An updated presentation (v1.2) about what is the concept and the idea behind Network Function Virtualisation (NFV) for Tampere University of Technology Service oriented architectures course. Includes introduction to NFV and VNF (Virtualised Network Function) architecture, components and interfaces.
What is Network Function Virtualisation (NFV)?Karri Huhtanen
A presentation about what is the concept and the idea behind Network Function Virtualisation (NFV). Includes introduction to NFV and VNF (Virtualised Network Function) architecture, components and interfaces.
Insights on the configuration and performances of SOME/IP Service DiscoveryNicolas Navet
Scalable Service-Oriented Middleware on IP (SOME/IP) is a proposal aimed at providing service-oriented communication in vehicles. SOME/IP nodes are able to dynamically discover and subscribe to available services through the SOME/IP Service Discovery protocol (SOME/IP SD). In this context, a key performance criterion to achieve the required responsiveness is the subscription latency that is the time it takes for a client to subscribe to a service. In this paper we provide a recap of SOME/SD and list a number of assumptions based on what we can foresee about the use of SOME/IP in the automotive domain. Then, we identify the factors having an effect on the subscription latency, and, by sensitivity analysis, quantify their importance regarding the worst-case service subscription latency. The analysis and experiments in this study provide practical insights into how to best configure SOME/IP SD protocol.
The objective of study is to guarantee QoS for multiple service class traffic in a multiple connection environment and to examine a case of QoS deployment over a cellular WiMAX network. In particular, the thesis compares the performance how much bandwidth for voip
What is Network Function Virtualisation (NFV)?Karri Huhtanen
A presentation about what is the concept and the idea behind Network Function Virtualisation (NFV). Includes introduction to NFV and VNF (Virtualised Network Function) architecture, components and interfaces.
Insights on the configuration and performances of SOME/IP Service DiscoveryNicolas Navet
Scalable Service-Oriented Middleware on IP (SOME/IP) is a proposal aimed at providing service-oriented communication in vehicles. SOME/IP nodes are able to dynamically discover and subscribe to available services through the SOME/IP Service Discovery protocol (SOME/IP SD). In this context, a key performance criterion to achieve the required responsiveness is the subscription latency that is the time it takes for a client to subscribe to a service. In this paper we provide a recap of SOME/SD and list a number of assumptions based on what we can foresee about the use of SOME/IP in the automotive domain. Then, we identify the factors having an effect on the subscription latency, and, by sensitivity analysis, quantify their importance regarding the worst-case service subscription latency. The analysis and experiments in this study provide practical insights into how to best configure SOME/IP SD protocol.
The objective of study is to guarantee QoS for multiple service class traffic in a multiple connection environment and to examine a case of QoS deployment over a cellular WiMAX network. In particular, the thesis compares the performance how much bandwidth for voip
Telco Cloud - 02. Introduction to NFV - Network Function VirtualizationVikas Shokeen
http://telecomtutorial.info
Covering Introduction & Tutorial for Virtualization & NFV in Telco Networks . Covering Difference between NFV & SDN or How they work . Both architectures use network abstraction, they do so differently. While NFV covers Softwarization , Virtualization and makes building blocks ready , SDN forwards data packets from one network device to another. At the same time, SDN's networking control functions for routing & policy definition
• NFV : Network function Virtualization : Introduction & Basics
• Why we need NFV & Features of NFV
• ETSI Framework & Specs
• NFV Architecture
• Need of SDN
Connect Me @ Linkedin : www.linkedin.com/in/vikas-shokeen
Automate programmable fabric in seconds with an open standards based solutionTony Antony
Discover how how the standards-based Cisco Programmable Fabric with open APIs enables the Cisco Virtual Topology System (VTS) to automate overlay network provisioning with a highly scalable solution that truly integrates physical and virtual networks.
Learn how the Cisco VTS dramatically simplifies operations, reducing provisioning time from weeks to mere seconds. Find out how this open standards-based BGP EVPN control plane increases VXLAN scalability, extending workload placement and mobility range.
Network Virtualization is the natural evolution of network service delivery and packaging. Network Security provides an excellent example of this trend. With network virtualization, the application’s virtual Network is provisioned in lock step with virtual Computer.
SAN Extension Design and Solutions
Help your organization ensure data is backed up and available, both locally and remotely. Expert guidance on the pros and cons of various SAN design options, and which to choose
Learn from Cisco experts in this technical session as we cover the following:
•How to achieve the desired recovery time objective and recovery point objective for the business
•Pros and cons of various SAN extension solution designs, and which one to choose
•Cisco solutions and products for SAN extension using native Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and Fibre Channel over Internet Protocol (FCIP) protocols
•Best practices collected from a decade’s worth of experience with some of the largest deployments in the world
•Configuration guidelines/best practices to increase the return on your investment
•Guidelines for increasing performance and security while lowering solution costs
Brocade: Storage Networking For the Virtual Enterprise EMC
This Session will review the latest in storage networking protocols for EMC storage platforms. Topics include new architecture for scaling SAN fabrics, new features for enhancing SAN metro connectivity, and new capabilities for SAN Management. We will also review Ethernet Fabric deployments for FCOE, iSCSI and NAS.
Scalable Service-Oriented Middleware over IPDai Yang
ABSTRACT
Due to the increased amount of communication in cars, a reliable and easy to use middleware system for automotive applications becomes a popular research field. In this paper, we review a recent approach: the Scalable Service-Oriented Middleware over IP (SOME/IP). We present current tech- nologies and how SOME/IP differs from them. We point out how SOME/IP is ordered into the ISO/OSI layer model and discuss its service orientation. We also present the ad- vantages and disadvantages of SOME/IP. In the end, we analyze its timing behavior and whether it is suitable for automotive software or not.
Network Function Virtualization (NFV) BoF, by Santanu Dasgupta.
A presentation given at the APNIC 40 APNIC Network Function Virtualization (NFV) BoF session on Tue, 8 Sep 2015.
Telco Cloud - 02. Introduction to NFV - Network Function VirtualizationVikas Shokeen
http://telecomtutorial.info
Covering Introduction & Tutorial for Virtualization & NFV in Telco Networks . Covering Difference between NFV & SDN or How they work . Both architectures use network abstraction, they do so differently. While NFV covers Softwarization , Virtualization and makes building blocks ready , SDN forwards data packets from one network device to another. At the same time, SDN's networking control functions for routing & policy definition
• NFV : Network function Virtualization : Introduction & Basics
• Why we need NFV & Features of NFV
• ETSI Framework & Specs
• NFV Architecture
• Need of SDN
Connect Me @ Linkedin : www.linkedin.com/in/vikas-shokeen
Automate programmable fabric in seconds with an open standards based solutionTony Antony
Discover how how the standards-based Cisco Programmable Fabric with open APIs enables the Cisco Virtual Topology System (VTS) to automate overlay network provisioning with a highly scalable solution that truly integrates physical and virtual networks.
Learn how the Cisco VTS dramatically simplifies operations, reducing provisioning time from weeks to mere seconds. Find out how this open standards-based BGP EVPN control plane increases VXLAN scalability, extending workload placement and mobility range.
Network Virtualization is the natural evolution of network service delivery and packaging. Network Security provides an excellent example of this trend. With network virtualization, the application’s virtual Network is provisioned in lock step with virtual Computer.
SAN Extension Design and Solutions
Help your organization ensure data is backed up and available, both locally and remotely. Expert guidance on the pros and cons of various SAN design options, and which to choose
Learn from Cisco experts in this technical session as we cover the following:
•How to achieve the desired recovery time objective and recovery point objective for the business
•Pros and cons of various SAN extension solution designs, and which one to choose
•Cisco solutions and products for SAN extension using native Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and Fibre Channel over Internet Protocol (FCIP) protocols
•Best practices collected from a decade’s worth of experience with some of the largest deployments in the world
•Configuration guidelines/best practices to increase the return on your investment
•Guidelines for increasing performance and security while lowering solution costs
Brocade: Storage Networking For the Virtual Enterprise EMC
This Session will review the latest in storage networking protocols for EMC storage platforms. Topics include new architecture for scaling SAN fabrics, new features for enhancing SAN metro connectivity, and new capabilities for SAN Management. We will also review Ethernet Fabric deployments for FCOE, iSCSI and NAS.
Scalable Service-Oriented Middleware over IPDai Yang
ABSTRACT
Due to the increased amount of communication in cars, a reliable and easy to use middleware system for automotive applications becomes a popular research field. In this paper, we review a recent approach: the Scalable Service-Oriented Middleware over IP (SOME/IP). We present current tech- nologies and how SOME/IP differs from them. We point out how SOME/IP is ordered into the ISO/OSI layer model and discuss its service orientation. We also present the ad- vantages and disadvantages of SOME/IP. In the end, we analyze its timing behavior and whether it is suitable for automotive software or not.
Network Function Virtualization (NFV) BoF, by Santanu Dasgupta.
A presentation given at the APNIC 40 APNIC Network Function Virtualization (NFV) BoF session on Tue, 8 Sep 2015.
NFV is "network function virtualization" and is a hot topic in virtualization and cloud infrastructure. This presentation walks through what NFV is and how the ManageIQ community could potentially integrate with various NFV implementations.
For more on ManageIQ, see http://manageiq.org/
Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions.
In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours.
Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers.
The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible.
In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Slides introducing NFV and what is done on the subject in OpenStack and explaining the benefits of 6WIND Gate in an NFVi setup with OpenStack. Presentation done with Vincent Jardin, CTO at 6WIND.
6WINDGate™ - Enabling Cloud RAN Virtualization6WIND
Traditional mobile networks are based on stand-alone Base Transceiver Stations covering a radio area. BTS overlap to provide a wide coverage to mobile users and are connected to the mobile core network through a backhaul network. Cloud Radio Access Network is a new architecture for mobile access networks that rely on simple radio front-ends connected to a pool of remote network resources. By leveraging cloud infrastructures, CAPEX and OPEX is lowered substantially.
Distributed VNF Management - Architecture and Use casesTrinath Somanchi
Telco operators are on journey to discover what virtualization means for the network. Markets have believed that NFV architecture elements: NFVI and VIM, hold the complete responsibility in providing virtualized networks with carrier grade properties.
Telco operators have reached to a conclusion that VNFs must take their fair share of responsibility to realize NFV goals while meeting carrier-grade behavior in the entire NFV architecture. While the trend moves on, Cloud native VNFs are emerging best citizens of the cloud. Thus communication from EMS to VNFM is blurred and eventually may disappear in the future. This requires better understanding of, and agreement over the role of VNFMs and EMS for VNFs.
This presentation describes the evolution of Distributed VNF management, Architectural design considerations and Use-case scenarios. The following proposal is based on a comprehensive study on evolving cloud native VNF management.
Distributed vnf management architecture and use-casesOPNFV
Sridhar Pothuganti, NXP, Trinath Somanchi, NXP
Telco operators are on journey to discover what virtualization means for the network. Markets have believed that NFV architecture elements: NFVI and VIM, hold the complete responsibility in providing virtualized networks with carrier grade properties.
Telco operators have reached to a conclusion that VNFs must take their fair share of responsibility to realize NFV goals while meeting carrier-grade behavior in the entire NFV architecture. While the trend moves on, Cloud native VNFs are emerging best citizens of the cloud. Thus communication from EMS to VNFM is blurred and eventually may disappear in the future. This requires better understanding of, and agreement over the role of VNFMs and EMS for VNFs.
This presentation describes the evolution of Distributed VNF management, Architectural design considerations and Use-case scenarios. The following proposal is based on a comprehensive study on evolving cloud native VNF management.
TechWiseTV Workshop
(Original Webinar May 11, 2016, replay: http://cs.co/9005BoG6c
Cisco recently introduced Enterprise Network Functions Virtualization (NFV) as part of the digital network architecture: an architecture that allows you to transform your business to innovate more quickly, simplify operations, and reduce risk.
In this 60-minute workshop, we will deep dive into the technology behind Cisco Enterprise NFV. You’ll learn about the four components—orchestration and management, virtual network functions, virtualization layer, and the underlying hardware—and how all the components work together to provide a custom-fit solution for the enterprise. You will also see a demo of Enterprise Service Automation (ESA), the software-defined networking application that makes NFV all the easier for you to adopt.
Cisco Enterprise NFV will transform the way you think about the network and its services.
Watch the Workshop Replay: http://cs.co/9005BoG6c
Animation: 'Fundamentals of Enterprise NFV': http://bit.ly/ENFV_FUN
Watch the TechWiseTV DNA Episode, Part 1: https://youtu.be/TzGpNEfvMC8
Part 2: https://youtu.be/314-NyizsCA
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyKarri Huhtanen
Karri Huhtanen's presentation about Wi-Fi Roaming Security and Privacy in Disobey 2024 on the 16th of February 2024 ( https://disobey.fi/2024/profile/disobey2024-154-wi-fi-roaming-security-and-privacy ).
Wi-Fi network security presentations are often about breaking the link level (radio) encryption or deploying evil twin Wi-Fi access points to perform man-in-the-middle attacks. This presentation focuses instead to the security and privacy in Wi-Fi roaming, offloading and federated networks, where there are different issues and vectors to utilise or defend against.
Adding OpenRoaming to existing IdP and roaming federation serviceKarri Huhtanen
The first deployment experiences of adding OpenRoaming functionality to existing IdP and roaming federation service. A presentation presented in the OpenRoaming Implementer's call on the 2nd of November 2022.
My presentation in the Radiator Software's webinar about OpenRoaming, how it works, what are its benefits and how Radiator Software can help to deploy it in your business.
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingKarri Huhtanen
A presentation at FUNET Technical Days 2021 about research projects combining (5G) SIM authentication to eduroam Finland and ongoing work and benefits with OpenRoaming global Wi-Fi roaming in roam.fi or eduroam Finland networks.
Routing host certificates in eduroam/govroamKarri Huhtanen
A presentation for govroam stakeholders' meeting about issuing, configuring and deploying such host client certificates, which can be used in roaming federation networks such as eduroam, govroam, roam.fi, openroaming etc.
A presentation for KyLÄ project opening seminar ( https://projects.tuni.fi/kyla/tapahtumat/avausseminaari/ ) about experiences and lessons learned in building cooperative labs, testbeds and networks.
Privacy and traceability in Wi-Fi networksKarri Huhtanen
Tampere Smart City Week 2021 presentation about recent privacy and traceability developments in Wi-Fi networks and especially about MAC address randomisation and its implications.
Updated, extended presentation how to deploy EAP-TLS based certificate authentication and authorisation solution within organisation or enterprise. In addition to EAP-TLS in general, the presentation also covers some features of Radiator RADIUS server software, which are particularly useful when used with certificates and EAP-TLS. The presentation was originally presented in the JISC govroam stakeholder's meeting 23rd of October 2019 in London, United Kingdom.
Security issues in RADIUS based Wi-Fi AAA (aka WPA2 Enterprise AAA) presentation in alumni seminar for Tampere University of Technology information technology, software engineering and telecommunications alumni at Tampere University of Technology, 13th of October 2018.
If you think they are easy, you are (probably) doing them wrong. A presentation about issues with TLS and X.509 certificates for Tampere security people (TreSec, @TreSecCommunity) meetup on 21st of March 2018.
Building secure, privacy aware, quality Wi-Fi coverage via cooperationKarri Huhtanen
Building secure, privacy aware, quality Wi-Fi coverage via cooperation presentation for MindTrek 2015 ( #mtom2015 ) in Tampere, Finland. The presentation covers an idea to build community Wi-Fi networks by joining existing networks via federated RADIUS authentication just like eduroam, but for all organisations, cities, government organisations, operators and companies regardless if they are commercial or not.
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringKarri Huhtanen
Nowadays data of the network usage is too often separated to various network components all around service provider network. Utilising RADIUS more efficiently is one approach to collect more data about network usage, combining it to network measurement, monitoring and management makes it even more efficient tool to use to get a real network situation and history overview.
Building city and nationwide Wi-Fi coverage via cooperationKarri Huhtanen
Building city and nationwide Wi-Fi coverage via cooperation presents the problem of building yet another overlapping citywide network instead of choosing cooperative approach to connect existing Wi-Fi networks via common policies, configurations and authentication decisions. The presentation promotes expanding eduroam(tm) model from academic world to regional, intercompany and government roaming.
Using NoSQL databases to store RADIUS and Syslog dataKarri Huhtanen
A seminar presentation done for TUT's NoSQL course. A brief look into the possibility and the feasibility of using NoSQL databases to store RADIUS accounting and Syslog data. In this particular case, Syslog-NG, Radiator RADIUS server and MongoDB were used as trial platforms. The presentation includes configuration examples and also some code.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
7. Geographically distributed dedicated hardware
devices
router
router
router
router
firewall
firewall
firewall
server
server
server
server
server
server
access
gateway
router router
router
router router
firewall firewall
DHCP
DNS
11. The brave new world of
Network Function Virtualisation
NFV
12. Instead of this …
router
router
router
router
firewall
firewall
firewall
server
server
server
server
server
server
access
gateway
router router
router
router router
firewall firewall
DHCP
DNS
14. Virtualised Network
Functions / devices
● Virtualised network functions run on virtual
hosts on top of the virtualisation
infrastructure in data centers or PoPs
● Virtual infrastructure can extend across PoPs
17. Capacity is general-
purpose capacity
●
●
●
Broadband Customer and Mobile Network PoPs prepare for
prime time in streaming by repurposing capacity to streaming
caches and regional routing and access capacity.
Enterprise customer
fights DDoS with
additional firewall
capacity
Operator prepares for peak
in SMS/MMS messages
Content Service
Provider adds
more capacity
and caching for
prime time
Prime time traffic
requires more firewall
capacity
19. This is called Network Function Virtualisation
Infrastructure (NFVI)…
20. Each of the small boxes can be
a Virtualised Network Function (VNF) …
21. Each of the VNFs can consist of multiple
components (VNFC) …
Load
balancer
Load
balancer
Packet
Filter
Packet
Filter
Packet
Filter
Packet
Filter
Stateful
Firewall
Stateful
Firewall
Stateful
Firewall
Stateful
Firewall
Policy
and Rule
Database
Policy
and Rule
Database
VNFC VNFC
VNFCVNFC
● Each Virtualised Network
Function Component (VNFC)
may consist of several virtual
hosts, which automatically
scale up and down when
needed.
● VNFs and VNFCs can both
provide e.g. REST or netconf
interfaces for management,
monitoring and integration
purposes.
22. Idea is that VNFCs and VNFs can be re-used…
● … as building blocks of
new VNFs and services.
● They are supposed to
have web services like
REST APIs => web
developers are supposed
to be able to build
operator customer
self-service portals
● Standardised interfaces
should mean better
vendor interoperability
=> avoiding vendor
lock-ins