficient performance, file and device sharing between users, and centralized data backup. Disadvantages include high upfront equipment costs and potential virus spreading.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Software is increasingly powering technological innovation and disrupting traditional industries as more aspects become software-defined. Mobile data usage continues rising rapidly, driven mainly by video. The internet economy is advancing towards a service-centric model. Software-defined networking aims to make networks more programmable through logical abstractions, enabling new capabilities like traffic engineering and dynamic configuration. However, distributed systems and concurrency present challenges to scaling that require ongoing research.
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrGeorg Knon
The document discusses the Splunk App for Stream, which enables real-time insights into private, public and hybrid cloud infrastructures by capturing and analyzing critical events from wire data not found in logs or with other collection methods. It provides an overview of the app, what's new, important features, architecture and deployment, customer success examples, and FAQs.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
The document discusses Siemens' platform for supporting Internet of Things (IoT) and Narrowband IoT (NB-IoT) networks. It describes the growth of IoT and the need for specialized core network functionality to handle the diverse communication needs of IoT devices. The Siemens platform provides standards-compliant implementations of Service Capability Exposure Function (SCEF), Machine Type Communication Interworking Function (MTC-IWF), and MTC Authentication, Authorization and Accounting (MTC-AAA) to securely interface IoT/MTC applications with cellular networks. It also features scalability, redundancy and virtualization.
Packet processing in the fast path involves looking up bit patterns and deciding on an actions at line rate. The complexity of these functions at Line Rate, have been traditionally handled by ASICs and NPUs. However with the availability of faster and cheaper CPUs and hardware/software accelerations, it is possible to move these functions onto commodity hardware. This tutorial will talk about the various building blocks available to speed up packet processing both hardware based e.g. SR-IOV, RDT, QAT, VMDq, VTD and software based e.g. DPDK, Fd.io/VPP, OVS etc and give hands on lab experience on DPDK and fd.io fast path look up with following sessions. 1: Introduction to Building blocks: Sujata Tibrewala
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
This document proposes two schemes, the deadline cost (DC) scheme and the deadline shortest queue first (DSQF) scheme, to improve the rate of data meeting its deadline with minimal data transmission cost in a wireless mesh network of IoT gateways. The DC scheme selects the cheapest gateway that meets the data deadline, while DSQF selects the fastest gateway, with the other metric as the secondary factor. The schemes aim to reduce overall data transmission costs compared to traditional greedy cost and shortest queue first schemes. According to tests, the proposed schemes can meet over 98% of data deadlines while reducing costs by 5.74% on average.
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
Meetup waar we samen met iedereen die interesse heeft nadenken over een open IoT architectuur voor Antwerpen.
http://www.meetup.com/DigAnt-Cafe/events/228254825/
In these slides, you will be able to learn about what we will need to do in order to enable 5G and how open source can help accelerate that transformation.
NetBrain Consultant Edition (CE) is designed to make a Consultant’s job easier by providing instant network discovery, document automation, and visual troubleshooting. NetBrain enables consultants to:
1. Carry out deep discovery of the customer network
2. Automate documentation for network assessments
3. Analyze network design visually
4. Automatically troubleshoot and collect data without custom scripts
In short, NetBrain’s visual workbench allows consultants to complete network assessment tasks much faster and with much more accuracy.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
• What are the benefits of open networking and SDN in the data center?
• How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
• How do I deploy SDN in my data center and do I need a full hardware refresh to do it?
An experience is a personal and emotional event we remember. Every experience is established based upon pre-determined expectations we conceive and create in our minds. It’s personal, and therefore, remains a moving and evolving target in every scenario. When our experience concludes and the moment has passed, the outcome remains in our memory. Think about what makes you happy when connecting with your own device and then think about what makes you really upset when things are hard, complicated, and slow. If the user has a bad experience in anyone of these areas (simple, fast, and smart), they are likely to leave, share their negative experience, and potentially never return. Users might forget facts or details about their computing environment but they find it difficult to forgot the feeling behind a bad network experience. When something goes wrong with the network or an application, do you always get the blame?
So what can Ultra Low, consistent latency deliver? Low latency is a requirement for intensive, time critical applications. Latency is measure on a port-to-port basis, that once a frame is received on a ingress port how long does it take the frame to go through the internal switching infrastructure and leave an ingress port. The Summit X670 Top of Rack switch supports latency of around 800-900usec while the Black Diamond chassis, BDX8, can switch frames in a little as 3usec. We’re big believers in the value of disaggregation – of breaking down traditional data center technologies into their core components so we can build new systems that are more flexible, more scalable, and more efficient. This approach has guided Facebook from the beginning, as we’ve grown and expanded our infrastructure to connect more than 1.28 billion people around the world.
Flatter networks. Traditional data center networks have a minimum of three tiers: top of rack (ToR), aggregation and core. Often, there is more than one aggregation tier, meaning the data center could have three or more network tiers. When network traffic is primarily best effort, this is sufficient. But as more mission-critical, real-time traffic flows into the data center, it becomes critical that organizations move to two-tier networks.
An increase in east-west traffic flows. Legacy data center networks are designed for traffic to flow from the edge of the network into the core and then back to the edge in a north-south direction. Today, however, factors such as workforce mobility, Hadoop, big data and other applications are driving east-west traffic flows from server to server.
Virtualization of other IT assets. Historically, compute resources such as processor, memory and storage were resident in the server itself. Over time, more and more of these resources are being put into “pools” that can be accessed on demand. In this case, the data center network becomes a “fabric” that acts as the backplane for the virtualized data center.
The document discusses Cisco's SD-WAN solution with Viptela. It provides an overview of the key components of Cisco's SD-WAN architecture including the management plane (vManage), control plane (vSmart), data plane (vEdge), and orchestration plane (vBond). It also summarizes capabilities like zero touch provisioning, VPN segmentation, application policies, and centralized management.
The presentation is dedicated to the main products of NUVX Technologies, which will be of interest to Telco companies, ISP providers, as well as integrators.
Our key products are: NUVX.DPI, NUVX.NAT and NUVX.QoE
Feel free to contact us in case of any questions: http://nuvx.com/contacts
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
Presentation by Parwinder Singh (Technical Specialist, NEC Technologies India Pvt Ltd.) and Satinder Jeet Singh (Group Project Manager, NEC Technologies India Pvt Ltd.)
FIWARE Global Summit
23-24 October 2019 - Berlin, Germany
This document provides a network design for a small office. It outlines the hardware requirements, including routers, switches, printers, access points, cables, and computers. It assigns IP addresses to devices on two floors and shows the network topology diagram. The physical diagram and simulation pictures demonstrate how the network will be implemented. Costs are provided for each hardware component, with a total projected cost of the network. Advantages of the design include efficient performance, file and device sharing between users, and centralized data backup. Disadvantages include high upfront equipment costs and potential virus spreading.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Software is increasingly powering technological innovation and disrupting traditional industries as more aspects become software-defined. Mobile data usage continues rising rapidly, driven mainly by video. The internet economy is advancing towards a service-centric model. Software-defined networking aims to make networks more programmable through logical abstractions, enabling new capabilities like traffic engineering and dynamic configuration. However, distributed systems and concurrency present challenges to scaling that require ongoing research.
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrGeorg Knon
The document discusses the Splunk App for Stream, which enables real-time insights into private, public and hybrid cloud infrastructures by capturing and analyzing critical events from wire data not found in logs or with other collection methods. It provides an overview of the app, what's new, important features, architecture and deployment, customer success examples, and FAQs.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
The document discusses Siemens' platform for supporting Internet of Things (IoT) and Narrowband IoT (NB-IoT) networks. It describes the growth of IoT and the need for specialized core network functionality to handle the diverse communication needs of IoT devices. The Siemens platform provides standards-compliant implementations of Service Capability Exposure Function (SCEF), Machine Type Communication Interworking Function (MTC-IWF), and MTC Authentication, Authorization and Accounting (MTC-AAA) to securely interface IoT/MTC applications with cellular networks. It also features scalability, redundancy and virtualization.
Packet processing in the fast path involves looking up bit patterns and deciding on an actions at line rate. The complexity of these functions at Line Rate, have been traditionally handled by ASICs and NPUs. However with the availability of faster and cheaper CPUs and hardware/software accelerations, it is possible to move these functions onto commodity hardware. This tutorial will talk about the various building blocks available to speed up packet processing both hardware based e.g. SR-IOV, RDT, QAT, VMDq, VTD and software based e.g. DPDK, Fd.io/VPP, OVS etc and give hands on lab experience on DPDK and fd.io fast path look up with following sessions. 1: Introduction to Building blocks: Sujata Tibrewala
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
This document proposes two schemes, the deadline cost (DC) scheme and the deadline shortest queue first (DSQF) scheme, to improve the rate of data meeting its deadline with minimal data transmission cost in a wireless mesh network of IoT gateways. The DC scheme selects the cheapest gateway that meets the data deadline, while DSQF selects the fastest gateway, with the other metric as the secondary factor. The schemes aim to reduce overall data transmission costs compared to traditional greedy cost and shortest queue first schemes. According to tests, the proposed schemes can meet over 98% of data deadlines while reducing costs by 5.74% on average.
Similar to Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf (20)
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
3. 3
The customerknowsbeforeSwisscomthat
there is serviceinterruption.
Unableto recognizeimpactand rootcause
when configurationalor operational
networkchangesoccur.
Swisscomsuffersreputationdamage.
We need to worktogetherto mediate.
«
«
Markus Reber
Head of Networks at Swisscom
4. 4
At IETF only9.85% of the activitiesare
relatedto networkautomationand
monitoring.
We are still usingprotocolsdesigned40
yearsago to managenetworks.
IP networkprotocolsare not made to
exposemetricsfor analytics. IPFIXand BGP
monitoringprotocolare the rareexception.
«
«
Thomas Graf
Distinguished Network Engineer
and Network Analytics Architect at Swisscom
5. “ It is our duty to recognize service interruption
before our customer does.
Why do we still often fail to be first ? “
5
6. 6
Swisscom Big Data onboarded,
Meerkat Anomaly Detection Feasibility
10 active users. 9 platforms. 87 nodes. 250'000
metrics per seconds.
2017-2018
2019
2020
BGP Monitoring Protocol and YANG Push
IETF Engagement started
40 active users. 17 platforms. 233 nodes.
1'200'000 metrics per second.
Pivot Migration, Druid Scale Out,
Unyte IETF colaboration established
160 active users. 34 platforms. 2500 nodes.
3'000'000 metrics per second. Active probing with
1'500'000 broadband subscribers.
Flow Aggregation Proof of Concept
Internet Distribution Core and TV 2.0
2015-2016
Early
adopters
Early
majority
Late
majority Laggards
Platform onboarding
Change verification and troubleshooting
Capacity management
and trend detection
Anomaly detection
IETF vendor, operator and
university colaboration
Network visualization
DaisyNetworkAnalyticsTransformsSwisscomDevOpsMindset
Fromdevicemonitoringto networkanalyticswith closedloop operation
2021 Taking over end to end Daisy Chain Responsibility
215 active users. 40 platforms. 2700 nodes.
20'000'000 metrics per second. Active probing
with >1'500'000 broadband subscribers.
Key Points
> From bottom up to mainstream. From IETF to Swisscom DevOps teams.
> From network verification and troubleshooting to visualization
with anomaly detection and SLO reporting
> From capacity management to trend detection
> From network automation to closed loop operation
SLO Reporting
2022 L3 VPN Anomaly Detection and
Network Visualization Proof of Concept
400 active users. 47 platforms. 7000 nodes.
25'000'000 metrics per second.
7. 7
2ndGeneration
3rdGeneration
current
Data lake
Big data ecosystem
Kappa
Adds streaming for
real-time data
Proprietary
Enterprise Data Warehouse
1stGeneration
EvolvingBig Dataarchitecture
Domainoriented,like networks
4thGeneration
next-step
Data Mesh
Distributed and organized
in domains.
Data Infra as a Platform
Operational
Delivery Platform
Analytical
Data Platform
Analytical
Data Plane
Operational
Data Plane
Domain A Domain B Domain C
Federated Computentional
Governance for global interoparabiity
Data Product as a Architectual Quantum
Serve
Collect
Publish
Serve
Collect
Publish
Serve
Collect
Publish
From Principles to Logical Architecture
8. 8
Products
• Verification and Troubleshooting enables change and
incident management.
• Visualization makes routing and peering topologies
accessible to humans.
• Capacity Management enables proactivity for key
performance metrics..
• Anomaly Detection automates incident management.
Alerts users to important events with contexts.
• Service Level Objective reports delay and loss for a
time period.
• Trend Detection automates capacity management.
Alerts users early before running out of capacity.
• Closed Loop Operation validates network
orchestration. Controlled configuration deployments.
DomainOwnership
NetworkAnalyticsas a product
Forwarding
Plane
Control
Plane
Device
Topology
Collect
Transform and
Aggregates
Analytical
Data Plane
Operational
Data Plane
Publish
Alerts and
Reports
Serve
Normalize and
Correlates
9. 9
Data Collectionwith NetworkTelemetry
Structuredmetricsenableinformeddecision-making
Network Telemetry:
> A data collection framework
where the network device
pushes its metrics to Big
Data. Defined in RFC 9232.
Data Modelling:
> Key for Big Data correlation
to understand and react in
the right context
> Are interface drops bad?
> How should we react?
Forwarding Plane
Data Models
How customers are
using our network
and services. Active
and passive delay
measurement
Control Plane
Data Models
How networks are
provisioned and
redundancy adjusts to
topology
Topology
Data Models
How logical and
physical network
devices are connected
with each other and
carry load
Swisscom Service
Service Models
Translates between what customers wishes and intend which should be fulfilled
Realitity
vs.
Intent
Thor LC ID
54654
BGP
Community
64497:12220
VRF, Interface
Config
10. Kappareal-timestreaming
How do you eat an elephant?Pieceby piece
1. Pushing metrics to collectors.
2. Aggregate or directly ingest into topics.
3. Buffers, consolidate and forward.
4. Process and re-ingest.
5. Import for midterm storage.
6. Access and observe metrics.
7. Are informed about events and possible
service impact.
Network Device Human/Machine
Data Collection Analytics
Message Broker Data Storage
Data Processing Message Broker
1
2
3
4
7
6
5
3
11. From Networkto Alert Event
Observemultipleperspectivesat different times
1. A single link down result in multiple device topology,
control-plane and forwarding-plane events being exposed
at different times.
2. Determine which interfaces and BGP peerings are being
used first and then observe state. Observe BGP
withdrawals and updates, traffic drop spikes and missing
traffic. Generate multiple concerns.
3. Calculate for each observation a concern score between 0
and 1. The higher, the more probable the changes
impacted forwarding.
4. Unify several concerns for one VPN connectivity service to
one alert identifier.
Network Event
Observation Strategy
Concern Scoring
Alert Unification
2
3
4
T1
T2 T3
1
12. 12
L3 VPN NetworkAnomalyDetection
Networksare deterministic– customerspartially
Analytical Perspectives
Monitors the network service and
wherever it is congested or not.
> BGP updates and withdrawals.
> UDP vs. TCP missing traffic.
> Interface state changes.
Network Events
1. VPN orange lost connectivity.
VPN blue lost redundancy.
2. VPN blue lost connectivity.
Key Point
> AI/ML requires network intent and
network modelled data to deliver
dependable results.
13. “ Without network visibility,
no informed decisions can be made. “
13
17. 17
At 17:39 prefixes from
Facebook BGP ASN 32934
where withdrawn. Outbound
traffic steadily increased
twofold until 20:20. Inbound
traffic decreased by 85%.
Between 19:25 and 00:51, BGP
updates and withdrawals
where received.
At 00:41 traffic rate restored
to normal.
FacebookIncident October4/5th
The Swisscomperspective
18. “ The solution comes with innovators.
That's why Swisscom cooperates at IETF with
network operators, vendors and universities. “
18
20. • Support for Local RIB in BGP Monitoring Protocol
https://datatracker.ietf.org/doc/draft-ietf-grow-bmp-local-rib
YANGDatastoresenablesClosedLoop Operation
Automateddata correlation– what else?
Automated networks can only run with a common data model. A digital twin YANG data store enables a
comparison between intend and reality. Schema preservation enables closed loop operation. Closed Loop is
like an autopilot on an airplane. We need to understand what the flight envelope is to keep the airplane
within. Without, we crash.
YANG is a data modelling language which will
not only transform how we managed our
networks; it will transform also how we
manage our services.
News: 17 industry leading colleagues from 4
network operators, 2 network and 3 analytics
providers, and 3 universities commit on a
project to integrate YANG and CBOR into
data mesh. Starts November 2022.
Conceptual Tree - Network Configuration
Conceptual Tree - Network State
Conceptual Tree - Network Configuration
Conceptual Tree - Network State
Network Configuration
Netconf <edit-config>
Network State
YANG Push
YANG Data Store
on Big Data Lake
YANG Data Store
on Network Device
Digital Twin
21. When Data Meshand Networkbecomeone
A simple, scalableapproach toYANG push
Simplify YANG push network data
collection with high scale and low
impact. Suited for nowadays distributed
forwarding systems.
Preserve YANG data model schema
definition throughout the data
processing chain.
Enable automated data correlation
among device, forwarding-plane and
control-plane.
An HTTPS-based Transport for YANG
Notifications
https://datatracker.ietf.org/doc/html/draf
t-ietf-netconf-https-notif
UDP-based Transport for Configured
Subscriptions
https://datatracker.ietf.org/doc/draft-
unyte-netconf-udp-notif
Subscription to Distributed Notifications
https://datatracker.ietf.org/doc/draft-
unyte-netconf-distributed-notif
Conceptual Tree - Network Configuration
Conceptual Tree - Network State
YANG Model
YANG Model
YANG Model
JSON/CBOR
Schema
ID
REST API
Get Schema
Message broker
YANG Schema Registry
On Big Data lake
YANG Data Store
On Big Data Lake
JSON/CBOR
Schema ID
YANG push
notification message
YANG Push
Data Collection
Netconf
<get-schema>
Parse YANG notification
message header and
maintain schema id to YANG
model and version mapping.
22. • Support for Adj-RIB-Out in BGP Monitoring Protocol
https://tools.ietf.org/html/rfc8671
• Support for Local RIB in BGP Monitoring Protocol
https://datatracker.ietf.org/doc/html/rfc9069
BMP Coveringall RIB's
Extendsmuch neededRIB coverage
BGP route exposure without BMP is a challenge of
the first order:
> Only best path is exposed (missing best-external and ECMP
routes)
> Next-hop attribute not preserved all the time
> Filtering between RIB's not visible
Adj-RIB-Outan RFC since November 2019. Local RIB since
February 2022. Juniper, Huawei and Nokia have public
releases available supporting both. Cisco has test code
available but haven't released yet.
BGP Peer-A
Adj-Rib-In Pre Policy
BGP Peer-A
Adj-Rib-In Post Policy
Static, Connected,
IGP Redistribution
Post Policy
Peer-A In Policy
BGP Peer-B
Adj-Rib-In Pre Policy
BGP Peer-B
Adj-Rib-In Post Policy
Peer-B In Policy
Local-Rib Pre Policy
BGP Peer-C
Adj-Rib-Out Pre Policy
BGP Peer-C
Adj-Rib-Out Post Policy
Peer-A Out Policy
BGP Peer-D
Adj-Rib-Out Pre Policy
BGP Peer-D
Adj-Rib-Out Post Policy
Peer-B Out Policy
Fib
Table Policy
23. • Support for Enterprise-specific TLVs in the BGP Monitoring Protocol
https://tools.ietf.org/html/draft-lucente-grow-bmp-tlv-ebit
• BMP Extension for Path Marking TLV
https://tools.ietf.org/html/draft-cppy-grow-bmp-path-marking-tlv
BMP with extendedTLV support
BringsvisibilityintoFIB'sandroute-policies
Knowing all the routes in all the RIB's brings the new
challenge
> That we don't know how they are being used in the FIB/RIB
(which one is best, best-external, ECMP, backup)
> That we don't know which route-policy
permitted/denied/changedwhich prefix/attribute
For IETF 110 Hackathon, IETF lab network with Big Data
integration has been further extendedto collaborate
developmentresearch with ETHZ, INSA, Cisco, Huawei and
pmacct (open source data-collection by Paolo Lucente).
BGP Peer-A
Adj-Rib-In Pre Policy
BGP Peer-A
Adj-Rib-In Post Policy
Static, Connected,
IGP Redistribution
Post Policy
Peer-A In Policy
BGP Peer-B
Adj-Rib-In Pre Policy
BGP Peer-B
Adj-Rib-In Post Policy
Peer-B In Policy
Local-Rib Pre Policy
BGP Peer-C
Adj-Rib-Out Pre Policy
BGP Peer-C
Adj-Rib-Out Post Policy
Peer-A Out Policy
BGP Peer-D
Adj-Rib-Out Pre Policy
BGP Peer-D
Adj-Rib-Out Post Policy
Peer-B Out Policy
Fib
Table Policy
• BGP Route Policy and Attribute Trace Using BMP
https://tools.ietf.org/html/draft-xu-grow-bmp-route-policy-attr-trace
• TLV support for BMP Route Monitoring and Peer Down Messages
https://tools.ietf.org/html/draft-ietf-grow-bmp-tlv
24. Export of MPLS Segment Routing Label Type Information in IPFIX
https://datatracker.ietf.org/doc/html/rfc9160
Export of Segment Routing IPv6 Information in IPFIX
https://datatracker.ietf.org/doc/html/draft-tgraf-opsawg-ipfix-srv6-srh
Export of Forwarding Path Delay in IPFIX
https://datatracker.ietf.org/doc/html/draft-tgraf-opsawg-ipfix-inband-telemetry
IPFIX CoveringSegmentRouting
For MPLS-SR, SRv6 and On-path Delay
SRv6 is commonly standardized, network vendors implementations are available and
network operators are at various stages in their deployments, missing data-plane visibility
though.
Segment Routing coverage in IPFIX brings visibility for:
> Which routing protocol provided the label or IPv6 Segment in the SR domain.
> The active Segmentwhere the packet is forwarded to in the SRv6 Domain.
> The SegmentList where the packet is going to be forwarded throughout the SRv6 Domain.
> The Endpoint Behavior describing how the packet is being forwarded in the SRv6 Domain.
> The Min, Max and Average On-path delay at each hop in the SR domain.
Node based
Flow Aggregation
Apache Kafka
Message Broker
Timeseries DB
Pmacct
Data Collection
IOAM
nodes
Data-collection based
Flow Aggregation
Message Broker based
Consolidation
Data Base
Join
25. 25
ETH Zürich,EduardBachmakov– Master Thesis
OperatingSystem-LevelLoad Distributionfor NetworkTelemetryData Collection
From network data collection
load distribution with
Anycast and ECMP on the
network to SO_REUSEPORT
with in the Linux network
kernel.
Describes current load
distribution challenges and
extends SO_REUSEPORT with
cutome eBPF code.
Running code on github at
https://github.com/insa-
unyte/ebpf-loadbalancer
https://www.research-collection.ethz.ch/handle/20.500.11850/507440
26. 26
ETH Zürich,LivioSgier– MasterThesis
VisualizingBGP RIB Changeswith BMPand IPFIX
From motivation over
network topology, to data
collection, data processing,
data storage to visualization.
Describes current state with
challenges and future
outlook..
Running code on github at
https://github.com/lsgier/BM
P-Visualization
https://www.research-collection.ethz.ch/handle/20.500.11850/451910
27. 27
IETF 114/MWC2022 – NetworkAnalyticsDevelopment
IPv6 Forum,SRv6 Data PlaneVisibility
5x BMP drafts and 1 RFC at
GROW working group.
Bringing RIB and route-policy
dimensions into BMP and
increase scale.
2x YANG push drafts at
NETCONF working group.
2x IPFIX Segment Routing
On-path delay draft and 1
RFC at OPSAWG working
group.
Network Anomaly Detection
code development.
YANG push udp-notif open-
source running code.
https://www.linkedin.com/pulse/network-analytics-
ietf-development-mwc-2022-thomas-graf/
https://www.linkedin.com/pulse/ietf-114-network-
analytics-bmp-ipfix-yang-push-thomas-graf/
28. Internship (Step In)
Requirements
✓ During or after university
education with a fascination for
the ICT world
What awaits you
✓ Indeendent work in an exciting project
area
✓ Contribute & implement your own ideas
✓ Personal & professional development
Employment information
✓ 40 - 100%
✓ 3 - 12 months
✓ Start: anytime
29. Trainee
Requirements
✓ Master's degree that was completed no longer than 12
months ago
✓ Fascination & affinity for the ICT world
✓ Very communicative, able to learn & willing to perform
What awaits you
✓ 2-3 project assignments in different areas of the company
✓ Participation in workshops & building of a large network
✓ Professional mentoring & support by our ambassadors
Employment Information
✓ 100%
✓ 12 months
✓ Possibility of permanant employment
✓ Start: every October
30. IT Trainee
Requirements
✓ Bachelor's or Master's degree in computer science or
technology, which was completed no longer than 12
months ago
✓ Very communicative, able to learn & willing to perform
What awaits you
✓ 2-3 project assignments in different areas of the company
✓ Participation in workshops & building of a large network
✓ Professional mentoring & support by our ambassadors
Employment information
✓ 60-100%
✓ 12-18 months
✓ Possibility of permanant employment
✓ Start: anytime
31. Junior Position
Requirements
✓ University degree with a fascination for the ICT world
and/or
✓ Initial experience in the professionals world and/or
✓ Career changers
What awaits you
✓ Broad responsibility in a junior position
✓ Contribute your own experience & skills
✓ Personal & professional development
Anstellungsinformationen
✓ 50-100%
✓ Permanent contract
✓ Start: anytime
32. 32
Contact information
Swisscom
Daisy Network Analytics
Thomas Graf
Binzring 17
8045 Zürich
Email thomas.graf@swisscom.com
Marco Tollini
Binzring 17
8045 Zürich
Email marco.tollini1@swisscom.com