In this presentation, you'll learn how to get started with bandwidth monitoring tool, NetFlow Analyzer.
Topics covered:
1. Configuring flow export from network devices
2. Traffic group
3. Application mapping
4. In-depth traffic visibility
5. Threshold-based alerting
This presentation covers the basics about OpenvSwitch and its components. OpenvSwitch is a Open Source implementation of OpenFlow by the Nicira team.
It also also talks about OpenvSwitch and its role in OpenStack Networking
Implementing BGP Flowspec at IP transit networkPavel Odintsov
This document discusses implementing BGP Flowspec at an IP transit network to help mitigate distributed denial of service (DDoS) attacks. BGP Flowspec allows network operators to announce flow specifications via BGP to define distributed access lists across their network. The document outlines BGP Flowspec options, typical attack scenarios with and without its use, implementation considerations, validation of rules, statistics collection, and plans for a web portal and integration with attack detection systems. Over 85% of detected DDoS traffic was found to originate from foreign interfaces, showing BGP Flowspec's effectiveness against such attacks.
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
Do you wish that you could provide more automatic methods to monitor your network? Have you ever wasted hours to capture evidence of a transient network issue? Do you know which part of your network is likely to fail next? And how to prevent it? Your Cisco IOS® Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This session uncovers embedded Network Automation capabilities you can use to interact with your network elements for the purpose of implementing network testing, verification and service assurance in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
The document provides an overview and agenda for a technical deep dive into Cisco SD-WAN. It discusses extending Cisco SD-WAN to Cisco routers, using Cloud onRamp to improve access to SaaS and IaaS applications, and providing layered security between sites and to the cloud. It also covers operations and troubleshooting capabilities in Cisco SD-WAN such as infrastructure monitoring, application visibility, performance statistics, and troubleshooting tools.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Bruno Teixeira
The document discusses Cisco's ASR 9000 router system architecture. It provides an overview of the ASR 9000 product portfolio including the ASR 9901, ASR 9904, ASR 9906, and ASR 9910 models. It describes the key components and features of the routers, such as their networking processors, line cards, switching fabric, and packet processing capabilities. The document also reviews the evolution of the ASR 9000 line cards from earlier generations to the current Tomahawk-based cards.
Introduction to SDN: Software Defined NetworkingAnkita Mahajan
SDN is the next big thing in networking. It focuses on separating the intelligence from the hardware. OpenFlow is one of the ways (currently the open standard followed by all Datacenters) to implement SDN.
The document provides instructional materials for a chapter on the network layer. It covers topics like network layer protocols including IPv4 and IPv6, routing, routers, and configuring Cisco routers. Sections explain how network layer protocols support communication across networks and the purpose of fields in IPv4 and IPv6 packets. It also details how hosts, routers, and their routing tables determine the path for packets to travel to reach their destination on either the local network or remote networks.
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
The document discusses deploying SDN on the Cisco ASR 9000 platform. It provides an overview of SDN drivers, concepts and definitions. It then describes how the ASR 9000 supports SDN through capabilities like BGP-LS, stateful PCEP, OpenFlow, NETCONF/YANG. The rest of the document discusses these protocols and technologies in more detail and provides examples and configurations for SDN on the ASR 9000.
The document discusses using open source tools pfSense and FRR to improve the security and reliability of Internet Service Provider (ISP) networks in Bangladesh. Case studies show how pfSense implemented as a firewall and router can block malware and threats based on intelligence feeds. This provides a better user experience than MikroTik routers by filtering attacks and bad actors at the core network level. The solution is low cost and easy for ISPs to implement and maintain.
Comparing Open Source SDN Controllers, like OpenDaylight, OpenContrail, and ONOS is a challenge. Here, we’ll compare open source SDN Controllers. In a software-defined network (SDN), the SDN Controllers is the “brains” of the network. It is the strategic control point in the SDN network, relaying information to the switches/routers ‘below’ (via southbound APIs) and the applications and business logic ‘above’ (via northbound APIs).
The document discusses IP/MPLS and SD-WAN technologies for connecting sites in a network. IP/MPLS uses MPLS services at layers 2 and 3 to securely connect sites with high performance and quality of service guarantees. SD-WAN brings together multiple connection types like MPLS, internet, and LTE into a single software-controlled network to reduce WAN costs while improving performance and security. For businesses, SD-WAN provides benefits of scalability, cost reduction, and ease of use, while MPLS is still needed for large enterprises with strict connectivity requirements. Both technologies will likely coexist with SD-WAN adoption increasing and MPLS use decreasing over time.
Modern Data Center Network Architecture - The house that Clos builtCumulus Networks
The document discusses the rise of the modern data center and CLOS networks as the new architecture that is well-suited for modern data center needs. A CLOS network topology is scalable, provides fine-grained failure domains, and simplifies network design using only IP without other complex protocols. This architecture coupled with network virtualization enables agility, flexibility, and simplified management of large scale data center networks.
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
This document discusses developing SDN applications in Ryu. It provides an overview of OpenFlow, introduces Ryu application development, describes the OpenFlow API in Ryu, and demonstrates a hub application that floods ICMP packets and sends other protocols to the controller. The presenter is John-Lin from National Tsing Hua University researching network security in SDN using the Ryu controller.
Using eBPF for High-Performance Networking in CiliumScyllaDB
The Cilium project is a popular networking solution for Kubernetes, based on eBPF. This talk uses eBPF code and demos to explore the basics of how Cilium makes network connections, and manipulates packets so that they can avoid traversing the kernel's built-in networking stack. You'll see how eBPF enables high-performance networking as well as deep network observability and security.
Overview of kubernetes network functionsHungWei Chiu
In this slides, I briefly introduce the network function in the kubernetes and explain how kubernetes implement them.
Those function includes the container network interface (CNI) and kubernetes service.
In the last, I introduce the multus CNI which is designed for multiple networks in the container and it's necessary in some use case, such as SDN/NFV/5G
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...Cisco DevNet
This document provides an agenda and overview for a presentation on network automation using APIs, Ansible, and Python. The presentation introduces network programmability and automation tools like Ansible, discusses using infrastructure as code approaches, and provides examples of automating network device configurations and modules using Python and Jinja templates. It aims to help network engineers get started with network automation.
RTP NPUG: Ansible Intro and Integration with ACIJoel W. King
Ansible is one of the newer and more exciting automation toolsets for networking. Ansible (unlike Puppet and Chef) is agentless, which makes it significantly easier to automate existing devices that may not have an agent installed – such as many networking devices.
Networks are evolving from hundreds or thousands of individual devices to the Software-Defined Network paradigm of a single fabric under a central controller. The GUI on top of an SDN controller isn’t sufficient and will still need automation.
This presentation describes how Ansible can add value to configuration management of a Cisco Application Centric Infrastructure (ACI) infrastructure.
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
This document provides an overview of software defined networking (SDN). It discusses how SDN enables data center teams to use software to efficiently control network resources, compared to traditional network switches. The document outlines several SDN topics and related technologies, including SDN standards, network function virtualization, use cases, sample projects, surveys, case studies, online courses, and software tools. It also includes sections on SDN architecture and how SDN is important for virtual environments and VM mobility.
Daniel Firestone and Gabriel Silva's presentation from the 2017 Open Networking Summit.
SDN is at the foundation of all large scale networks in the public cloud, such as Microsoft Azure - at past ONSes, Microsoft has detailed how all of Azure's virtual networks, load balancing, and security operate on SDN. But how do we make a software network scale to an era of 40, 50, and 100 gigabit networks on servers, providing great performance to end customers with ever increasing VM and container scale and density?
In this presentation, Daniel Firestone and Gabriel Silva will detail Azure Accelerated Networking, using Azure's FPGA-based SmartNICs. They will show how using FPGAs, we can achieve the programmability of a software network with the performance of a hardware one. They will detail how this and other host SDN advances have led to huge performance increases for Linux VMs in particular, and Linux-based NFV appliances, giving Azure industry-leading network performance.
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
Uploading slides presented in the OpenStack summit, at Austin in April, 2016. Here is the link to the video,
https://www.openstack.org/videos/video/optimising-nfv-service-chains-on-openstack-using-docker
This document discusses optimizing network function virtualization (NFV) service chains on OpenStack using Docker containers. Docker containers provide better utilization of resources and higher density of workloads compared to virtual machines, with reduced overhead since there is no hypervisor layer. The design presented uses Docker containers as network functions chained locally on each OpenStack host for low latency. Areas of work include running Docker and KVM on the same host, configuring Open vSwitch for service chains, and Docker daemon interactions for on-demand network functions and tenant isolation.
This document discusses deploying VMware NSX Network Virtualization. It covers:
1. The objectives are to learn about NSX deployments with multiple hypervisors, NSX components required, and packet flows in logical networks.
2. The NSX architecture includes features like logical switching, routing, firewall, load balancing and VPN. Key components are the NSX controller, vSwitch, logical switches and NSX gateway.
3. Deploying NSX involves building the physical infrastructure, preparing NSX including the controller and manager, and then consuming applications through the network API.
Uploading slides presented in the OpenStack summit, at Austin in April, 2016. Here is the link to the video,
https://www.openstack.org/videos/video/optimising-nfv-service-chains-on-openstack-using-docker
This document discusses software-defined networking (SDN) and network automation using DevOps tools. It defines SDN as a programmatic framework to optimize network services delivery and management. It explains that SDN solutions can be either vendor-developed or custom-built. The document then discusses DevOps and how network engineers can integrate networks into DevOps workflows through practices like NetDevOps. It provides examples of controller-based and tool-based network abstraction using technologies like Ansible, Cisco ACI, and OpenDaylight. The rest of the document demonstrates network automation concepts and compares orchestration tools from vendors like Cisco, Ansible, Chef, and SaltStack.
Andrianina Rakotondrafahitra has over 10 years of experience as a senior lead system and network administrator providing support for designing, implementing, deploying, maintaining and monitoring systems and networks to ensure high availability. They have experience with a wide range of technologies including Windows and Linux servers, virtualization, networking, security, and backup solutions.
The company currently uses 50 Windows XP computers and needs to upgrade its network. The report recommends installing Windows Server 2003, 2 Cisco switches, a Cisco router, additional hardware, and providing user training. This will connect the company's intranet to the internet, create a secure network, and cost approximately $17,382. User training will help employees learn the new system and take place in small groups.
Feedback on Big Compute & HPC on Windows AzureANEO
Is the cloud relevant for high performance workloads ? We answer by sharing our experience : HPC consultants at ANEO have ported and optimized a distributed scientific software developed at Supelec, from their Linux cluster to Microsoft's new cloud technology, Big Compute (InfiniBand nodes interconnect).
1) The document provides a summary of a lecture on Software Defined Networking (SDN) and its history and components.
2) SDN is defined as separating the network control plane from the data plane, allowing network administrators to manage network services through abstraction.
3) The lecture traces the history of SDN from 2004 research through the founding of the Open Networking Foundation in 2011 and increasing commercial adoption.
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized control of network behavior via software. NFV virtualizes network functions like firewalls and load balancers that were traditionally hardware appliances. Both seek to standardize networking functions through open source projects and standards bodies like ONF for SDN and ETSI for NFV. Major implementations include OpenStack for virtual infrastructure, OpenDaylight as an SDN controller, and OpenFlow as the SDN protocol. While complementary, SDN and NFV face challenges around vendor support and complexity that could slow wide adoption.
SDN and NFV both aim to virtualize and commoditize network hardware to reduce costs and increase flexibility. SDN separates the control plane from the data plane to allow centralized programming of network behavior, while NFV virtualizes network functions that were traditionally hardware-based appliances. The two technologies complement each other and are being developed through open standards and open source projects to drive industry adoption. Major challenges include developing common frameworks and ensuring interoperability between solutions.
This document describes the design of a physical SDN switch using Open vSwitch (OVS) software and the Soekris net4801 hardware platform. OVS allows the hardware device to act as an OpenFlow-controlled Ethernet switch. Performance tests showed the device could achieve up to 50Mbps bandwidth but was CPU-limited. While an OVS software solution enables SDN functionality, more powerful hardware would be needed for high-performance switching. The study demonstrated a way to implement SDN in physical networks using commodity hardware and open source software.
Cozystack: Free PaaS platform and framework for building cloudsAndrei Kvapil
With Cozystack, you can transform your bunch of servers into an intelligent system with a simple REST API for spawning Kubernetes clusters, Database-as-a-Service, virtual machines, load balancers, HTTP caching services, and other services with ease.
You can use Cozystack to build your own cloud or to provide a cost-effective development environments.
The document discusses Burlington Electric Department's deployment of a secure distributed SCADA (DSCADA) system using data-diodes in a self-contained fiber-optic network. It describes how the system shares data from a high security SCADA network to a lower security business LAN network through uni-directional gateways for improved isolation and security. The deployment addressed issues with the previous firewall-based system and provides benefits like complete isolation of the critical SCADA systems while still enabling necessary communications.
Konrad Brunner discusses keys to consider when moving to next generation databases in the cloud. ARM templates are key for defining infrastructure as code and managing infrastructure together with applications. Automation is key for streamlining deployments, scaling resources, and saving money. Identities, network configuration, and application management are also important to consider for security and governance when adopting next generation databases in the cloud.
Similar to NCS: NEtwork Control System Hands-on Labs (20)
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
The document discusses network slicing, which is the next step in virtualization for 4G/5G mobile networks. Network slicing allows the core network to be partitioned into multiple logical networks or "slices", each with its own network functions to support the requirements of different services. This approach enables network resources and functions to be allocated to specific services or customer segments in a flexible manner. It reduces complexity compared to existing networks that must support many different services and customers on a single common infrastructure. The key benefits of network slicing include improved network agility and the ability to support diverse service requirements.
The document summarizes a Cisco presentation on next-generation datacenter security. It discusses how the majority of security teams' time is spent securing servers and data in the datacenter. It then covers challenges such as budget constraints, product overload, and complexity of threats. The presentation introduces Cisco's architectural approach to datacenter security focusing on threat prevention, visibility, segmentation, threat intelligence, automation, and analytics. It provides examples of Cisco solutions that integrate to deliver firewall, access control, analytics, and other capabilities.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
The document discusses Cisco's solutions for securing mobility, including Meraki SM, Cisco AMP for Endpoint, Cisco Umbrella, Cisco Cloudlock, Cisco Cloud Email Security, Cisco Threat Response, Identity Service Engine, and Cisco DUO Security. Representatives from Cisco provide overviews of each solution for securing users, data, and applications across SaaS, PaaS, and IaaS environments.
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Cisco Connect Montreal provided information on Cisco's Webex Hybrid Services which allow for integration between on-premises and cloud collaboration solutions. The key services discussed included Hybrid Directory Service for user synchronization, Hybrid Calendar Service for calendaring integration, Hybrid Call Service for calling capabilities, Hybrid Message Service for messaging interoperability, and the new Cisco Webex Edge service for enhanced audio, video mesh, and media experiences.
Integration cisco et microsoft connect montreal 2018Cisco Canada
The document discusses Cisco and Microsoft integrations for collaboration. It describes major areas of integration including calling, messaging, meetings, email/calendar, content management, and instant messaging. It provides details on Cisco and Microsoft integrations for meetings, with examples of joining internal and external participants. The document also discusses Cisco Spark and Webex capabilities for open collaboration across organizations and platforms.
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
This document summarizes a presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG Development Kit (YDK) SDK, and telemetry. It defines key concepts like model-driven manageability, native and open data models, protocol operations, and the benefits of the YDK for simplifying application development through model-driven abstractions. Example code demonstrates basic YDK usage and a potential peering configuration use case is outlined. Resources for further information are also provided.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Robert Barton from Cisco presented on Cisco Kinetic, an IoT analytics platform. Cisco Kinetic consists of three modules: the Gateway Management Module for onboarding and managing IoT gateways at scale, the Edge and Fog Processing Module for analyzing IoT data in real-time at the edge, and the Data Control Module for securely routing IoT data between edge, fog, and cloud according to data policies. Cisco Kinetic aims to enable end-to-end IoT analytics across the entire network from device to cloud.
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Hank Preston, a Cisco engineer, gave a presentation on DevNet and how it is helping developers. He discussed how DevNet has grown significantly, now with over 100,000 members and 500,000 learning labs completed. DevNet provides resources like APIs, sandboxes, and training to help developers build applications and automate networks. Preston emphasized that networks are becoming more programmable and automated through DevNet tools and platforms.
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
The document discusses Cisco's DNA Assurance solution. It provides an agenda that covers business requirements, context, learning, user requirements, technology requirements, and the various components of DNA Assurance including client assurance, network assurance, application assurance, and machine learning. It discusses challenges around network operations including time spent troubleshooting and replicating issues. It also covers how DNA Assurance uses concepts like context, learning, and design thinking to provide insights and automate remediation.
Cisco Connect Toronto 2018 network-slicingCisco Canada
The document discusses network slicing, which is the partitioning of network resources and functions to run selected applications, services, or connections in isolation from each other for specific business purposes. This allows mobile operators to offer virtual private networks on a common infrastructure through network slicing on an end-to-end basis across access, transport, and core networks. Slicing enables new revenue opportunities through network slices optimized for different vertical industries while simplifying service delivery and management.
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
The document discusses Cisco Meraki's intelligent network and SD-WAN capabilities. It highlights that Meraki has over 14,000 customers using its SD-WAN, it has a renewal rate over 95%, and its newest product is WAN assurance. The presentation provides an overview of Meraki's cloud-managed solutions for wireless, switching, security, and other IT functions. It demonstrates Meraki's network monitoring and troubleshooting tools through examples and a demo of its capabilities.
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
The document discusses automating security tasks through various solutions from Cisco. It introduces the Cisco Advanced Malware Protection (AMP) solution, which uses machine learning to detect known and unknown malware across endpoints, networks, and email. It also introduces Cisco Cognitive Threat Analytics, which analyzes web traffic using machine learning to detect anomalous and malicious activity inside organizations. The document provides examples of how these solutions can automate tasks like hunting for threats, detecting anomalies, and attributing suspicious activity to specific entities. It includes demos of the AMP and Cognitive Intelligence user interfaces.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Performance Budgets for the Real World by Tammy EvertsScyllaDB
Performance budgets have been around for more than ten years. Over those years, we’ve learned a lot about what works, what doesn’t, and what we need to improve. In this session, Tammy revisits old assumptions about performance budgets and offers some new best practices. Topics include:
• Understanding performance budgets vs. performance goals
• Aligning budgets with user experience
• Pros and cons of Core Web Vitals
• How to stay on top of your budgets to fight regressions
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/07/intels-approach-to-operationalizing-ai-in-the-manufacturing-sector-a-presentation-from-intel/
Tara Thimmanaik, AI Systems and Solutions Architect at Intel, presents the “Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” tutorial at the May 2024 Embedded Vision Summit.
AI at the edge is powering a revolution in industrial IoT, from real-time processing and analytics that drive greater efficiency and learning to predictive maintenance. Intel is focused on developing tools and assets to help domain experts operationalize AI-based solutions in their fields of expertise.
In this talk, Thimmanaik explains how Intel’s software platforms simplify labor-intensive data upload, labeling, training, model optimization and retraining tasks. She shows how domain experts can quickly build vision models for a wide range of processes—detecting defective parts on a production line, reducing downtime on the factory floor, automating inventory management and other digitization and automation projects. And she introduces Intel-provided edge computing assets that empower faster localized insights and decisions, improving labor productivity through easy-to-use AI tools that democratize AI.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
Video traffic on the Internet is constantly growing; networked multimedia applications consume a predominant share of the available Internet bandwidth. A major technical breakthrough and enabler in multimedia systems research and of industrial networked multimedia services certainly was the HTTP Adaptive Streaming (HAS) technique. This resulted in the standardization of MPEG Dynamic Adaptive Streaming over HTTP (MPEG-DASH) which, together with HTTP Live Streaming (HLS), is widely used for multimedia delivery in today’s networks. Existing challenges in multimedia systems research deal with the trade-off between (i) the ever-increasing content complexity, (ii) various requirements with respect to time (most importantly, latency), and (iii) quality of experience (QoE). Optimizing towards one aspect usually negatively impacts at least one of the other two aspects if not both. This situation sets the stage for our research work in the ATHENA Christian Doppler (CD) Laboratory (Adaptive Streaming over HTTP and Emerging Networked Multimedia Services; https://athena.itec.aau.at/), jointly funded by public sources and industry. In this talk, we will present selected novel approaches and research results of the first year of the ATHENA CD Lab’s operation. We will highlight HAS-related research on (i) multimedia content provisioning (machine learning for video encoding); (ii) multimedia content delivery (support of edge processing and virtualized network functions for video networking); (iii) multimedia content consumption and end-to-end aspects (player-triggered segment retransmissions to improve video playout quality); and (iv) novel QoE investigations (adaptive point cloud streaming). We will also put the work into the context of international multimedia systems research.
3. Thank you for attending Cisco Connect Toronto 2015, here are a few
housekeeping notes to ensure we all enjoy the session today.
§ Please ensure your cellphones / laptops are set on silent to ensure no
one is disturbed during the session
§ A power bar is available under each desk in case you need to charge
your laptop (Labs only)
§ We will be using the Cisco dCloud Environment for all the Labs. Please
make sure you have internet access using the provide credentials.
House Keeping Notes
4. § Cisco dCloud is a self-service platform that can be accessed via a browser, a high-speed
Internet connection, and a cisco.com account
§ Customers will have direct access to a subset of dCloud demos and labs
§ Restricted content must be brokered by an authorized user (Cisco or Partner) and then shared
with the customers (cisco.com user).
§ Go to dcloud.cisco.com, select the location closest to you, and log in with your cisco.com
credentials
§ Review the getting started videos and try Cisco dCloud today: https://dcloud-cms.cisco.com/help
dCloud
Customers now get full dCloud experience!
5. § Give us your feedback and you could win
a Plantronics headset. Complete the
session survey on your Cisco Connect
Toronto Mobile app at the end of your
session for a chance to win
§ Winners will be announced and posted at
the Information desk and on Twitter at the
end of the day (You must be present to win!)
Complete your session evaluation – May 14th
6. NCS: Network Control System
Hands-on Lab
Jason Yen (Solution Architect – US Sales) – jasyen@cisco.com
Ashok Sadasivan (Solution Architect – US Sales) – ashok2@cisco.com
7. § Introduction to the lab
§ Overview of Network Control System (NCS)
§ Task 1: Installing NCS
§ Task 2: NCS Device Manager
§ Task 3: NCS Service Manager
§ Conclusion
Agenda
9. § You have been assigned a POD consist of two servers
§ Connect to your POC using the Anyconnect credentials in your sheet
§ Remote desktop to the windows server or ssh directly to the NCS server
using Putty directly from your working machine.
Introduction to the NCS Lab: Connecting to POD
NCS Server. Access via SSH
IP address: 198.18.134.4
Username/Password: cisco/cisco
PC Workstation
IP address: 198.18.133.253
Username/Password: Administrator /
C1sco12345
11. § Instruction led, we will be guiding you through a set of steps
§ No step-by-step written guide, we know this is the first contact with NCS
for several of you
§ Network devices are emulated using in-house management plane
emulator: ncs-netsim (also distributed with NCS)
§ PODs will be available for your access until Friday noon
§ By the end of the lab, we will show you how to access additional self-
guided lab examples
§ You can contact the instructors for a “Meet the Engineer” slot if need a
deeper-dive
Introduction to the NCS Lab: Connecting to POD
13. Network Control System (NCS)
Multi-Vendor Service Orchestration
& Network automation
for today’s networks and NFV/SDN
14. § Founded in 2005
§ HQ in Stockholm, Sweden
§ US Office in Silicon Valley
§ Fully part of Cisco since 9 July 2014
§ Software product company
§ Multi-vendor Service Orchestration & Network Automation
§ Service Orchestration for NFV/SDN (and today’s networks !)
§ Centralized Network Control – SDN
§ Yang & Netconf experts
§ 100+ customers world-wide
§ 7 out of 10 world’s largest network equipment vendors
§ Early NFV leadership – multiple deployments
§ Target Markets
§ Service Providers
§ Could providers / Data Centers
§ Network Equipment Vendors
Tail-f At-a-Glance § Disruptive Service Orchestration software
§ Reduces time & efforts to develop &
provision services in a Multi-Vendor
network
§ Early leader in the fast-growing NFV
market
Blue Chip Customers
Tier1 SP
Japan
Tier1 SP
US
15. tw telecom (Level3 now) : L2 & L3 VPN Provisioning
Business Challenge:
Fast delivery of various types of VPNs (L2 and L3) and
Carrier Ethernet 2.0 services for traffic separation in a
dynamic, programmatic way.
Benefits with NCS:
• Replacing home-grown system & manual processes
• Increase agility and lower OPEX
• Provision complex VPNs spanning 40,000 devices
from multiple vendors using network-wide,
transaction-safe features
• Core routers: Juniper MX series
• PEs: Cisco for PE
• CEs: Overture, Adtran, ADVA
• Develop VPN services using CLI templates of Java
• Support for provisioning, updating and removing
VPNs using minimal diffs
• API integration with customer self-service portal,
OSS, and analytics systems
17. NCS Details & Key Features
§ Multi-vendor Service Orchestration & Network Automation for existing & future
(SDN/NFV…) networks
§ Single Pane of Glass for:
§ L1-L7 networking
§ Hardware Devices
§ Virtual Appliances
§ OpenFlow Switches
All the above can be from any vendor : Cisco, Juniper, ALU, Ericsson, Huwaei, Ciena,
Infinera, F5, A10, Brocade, Palo Alto, Avaya, Sonus, Fortinet, etc…
§ NCS provides abstractions based on
§ Standard Data models (YANG RFC 6020) for devices & services
§ Transaction : ensures fail-safe operations & network configuration accuracy
§ Benefits
§ No hard-coded assumptions/info about services or devices
§ Can be used for all types of services and all types of network devices
§ Automation can be based on accurate real-time view of service and network state
Multi-vendor L1-L7 network
18. Service Manager
Multi-Vendor Network
Network
Engineer
EMS/NMS
NETCON
F
REST CLI Web UI SNMP
JAVA/Javascript/
Python
OSS/BSS
NCS
AAA Core
Engine
NETCON
F
SNMP REST CLI WS
Network Element Drivers
Mapping
Logic
Templates
Fast Map
Device ManagerNotification ReceiverAlarm Manager
Openflow Switches
Service
Models
Package
Manager
Script
API
Device
Models
Developer
API
Tail-f NCS Zoom in Architecture
19. NCS for Network Engineers – User Interfaces
Auto-rendered Web UI with powerful
extensibility features
Cisco or Juniper-style CLI for network-
wide configuration changes
20. NETCONF/YANG High-level Properties
• NETCONF
Network management protocol specifically designed to
support service activation and provisioning.
Encrypted, efficient transport
XML content transported over SSH+TCP.
Extensible
XML Namespaces make it possible to add e.g.
new RPC types or new table columns without
breaking existing applications.
Transactional
Configuration changes happen all-or-nothing and
all-at-once which simplifies network
management applications.
Network-wide
Can address multiple network elements in
parallel to implement network-wide transactions.
• YANG
Text based data modeling language designed for use with
NETCONF.
Operator friendly
Easy to mimic existing human operator interfaces, such
as CLI and WebUI. Supports tables inside tables.
Precise
Very precise and specific data definitions. Allowed
values could be “1..99 | 1300..1999 | none”. Explicit
about keys in tables.
Extensible
Define additional keywords in Yang with rigid
syntax, that standard compilers parse correctly.
Additional keywords used to generate code,
documentation, test cases, etc based on model.
Human readable
Non-programmers can read Yang models.
22. § Check the distribution filename:
§ ncs-3.0.darwin.x86_64.installer.bin
§ Check your OS version:
§ Linux distributions
§ OS X
§ Check the CPU archurecture:
§ x86_64 – 64-bit Intel x86 architecture
§ I686 - 32-bit Intel x86 architecture
§ Java version (JDK 1.6 or higher)
System Requirements (Cont.)
23. § Obtain distribution file:
§ ncs-3.0.darwin.x86_64.installer.bin
§ It contains:
§ NSO, examples, documentation
§ NETSIM Network Simulator
§ Run the installation
Installing Cisco NSO
$ sh ncs-3.0.darwin.x86_64.installer.bin ~/ncs/3.0
INFO Using temporary directory /var/… to stage NCS installation bundle
INFO Unpacked ncs-3.0 in /Users/tailf/ncs/3.0
INFO Found and unpacked corresponding DOCUMENTATION_PACKAGE
INFO Found and unpacked corresponding EXAMPLE_PACKAGE
INFO Generating default SSH hostkey (this may take some time)
INFO SSH hostkey generated
INFO Environment set-up generated in /Users/tailf/ncs-3.0/ncsrc
INFO NCS installation script finished
INFO Found and unpacked corresponding NETSIM_PACKAGE
INFO NCS installation complete
25. § Make sure binaries are added to your PATH:
§ Run the ncs-setup script:
§ Creates a database directory ./ncs-cdb
§ Creates a log directory ./log
§ Creates an empty packages directory ./packages
§ Creates a default ncs.conf
Setup an NSO Project Runtime Directory
$ ncs-setup --dest <runtime directory>
$ source ~/NCS/3.0/ncsrc
26. § Start the NSO daemon:
§ Check if the deamon is running:
§ Start the CLI (Cisco XR style):
§ Start the CLI (Juniper style):
Starting Cisco NSO
$ ncs
$ ncs --status
$ ncs_cli –u admin
$ ncs_cli -J –u admin
28. § Make sure your package is in the right place
§ The./packages directory
§ Don’t store anything else in the packages/ directory!
§ Don’t keep “old” packages in the packages directory!
Using Packages
30. § Check if all the required packages are loaded using show packages command
§ Package reload can be forced using request packages reload command
§ Package reload can be forced with starting NSO using —with-package-reload flag
Reloading Packages
admin@ncs> show packages package package-version
PACKAGE
NAME VERSION
----------------------
cisco-iosxr 3.0
discovery 1.0
admin@ncs> request packages reload
result Done
[ok][2014-10-14 14:17:06]
32. § ncs-netsim is a network devices simulation
tool
§ Used to test NSO with simulated devices
§ Uses NED device packages
§ A NED package contains netsim directory
§ Represents device configuration and CLI
§ The same YANG for models are used for
simulated and real devices
Netsim Overview
Netsim simulated
devices (ConfD)
Physical or virtual non-
simulated devices
33. § Below example creates 3 Cisco IOS devices:
§ Simply run netsim inside the project folder
Starting Simulated Devices
$ ncs-netsim start
DEVICE c0 OK STARTED
DEVICE c1 OK STARTED
DEVICE c2 OK STARTED
$ ncs-netsim create-network <NED package> <#N devices>
$ ncs-netsim create-network packages/cisco-ios 4 c
34. § You can run the CLI towards the simulated devices
Access Simulated Devices
$ ncs-netsim cli-i c1
admin connected from 127.0.0.1 using console *
c1> enable
c1# show running-config
class-map m
match mpls experimental topmost 1
match packet length max 255
match packet length min 2
match qos-group 1
!
c1# exit
36. § Is the heart of NSO
§ NSO keeps a master copy of configuration in CDB
§ Network element drivers (NED) supports different protocols:
§ NETCONF
§ SNMP
§ CLI
§ Generic NED (Java code)
Device Manager
Master Copy of
Configurations
Device Manager
Network Element Driver
37. § In Operational mode, the CLI displays operational data stored in CDB (or live data
from the devices)
§ In Configuration mode, the CLI displays network configuration data stored in CDB
NSO CLI
ncs# show devices device
devices device lb0
...
alarm-summary indeterminates 0
alarm-summary criticals 0
alarm-summary majors 0
alarm-summary minors 0
alarm-summary warnings 0
...
devices device www0
...
Operational Mode Configuration Mode
ncs# configure
ncs(config)# show full-configuration
devices device ce0
devices device ce0
address 127.0.0.1
port 10022
ssh host-key ssh-dss
…
39. § Device Configurations in NSO and actual Device Configuration should match
§ After initial device discovery or import, it makes sense to synchronize
configurations from devices
Synchronizing from Device
sync-to
sync-from
check-sync
compare-
config
ncs# devices sync-from
sync-result {
device lb0
result true
}
40. § When a device has been configured out of band
§ Clears up rogue configuration
§ “dry-run” option available to check changes
Synchronizing to Device
ncs# devices device www0 sync-to
result true
sync-to
sync-from
check-sync
compare-
config
Change device
configuration over CLI.
41. § Check if a device has been configured out of band
§ Check if a subset of managed devices has been configured out of band
Check Sync
ncs# devices check-sync
sync-result {
device ce0
result in-sync
}
...
ncs# devices device ce0..3 check-sync
devices device ce0 check-sync
result in-sync
devices device ce1 check-sync
result in-sync
devices device ce2 check-sync
45. § Every transaction has a corresponding rollback file:
Or NSO CLI:
Rollbacks
> file show logs/rollback<TAB>
ncs(config)# file show logs/rollback<TAB>
Run rollbacks
ncs(config)# rollback <TAB>
Possible completions:
0 - 2011-09-23 09:19:43 by admin via cli
1 - 2011-09-23 09:15:38 by admin via cli
2 - 2011-09-23 09:13:35 by admin via cli
3 - 2011-09-23 08:55:31 by admin via cli
$ ls logs/rollback*
$ more logs/rollback0
46. § Rollback 0 is always most recent rollback file
§ Rollback 3 latest transactions:
§ Rollback only changes done in 3rd latest transaction:
§ Rollback dhcp changes on asr0 in the 3 latest transactions:
§
§ Rollback dhcp changes on asr0 in the 3rd latest transaction:
Rollbacks – Examples
ncs(config)# rollback 2
ncs(config)# rollback selective 2
ncs(config)# rollback 2 devices device asr0 config dhcp
ncs(config)# rollback selective 2 devices device asr0 config dhcp
48. § Used to apply snippets of configuration
Templates
Create template:
Apply to new or existing device:
What is the diff?
ncs(config)# show configuration
ncs(config)# commit
ncs(config)# devices device www4 apply-template template-name web-server
ncs(config)# devices template web-server config if:interface eth0 ipv4-address 0.0.0.0
ipv4-mask 255.255.255.255 macaddr 00:00:00:00:00:00
ncs(config)# devices template web-server config ws:wsConfig global KeepAlive On MaxKeepAliveRequests
100
ncs(config)# devices template web-server config sys:host-settings dns server 1 address 127.6.7.8
ncs(config)# show configuration
49. § Variable needs to be provided with a value
Templates with Variables
ncs(config)# devices device-group blue-web apply-template template-name ifspeed
Error: A variable value has not been assigned to: iface
ncs(config)# devices device-group blue-web apply-template template-name ifspeed variable { name iface
value 'eth0' }
ncs(config)# show configuration
devices device www1
config
interface eth0
speed 1000
!
!
!
devices device www2
config
interface eth0
speed 1000
!
!
!
50. § The Device and Service models contain constraints that always must be true
§ You might want to add constraints on run-time
§ Example 1: a certain interface on the device must be ‚Up‘
§ Example 2: Interface needs to have a description
ncs(config)# policy rule mgmt-if
Value for 'expr' (<string>): config/interface[name='m0'][status='Up’]
ncs(config)# foreach /devices/device
ncs(config)# error-message "Management Interface m0 on device {name} must be Up”
admin@ncs% commit
ncs(config)# show configuration policy rule mgmt-if
foreach /devices/device;
expr config/interface[name='m0'][status='Up'];
error-message "Management Interface m0 on device {name} must be Up”;
Policies
53. Basic YANG Statements
YANG Programming Equivalent Description
Leaf Variable Contains a single value of a specific type
Leaf-List Array Contains a list of values of the same type
Container Record Contains a single structure containing zero or more
values or other statements (hierarchy)
List Array of Records Contains a list of zero or more sets of values and other
statements (hierarchy)
Leafref Pointer Contains a link to another statement elsewhere in the file
54. Container
Leaf
Container
Leaf-List
Container
List
Leaf
Container Leaf Leaf Leaf-Ref
Leaf
Container Leaf Leaf Leaf-Ref
Leaf
Container Leaf Leaf Leaf-Ref
§ Leaf: single value of a defined type
§ Leaf-list: multiple values of the same type
§ List: multiple records containing at least one leaf (key) and an arbitrary hierarchy of other statements
§ Container: groups other statements; has no value
§ Leafref: is a reference to another leaf
YANG Model Statements and Hierarchy
55. § Statement characteristics:
§ Name
§ Type (e.g. string, uint32)
§ Constraints:
§ min-elements
§ max-elements
§ range
§ key/unique
§ leafref
§ must
§ when
§ Statement content is enclosed within curly brackets
§ Each sub-statement is terminated by semicolon
YANG Model Statements and Hierarchy Examplecontainer car {
}
container v8_engine {
}
leaf-list cylinder-arrangement {
type string;
max-elements 8;
}
container other-parts {
}
list per-cylinder-parts {
}
leaf piston-diameter {
type uint32;
range "2000..9000";
}
container valves {
leaf number { … }
list position { … }
…
}
57. YANG Supports a Number of Data Types
Name Description
int8/16/32/64 Integer
uint8/16/32/64 Unsigned integer
decimal64 Non-integer
string Unicode string
enumeration Set of alternatives
boolean True or false
bits Boolean array
binary Binary BLOB
leafref Reference
identityref Unique identity
empty No value, void
union Choice of member types
instance-identifier References a data tree node
Built-in Types Derived Types
typedef my-base-int32-type {
type int32 {
range "1..4 | 10..20";
}
}
typedef derived-int32 {
type my-base-int32-type {
range "11..max";
}
}
typedef string255 {
type string {
length "1..255";
}
}
typedef derived-str {
type string255 {
length "11 | 42..max";
pattern "[0-9a-fA-F]*";
}
}
58. Common YANG Data Types (RFC 6991)
Name Description
counter32 non-negative 32-bit integer that monotonically increases
zero-based-counter32 a counter32 that has the defined initial value zero
counter64 non-negative 64-bit integer that monotonically increases
zero-based-counter64 a counter64 that has the defined initial value zero
gauge32 non-negative integer, which may increase or decrease
gauge64 non-negative integer, which may increase or decrease
date-and-time ISO 8601 standard for representation of dates and times
phys-address colon-separated hexadecimal pairs (e.g. 1a:ba:da:ba:d0)
mac-address six colon-separated hexadecimal pairs (e.g. 1a:ba:da:ba:d0:00)
xpath1.0 XPATH 1.0 expression
hex-string colon-separated hexadecimal pairs of arbitrary length
uuid universally unique identifier (RFC 4122)
…
import ietf-yang-types {
prefix yang;
}
IETF YANG Types Using Types
59. Common YANG Data Types (RFC 6991) (Cont.)
Name Description
ip-version IP protocol version: 1=IPv4, 2=IPv6, 0=unknown
dscp Differentiated Services Code Point value: 0 to 63
ipv6-flow-label 32-bit integer in the range from 0 to 1048575
port-number 16-bit integer in the range from 0 to 65535
as-number 32-bit integer representing 2 or 4 octet BGP AS numbers
ip-address IPv4 or IPv6 address
ipv4-address IPv4 address (e.g. 10.1.2.3)
ipv6-address IPv6 address (e.g. fd85:b310:6513:194b::1)
ip-prefix IPv4 or IPv6 prefix
ipv4-prefix IPv4 prefix (e.g. 10.1.2.0/24)
ipv6-prefix IPv6 prefix (e.g. fd85:b310:6513:194b::/64)
domain-name DNS domain name
host IP address or DNS domain name
uri uniform resource identifier
…
import ietf-inet-types {
prefix inet;
}
Using TypesIETF INET Types
60. YANG Types Example
// percentage type
typedef percentage-type {
type uint8 {
range "1..100";
}
}
// Weekday type
typedef weekday-type {
type enumeration {
enum Mon;
enum Tue;
enum Wed;
enum Thu;
enum Fri;
enum Sat;
enum Sun;
}
}
// Hour & minute & optional second type
typedef hhmm-type {
type string {
pattern '([0-1]?[0-9]|2[0-4]):' +
'([0-5][0-9])(:[0-5][0-9])?';
}
}
// Route Distinguisher AS:NUM or IP:NUM
typedef rd-type {
type string {
pattern '((d+)((.d+){3})?):d+';
}
}
// DSCP type
typedef dscp-type;
type union;
type uint8 { range "0..63"; }
type enumeration {
enum af11;
enum af12;
enum af13;
enum af21;
enum af22;
enum af23;
enum af31;
enum af32;
enum af33;
enum af41;
enum af42;
enum af43;
enum cs1;
enum cs2;
enum cs3;
enum cs4;
enum cs5;
enum cs6;
enum cs7;
enum default;
enum dscp;
enum ef;
enum precedence;
}
}
}
63. Data model:
§ YANG
§ XPath to reference data in the hierarchy:
§ Graphic visualization of hierarchy and data type:
Data Model and Data Visualization
Sample data:
§ XML:
§ Table:
K Key Leaf
Leaf T Typedef
G Grouping
L List
C Container R Leafref
L Leaf-list
192.0.2.213 16772
198.51.100.22 19234
203.0.113.89 22315
/ loopback-ipv4
/ loopback-ipv4 / loopback
/ loopback-ipv4 / ip-address
These methods are used throughout the course
to help with understanding of YANG data
modeling.
<loopback-ipv4>
<loopback>1</loopback>
<ip-address>10.1.1.1</loopback>
</loopback-ipv4>
<loopback-ipv4>
<loopback>2</loopback>
<ip-address>10.2.2.2</loopback>
</loopback-ipv4>
!
64. § Single value using a built-in or derived data type
§ Zero or one instance
Leaf
loopback
1
leaf loopback {
type int32 {
range "0..2147483647";
}
}
<loopback>1</loopback>
YANG (data model) XML (data)
XPath:
/ loopback
65. Leaf Attributes
Attribute Description
config
Whether this leaf is a configurable value ("true") or operational
value ("false"). Inherited from parent container if not specified
default Specifies default value for this leaf. Implies that leaf is optional
mandatory Whether the leaf is mandatory ("true") or optional ("false")
must XPath constraint that will be enforced for this leaf
type The data type (and range etc) of this leaf
when Conditional leaf, only present if XPath expression is true
description Human readable definition and help text for this leaf
reference Human readable reference to some other element or spec
units Human readable unit specification (e.g. Hz, MB/s, ℉)
status Whether this leaf is "current", "deprecated" or "obsolete"
66. § Used to group one or more other statements
§ Has no data type by itself
§ May have an implicit meaning
Container
1 10.1.1.1
container loopback-ipv4 {
leaf loopback {
type int32 {
range "0..2147483647";
}
}
leaf ip-address {
type inet:ipv4-address
}
}
<loopback-ipv4>
<loopback>1</loopback>
<ip-address>10.1.1.1</loopback>
</loopback-ipv4>
C loopback-ipv4
ip-addressloopback
XPath:
/ loopback-ipv4
/ loopback-ipv4 / loopback
/ loopback-ipv4 / ip-address
YANG (data model) XML (data)
67. § Contains one or more substatements
§ Requires one unique identifier (key)
§ Zero or more instances
List
1 10.1.1.1
2 10.2.2.2
list loopback-ipv4 {!
key loopback;!
unique ip-address;!
leaf loopback {!
type int32 {!
range "0..2147483647";!
}!
}!
leaf ip-address {!
type inet:ipv4-address!
}!
}!
<loopback-ipv4>
<loopback>1</loopback>
<ip-address>10.1.1.1</loopback>
</loopback-ipv4>
<loopback-ipv4>
<loopback>2</loopback>
<ip-address>10.2.2.2</loopback>
</loopback-ipv4>
YANG (data model) XML (data)
L loopback-ipv4
ip-addressK loopback
XPath:
/ loopback-ipv4
/ loopback-ipv4 / loopback
/ loopback-ipv4 / ip-address
69. 1. Create a package skeleton
2. Use the Cisco NSO CLI to
configure a sample service
3. Create the service template
4. Create the service model in
YANG
5. Compile and deploy the package
Creating a Service Package
Create a Service Skeleton
Configure Sample Service
using Cisco NSO CLI
Create Service Template
(XML)
Create Service Model
(YANG)
Service Model
(YANG)
Service Template
(XML)
Create Service Model
(YANG)
Service Template
Skeleton File (XML)
Service Model
Skeleton File (YANG)
1.
71. 1. Create a package skeleton
2. Use the Cisco NSO CLI to
configure a sample service
3. Create the service template
4. Create the service model in YANG
5. Compile and deploy the package
Creating a Service Package
Create a Service Skeleton
Configure Sample Service
using Cisco NSO CLI
Create Service Template
(XML)
Create Service Model
(YANG)
Service Model
(YANG)
Service Template
(XML)
Create Service Model
(YANG)
Service Template
Skeleton File (XML)
Service Model
Skeleton File (YANG)
2.
72. § devices device dell0 config force10:interface Vlan 10 tagged
GigabitEthernet0/11
§ devices device catalyst1 config ios:interface GigabitEthernet 0/23
switchport mode trunk switchport trunk allowed vlan 10
§ Commit dry-run outformat native
§ Take this as an input to get the XML template
Configure the Service via NCS
73. 1. Create a package skeleton
2. Use the Cisco NSO CLI to
configure a sample service
3. Create the service template
4. Create the service model in YANG
5. Compile and deploy the package
Creating a Service Package
Create a Service Skeleton
Create Service Template
(XML)
Create Service Model
(YANG)
Service Model
(YANG)
Service
Template (XML)
Create Service Model
(YANG)
Service Template
Skeleton File (XML)
Service Model
Skeleton File (YANG)
Configure Sample Service
using Cisco NSO CLI
3.
74. § show full-configuration devices device dell0 config force10:interface
Vlan | display xml
§ show full-configuration devices device catalyst1 config ios:interface
GigabitEthernet 0/23 | display xml
§ Same Output like the commit dry run in the step before!
XML Template
75. 1. Create a package skeleton
2. Use the Cisco NSO CLI to configure
a sample service
3. Create the service template
4. Create the service model in YANG
5. Compile and deploy the package
Creating a Service Package
Create a Service Skeleton
Create Service Template
(XML)
Create Service Model
(YANG)
Service Model
(YANG)
Service Template
(XML)
Create Service Model
(YANG)
Service Template
Skeleton File (XML)
Service Model
Skeleton File (YANG)
Configure Sample Service
using Cisco NSO CLI
4.
76. list endpoint {
key device;
leaf device {
type leafref {
path "/ncs:devices/ncs:device/ncs:name";
}
}
leaf interface {
type string;
}
}
leaf vlan {
type uint16;
}
Create the Yang Model
77. 1. Create a package skeleton
2. Use the Cisco NSO CLI to configure
a sample service
3. Create the service template
4. Create the service model in YANG
5. Compile and deploy the package
Creating a Service Package
Create a Service Skeleton
Create Service Template
(XML)
Create Service Model
(YANG)
Service Model
(YANG)
Service Template
(XML)
Compile & Deploy the
Service
Service Template
Skeleton File (XML)
Service Model
Skeleton File (YANG)
Configure Sample Service
using Cisco NSO CLI
5.
78. ncs_cli -C -u admin
packages reload
services trunk myservice endpoint catalyst0 interface 0/2 endpoint dell0
interface GigabitEthernet0/12 vlan 12
top
show full-configuration services trunk
commit dry-run outformat native
Compile and reload the package
79. § Service design goal is simplicity for the operator :
§ Minimum set of parameters for the service (optimization)
§ Strict enforcement of parameters to minimize human error (standardization)
§ Thorough testing of service configuration and all possible service options to
ensure robustness of the solution
§ NSO and YANG provide modularity and flexibility for service designers
Summary
81. § NCS is very simple to install and start operating
§ It is very simple to personalize NCS thanks to the use of standard languages such as
YANG and XML templates, plus its network emulator ncs-netsim…
§ NCS can centrally manage devices using all its northbound interfaces using its
device manager
§ NCS can automate service provisioning thanks to its service manager
§ The PODs will be available until Friday noon for your access
§ You can access more self-guided labs at examples.ncs folder in your installation
Conclusion from NCS Lab
82. § Demos in the Cisco Campus
§ Walk-in Self-Paced Labs
§ Table Topics
§ Meet the Engineer 1:1 meetings
Continue Your Education