Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Le SDN et NFV sont très à la mode en ce moment car en passant des appliance physiques aux équipement réseau massivement logiciel, celà devrait offrir une grande flexibilité et agilité aux entreprises (et telco en particulier). Néanmoins chainer des services réseau est un exercice encore très complexe et ce document vous explique ce qu'il est déjà possible de faire sur OpenStack en couplant par exemple : un load balancer (BigIP), un Firewall (BigIP), un réseau virtuel WAN (RiverBed) ou encore un routeur virtuel (Brocade).
Service Chaining overview (English) 2015/10/05Kentaro Ebisawa
This is English version with additional slides and updated diagrams presented at Network Programmability Study #6 held on 29th Sept.
ネットワークプログラマビリティ勉強会#6 で発表したスライドの英語バージョン。
スライド追加&図などアップデートしてあります。
http://network-programmability.connpass.com/event/19603/
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
DEVNET-1175 OpenDaylight Service Function ChainingCisco DevNet
This tutorial will overview the OpenDaylight Service Function Chaining (SFC) architecture, implementation and operation. A description of the SFC components and the Network Service Header (NSH) will be presented. This talk will conclude with a step-by-step demonstration of SFC configuration and operation using the GUI and REST interfaces.
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Le SDN et NFV sont très à la mode en ce moment car en passant des appliance physiques aux équipement réseau massivement logiciel, celà devrait offrir une grande flexibilité et agilité aux entreprises (et telco en particulier). Néanmoins chainer des services réseau est un exercice encore très complexe et ce document vous explique ce qu'il est déjà possible de faire sur OpenStack en couplant par exemple : un load balancer (BigIP), un Firewall (BigIP), un réseau virtuel WAN (RiverBed) ou encore un routeur virtuel (Brocade).
Service Chaining overview (English) 2015/10/05Kentaro Ebisawa
This is English version with additional slides and updated diagrams presented at Network Programmability Study #6 held on 29th Sept.
ネットワークプログラマビリティ勉強会#6 で発表したスライドの英語バージョン。
スライド追加&図などアップデートしてあります。
http://network-programmability.connpass.com/event/19603/
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
DEVNET-1175 OpenDaylight Service Function ChainingCisco DevNet
This tutorial will overview the OpenDaylight Service Function Chaining (SFC) architecture, implementation and operation. A description of the SFC components and the Network Service Header (NSH) will be presented. This talk will conclude with a step-by-step demonstration of SFC configuration and operation using the GUI and REST interfaces.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Odinot Stanislas
Une très intéressante présentation autour de la virtualisation des réseaux contenant des explications détaillées autour des VLAN, VXLAN, mais aussi d'NVGRE et surtout de GENEVE (Generic Network Virtualization Encapsulation) supporté pour la première fois sur la dernière carte 40 GbE d'Intel (XL710)
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
DEVNET-1006 Getting Started with OpenDayLightCisco DevNet
Install OpenDaylight within a VM on your own laptop. Acquaint yourself with the development environment. Learn your way around Dlux (GUI) and the CLI to view and operate an OpenDaylight controlled network. Activate and operate integrations to Cisco network elements
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
DEVNET-1152 OpenDaylight YANG Model Overview and ToolsCisco DevNet
YANG is a data modeling language defining device and service configuration and operations. This session will describe what YANG is (with examples), and its relationship to and how it is used in OpenDaylight. Several tools making it easier for the application developer to work with YANG will be discussed. It will conclude with a demonstration of YANGUI and YANG Visualizer, two new OpenDaylight applicationx that auto-generate a user interface and directed graph respectively, both based on selected YANG models.
These slides were presented at the 2013 Linux Plumbers Conference in New Orleans by myself and Vina Ermagan. We are doing work to enable LISP and NSH in Open vSwitch, and these slides gave some background on both of these protocols as well as detail on what we've accomplished and future directions.
Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Odinot Stanislas
Une très intéressante présentation autour de la virtualisation des réseaux contenant des explications détaillées autour des VLAN, VXLAN, mais aussi d'NVGRE et surtout de GENEVE (Generic Network Virtualization Encapsulation) supporté pour la première fois sur la dernière carte 40 GbE d'Intel (XL710)
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
DEVNET-1006 Getting Started with OpenDayLightCisco DevNet
Install OpenDaylight within a VM on your own laptop. Acquaint yourself with the development environment. Learn your way around Dlux (GUI) and the CLI to view and operate an OpenDaylight controlled network. Activate and operate integrations to Cisco network elements
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
DEVNET-1152 OpenDaylight YANG Model Overview and ToolsCisco DevNet
YANG is a data modeling language defining device and service configuration and operations. This session will describe what YANG is (with examples), and its relationship to and how it is used in OpenDaylight. Several tools making it easier for the application developer to work with YANG will be discussed. It will conclude with a demonstration of YANGUI and YANG Visualizer, two new OpenDaylight applicationx that auto-generate a user interface and directed graph respectively, both based on selected YANG models.
These slides were presented at the 2013 Linux Plumbers Conference in New Orleans by myself and Vina Ermagan. We are doing work to enable LISP and NSH in Open vSwitch, and these slides gave some background on both of these protocols as well as detail on what we've accomplished and future directions.
Synopsis: An introduction for software engineers to working with the fundamental data types and structures used by the ConfD C APIs. The confd_value_t structure is introduced. How to determine how YANG data model types map to confd_value_t types and the appropriate macros for manipulating a confd_value_t. Value arrays and tagged value arrays are also introduced.
Synopsis: Part 2 of a tutorial on the YANG data modeling language. The basics of YANG were taught in Part 1. More advanced YANG statements are taught in this module.
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
Summary slides of current Network OS status overview as of 16, Oct. 2015.
Comparison of two major Open Network OS: "OpenSwitch (ops)" and "Open Network Linux (ONL)".
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
Places in the network (featuring policy)Jeff Green
Networks of the Future will be about a great user experience, devices and things…
In an industry that’s already defined, Extreme Network’s recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy, typically applied in network evolutions, results in too many tools, procedures, and techniques. The patchwork quilt approach precludes fast responsiveness, optimal operations staff productivity, and sacrifices the accuracy and efficiency required to keep end-users productive as well.
The most important opportunity to improve efficiency for governments today is in boosting both the productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can, consequentially, have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally get the job done, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal must be for XYZ Account to reduce the number of “moving parts” required to build and operate any campus and introduce a level of simplicity and automation that will address your future.
Extreme’s strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extreme’s Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extreme’s Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network.
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreinside-BigData.com
In this deck from the 2018 Swiss HPC Conference, Erez Cohen from Mellanox presents: Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more.
"While InfiniBand, RDMA and GPU-Direct are an HPC mainstay, these advanced networking technologies are increasingly becoming a core differentiator to the data center. In fact, within just a few short years so far, where only a handful of bleeding edge industrial leaders emulated classic HPC disciplines, today almost every commercial market is usurping HPC technologies and disciplines in mass. Additionally, with the rampant adoption of demanding workloads like Machine Learning, cloud to on premise providers are now deploying the same advanced networking technologies and delivering the same core capabilities and performance as traditional HPC environments. These same data centers embracing AI are also driving the increased adoption of complex technologies including containers and virtualization that must also be optimized for performance, optimal profit and operational efficiency. In this talk we explore how high performance networking has emerged from HPC to become the critical path for the cloud, machine learning and much more."
Watch the video: https://wp.me/p3RLHQ-ixP
Learn more: http://mellanox.com
and
http://www.hpcadvisorycouncil.com/events/2018/swiss-workshop/agenda.php
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Packet Optical SDN Field Trial for Multi-Layer Network OptimizationADVA
Jim Theodoras’ presentation, broadcast live from 2016 Internet2 Global Summit in Chicago, covered the work that ADVA Optical Networking and Juniper Networks have accomplished towards interoperability of SDN controllers and outlined the advantages of joint SDN management of router and transport resources.
Cisco Automation with Puppet and onePK - PuppetConf 2013Puppet
"Cisco Automation with Puppet and onePK" by Jason Pfeifer Technical Marketing Engineer, Cisco.
Presentation Overview: This session will provide an overview of the cisco developed puppet functionality for management and configuration of Cisco devices.
Speaker Bio: Jason is a Cisco Technical Marketing Engineer focusing on programmability and automation of Cisco network devices. He is currently supporting, discussing, evangelizing, and writing applications against Cisco's onePK SDK. He also has a long term love affair with Cisco's Embedded Event Manager.
This reference design helps organizations design and configure a small to midsize data center (be¬tween 2 and 60 server racks) at headquarters or a server room at a remote site. You will learn how to configure the data center core, aggregation and access switches for connectivity to the servers and the campus network.
The Avaya Fabric Connect data center design supports high-speed 10 Gbps Ethernet connect-ed servers. The design can easily scale server bandwidth with link aggregation and servers can be connected to one or more switches in order to provide the level of availability required for the services delivered by the host. The design also supports legacy and low traffic servers that need 1 Gbps Ethernet connectivity,
The reference design presented in this guide is based on common network requirements and pro¬vides a tested starting point for network engineers to design and deploy an Avaya data center net¬work. This guide does not document every possible option and feature used to design and deploy networks but instead presents the tested and recommended options that will meet the majority of customer needs.
This design uses Avaya Fabric Connect in order to provide benefits over traditional data center design.
IT departments face several challenges in today’s data center:
· Data center traffic flow is not the same as campus traffic flow. Over 80% of the traffic is east-west, server-to-server, vs. north-south, client-to-server, like in a campus.
· Server virtualization allows a virtual machine or workload to be located anywhere in the physi¬cal data center. Data center networks can make it difficult to extend virtual local area networks (VLANs) and subnets anywhere in the data center.
· Server virtualization means that new services can be brought online in minutes or migrated in real time. Reconfiguring the network to support this is difficult because it can interrupt other services.
· Server virtualization means that the load on a physical box is much higher. Physical servers regularly host 10-50 workloads, driving network utilization well past 1 Gbps.
SAP Mobile infrastructure consists of multiple systems such as SAP Mobile Platform (formerly Sybase Unwired Platform) also SAP Afaria MDM solution, Sybase SQL Anywhere Database, and hundreds of SAP's mobile applications. They even have their own store for mobile apps that can be developed by third parties. This talk highlights how one can hack SAP Mobile.
In this popular platform, we have discovered a lot of typical vulnerabilities - XSS, XXE, hardcoded static encryption keys, and vulnerabilities that are specific to this platform - logic vulnerabilities and privilege escalations. As a result, after compromising the SAP Mobile platform, we demonstrated how to get access to compromised mobile phones.
Virtualization Forum 2015, Praha, 7.10.2015
sál Citrix
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
Anuta ATOM delivers a modular, extensible, scalable
and cloud-native software platform that enables enterprises and service providers to rapidly design and provision network services, collect real-time telemetry, develop in-depth network
analytics, ensure compliance and provide service assurance for multi-vendor physical and virtual infrastructure. With ATOM, networking teams can deliver services faster, eliminate
human errors, avoid security violations, reduce OpEx and meet SLAs with exceptional high availability.
Open network boxes to public
Current network devices are close systems
Intelligence to network nodes because
Internet infrastructure evolves slow
Customers can not add new services
Better use of network resources
Abundant bandwidth
Diversified clients’ needs
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingJaime Martin Losa
An extended, in-depth tutorial explaining how to fully exploit the standard's unique communication capabilities.Presented at the OMG June 2013 Berlin Meeting.
Users upgrading to DDS from a homegrown solution or a legacy-messaging infrastructure often limit themselves to using its most basic publish-subscribe features. This allows applications to take advantage of reliable multicast and other performance and scalability features of the DDS wire protocol, as well as the enhanced robustness of the DDS peer-to-peer architecture. However, applications that do not use DDS's data-centricity do not take advantage of many of its QoS-related, scalability and availability features, such as the KeepLast History Cache, Instance Ownership and Deadline Monitoring. As a consequence some developers duplicate these features in custom application code, resulting in increased costs, lower performance, and compromised portability and interoperability.
This tutorial will formally define the data-centric publish-subscribe model as specified in the OMG DDS specification and define a set of best-practice guidelines and patterns for the design and implementation of systems based on DDS.
Netronome's Nick Tausanovitch, VP of Solutions Architecture and Silicon Product Management, Linley Data Center Conference in Santa Clara, CA on February 9, 2016.
Presentation given at the 2017 LinuxCon China
With the booming of Container technology, it brings obvious advantages for cloud: simple and faster deployment, portability and lightweight cost. But the networking challenges are significant. Users need to restructure their network and support container deployment with current cloud framework, like container and VMs.
In this presentation, we will introduce new container networking solution, which provides one management framework to work with different network componenets through Open/friendly modelling mechnism. iCAN can simplify network deployment and management with most orchestration systems and a variety of data plane components, and design extendsible architect to define and validate Service Level Agreement(SLA) for cloud native applications, which is important factor for enterprise to deliver successful and stable service via containers.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. About Tail-f
• 90+ customers since foundation in 2005
• Roughly equal numbers in US, Europe and Asia
• HQ in Stockholm, US Office in Santa Clara
• Software products company targeting
• Service Providers
• Enterprise Data Centers
• Network Equipment Vendors
• Strong activity in standardization
October 10, 2013
2
3. About the Presenter
Jan Lindblad is the Principal Solutions Architect at
Tail-f Systems where he advises on the design of
devices and network management solutions. He is a
device and network management system expert
with extensive knowledge in information and data
modeling in Yang, XML Schema, UML and interfaces
include carrier class Command Line Interface (CLI),
NETCONF, WebUI and SNMP.
Jan is an active member of TeleManagement Forum (TMF), Internet
Engineering Task Force (IETF), Service Availability Forum (SAF). For
more than 25 years, he has worked as developer, applications engineer
and product manager for IBM, Ericsson, Enea.
Jan received his Masters in Computer Science from the Royal Institute
of Technology (KTH) in Stockholm, 1995. He has taught hundreds of
training classes in various programming languages, operating systems,
high availability, and network management and acted as long term
Swedish government industry advisor for the Vinnova program on
Advanced Software Technology (ASTEC).
October 10, 2013
3
4. Use Case: VPN with Service Chaining
Customer
Customer
A
B
Service
Provider
FW
APP
FILTER
IDS
Internet
WAN
ACCEL
Customer
C
POP
1
Customer
C
POP
2
To
sell
a
bit-‐pipe
is
nice.
To
sell
a
bit-‐pipe
plus
value
added
services
is
nicer.
If
you
can
scale.
October 10, 2013
4
5. Use Case: VPN with Service Chaining
Traffic
Shaper
A
Content
Filtering
WAN
acceleration
Firewall
A
B
IPS/IDS
B
How would you implement this?
• with short time to market
• in existing networks
• consisting of multiple-vendors
• across multiple technology
domains
• providing end-to-end visibility
from customer to network
resources
• and back from resources to
customer and SLA
October 10, 2013
• allowing gradual introduction of
future technologies like
OpenFlow
• permitting service changes with
minimal network impact
• automatically cleaning up unused
resources at service retirement
• in a highly-available
configuration
• at low cost
5
6. Use Case: VPN with Service Chaining
Traffic
Shaper
A
Content
Filtering
WAN
acceleration
Firewall
A
B
IPS/IDS
B
ImplementaMon
steps
and
opMons:
Implement
service
chain
and
configure
flow
route:
-‐ Policy
based
rouMng
-‐ OpenFlow
applicaMon
Select
L4-‐L7
devices
and
set
Set
flow
ow
each:
up
up
fl on
on
each
-‐ Many
brands
available
L4-‐L7
device
-‐ Physical
or
virtual
That’s
enough
to
add
flows.
Maybe
also
think
about
the
life-‐cycle?
Once
setup,
what
if
a
parMcular
service
chain
needs
to
be
reconfigured?
Or
decommissioned?
October 10, 2013
What
if
the
VPN
service
definiMon
is
upgraded
with
more
opMons?
What
if
one
of
the
service
chain
devices
is
replaced
with
a
different
brand
device?
So
how
can
SDN
and
OpenFlow
help
us?
6
7. SDN Architecture
SpecificaMon
Layer
Logically
centralized,
transacMonal,
global
specificaMon
model
SDN
Inventors
and
Gurus
Casado,
Shenker,
McKeown,
Koponen,
et
al.
describe
the
SDN
architecture
like
this:
Network
OperaMng
System
Layer
Logically
centralized,
transacMonal,
global
device
model
Forwarding
Layer
Distributed
mulM-‐
protocol
flow
forwarding
October 10, 2013
www.slideshare.net/marMn_casado/sdn-‐abstracMons
7
8. SDN Specification Layer
VPN
Service
AcMvaMon
Portal:
Add
Flow
Flow
Profile
Name:
HQDC
Inbound
From
Networks:
Internet
To
Networks:
116.54.16.128/26
Reserved
bandwidth:
2.5
Gb/s
QoS
profile:
RealMme
SLA
Level:
Gold
✓
WAN
Accelera@on
Content
filtering
Office
✓
SAP
Citrix
Backup
Skype
Video
File
Transfer
✓
Firewall
Configure…
Cancel
AcMvate
October 10, 2013
8
9. Service Application: Model-to-model mapper
VPN
Service
Model
Flow
Profile
Name:
unique
string
Key
SDN
ProperMes
• Logically
centralized
APIs
• Model-‐to-‐model
mapping
• Transac@ons
VPN
Service
AcMvaMon
Portal:
Add
Flow
From
Networks:
[
IP-‐address/mask
]
To
Networks:
[
IP-‐address/mask
]
Reserved
bandwidth:
integer
>
0
Service
ApplicaMon
Traffic
Steering
Device
Model
db
Nice
if
APIs,
UIs,
DB
schemas
are
rendered
from
service
model
Firewall
Device
Model
Port:
unique
integer
0..47
Src:
IP-‐address/mask
Dst:
IP-‐address/mask
AcMon:
drop
|
output(N)
|
…
October 10, 2013
Src:
IP-‐address/mask
Dst:
IP-‐address/mask
Port:
integer
1..65535
AcMon:
drop
|
allow
9
10. Service Application executing
Network-wide Transaction
Service
ApplicaMon
Network-‐wide
Transac@on
Rule
#46:
Port=1,
Src=*,
Dst=116.54.16.128/26,
AcMon=output(6)
Rule
#117:
Src=*,
Dst=116.54.16.128/26,
Port=80,
AcMon=allow
Rule
#47:
Port=7,
Src=*,
Dst=116.54.16.128/26,
AcMon=output(8)
Rule
#118:
Src=*,
Dst=116.54.16.128/26,
Port=*,
AcMon=drop
Network
OperaMng
System
Internet
October 10, 2013
1
2
3
4
5
6
7
8
9
10
Customer
A
In
Customer
B
Out
10
12. SDN and OpenFlow
October 10, 2013
OSPF
Learning
Switch
Controller
Controller
Controller
Behavior
Behavior
Behavior
OpenFlow
OpenFlow
• Pure
OpenFlow
networks
are
and
will
remain
rare
• New
OpenFlow
behaviors
very
convenient
for
solving
specific
network
problems
Service
Chaining
OpenFlow
Key
SDN
properMes
• Controller
implements
a
specific
behavior
• In
NOS,
each
behavior
appears
as
a
device
type
Network
OperaMng
System
12
14. Asia Tier 1 SP: Managed Services for Enterprise customers
NCS use case:
Business drivers:
•
•
•
Value-added services to
enterprise customers
More agile and dynamic
service provisioning
NCS
•
•
SW
SW
SW
SW
SW
SW
HW
Dynamic control of L3-L7
devices using serviceoriented network API
Service chaining using
OpenFlow
Virtualized appliances
HW
HW
SW
Branches
Core/Edge (Data Center)
October 10, 2013
14
15. SDN Use Case: Service Chaining
Management
Applications
NETCONF, REST, Java
Network
Engineer
Network-wide CLI, WebUI
Tail-f Network Control System
Service
Models
Service Manager
Flowlet
Models
Flowlets
Device
Models
Device Manager
OpenFlow Controller Cluster
Network Element Drivers
Flowlets
Flowlets
Traffic
Shaper
A
October 10, 2013
Content
Filtering
WAN
acceleration
Firewall
A
B
IPS/IDS
B
15
16. SDN Technology Summary
SDN is about Network Evolvability, splitting the Network Problem into
manageable pieces
The Specification Layer, a.k.a. Service Layer provides a business-level
interface for operators and applications. The interface
• is logically centralized to hide the complexities of distributed systems
• feeds a model-to-model mapping taking high-level concepts to specific device objects
• is transactional to protect operators and applications from having to deal with the
complexities of error recovery and activation orchestration
The Network Operating System Layer provides a device-level interface for
operators and applications. The interface
•
is transactional to protect from error recovery and activation orchestration complexity
•
feeds a model-to-multiple protocols mapping where device type, vendor and
management protocol is irrelevant to operators and applications
The Forwarding Layer can be controlled through OpenFlow or traditional
protocols like Cisco CLI
• In reality there is a mix of traditional and OpenFlow devices
• Speaking multiple device protocols is key in real networks
• All device behaviors are described with device data models
October 10, 2013
16
17. Customer Quote: DT TeraStream SDN Goal
The reason for us doing SDN is that we can
program services instead of re-architecting
the network and the OSS for every new
service.
We are not necessarily interested in
programming the network, but
programming the network services is key
for us - this concept drastically reduces our
time to market from years to weeks.
- Axel Clauberg
VP & CTO, Deutsche Telekom (the TeraStream project)
October 10, 2013
17