IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen
|
|
|
- Sharleen Higgins
- 10 years ago
- Views:
Transcription
1 IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen 1
2 Ga between APP and Network APP wants A connection between two sites APP doesn t want Configurations of each device between two sites A service flow with SLA Flow entries in each device Tunnel, ACL, PBR configurations of different devices A customer network service chain 2
3 NEMO language for intent based network modeling NEMO APP Object Model Behavior Model NEMO Engine Node Connection Flow Oeration SDN Controller 15 simle statement for hundreds of comlex APIs Network alication/user use NEMO Language to rogramming their service NEMO Language is an Intent oriented network DSL (domain secific language), which is a language style network oen interface. Oerator/End-user or 3rd arty can use it to rogram network resource and behavior in their service alications. NEMO Engine is a network middleware, which translate high level service intent to real network instruction base on MDA(Model Driven Architecture). NEMO is now an OenDaylight roject coming with Beryllium release. htts://wiki.oendaylight.org/view/nemo:main 3
4 Use case : Virtual Private Cloud Oerator rovide virtual rivate cloud service for enterrises. Need to allocate two zones in the VPC for security issue. DMZ rovide htt/ /video services for access from internet. Interior rovide comute and storage resources for existing enterrise site. Provide BoD caability on the WAN connection. E.g, increase bandwidth when cloud bursting or backu internet BoD DMZ Enterrise site WAN interior Virtual Private Cloud 4
5 Use case: End to End Carrier Network The enterrise outsources their CPE business to the service rovider. The Branch site alies chained services in the vcpe before accessing WAN. The enterrise requests BoD in WAN between the branch and the headquarter for different bandwidth requirements, e.g., day/work and night/backu. The NEMO rogrammed logic runs on the Suer controller and instruct domain controller to accomlish network service rovisioning and olicy alying. Suer controller Domain controller Acc Core Domain controller Branch vcpe WAN Headquarter FW Cache BoD 5
6 An Examle: Bandwidth on Demand (B2B) DOCSIS There is a virtual link between the branch and headquarter offices. o The bandwidth of the vlink can be adjusted on demand o The adjustment can be triggered by "conditions" meet, e.g. The bandwidth will be adjusted when the timing meets. NEMO Scrit: Node branch; Node HQ; Connection tunnel Tye P2P Endnodes branch, HQ; Branch WAN Headquarter Condition: from 8am to 6m, Bandwidth: 10G Condition: from 6m to 8am, Bandwidth: 1G Constraint day AlyTo tunnel Condition time>8am & time <6m Oeration set:bandwidth=10g; Constraint night AlyTo tunnel Condition(time>0am & time<8am) (time>6m & time<0am) Oeration set:bandwidth=1g; 6
7 NEMO Editor in Eclise Program a Eclise lug-in that highlights the keywords Integrate with the IBNEMO roject Parse the NEMO language and comose the NEMO rest API. Call rest client/lib to send the request. Reference: Hackathon imlementation result: htts://github.com/aaguti-work/nemo-ietf 7
8 What could be the role of intent-based networking in situation where the system's goal "emerges" from the agents interactions? IBNEMO can dynamically udate the network behaviour. So if IBNEMO a gets alert that change is needed, it can do so Tianran Zhou can demo (see him. Possibly also demo at Bits&Bytes) Question: should IBNEMO also monitor network? Should that be art of IBNEMO? Can it rely on other network monitoring tools that trigger IBNEMO activity? Are there researchers that want to exeriment with that? Do we have ideas on how to do this? 8
9 What we are looking for: do you have exerience in oerating a network? How would you imlement the use cases? Feedback on the NEMO language definition, roosals for enhancements the OenDaylight roject? Hel us debug the current OenDaylight NEMO Engine rogramming lugins for Eclise? Program the interface(s) to drive the OenDaylight imlementation Integrate them with the NEMO Editor You know Xtext? Hel us to imrove the NEMO Editor lugin 9
10 Thank You 10
Note Well. All IETF Contributions are subject to the rules of RFC 5378 and RFC 3979 (updated by RFC 4879).
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made within the context of an IETF activity is considered
Intent NBI for Software Defined Networking
Intent NBI for Software Defined Networking 1 SDN NBI Challenges According to the architecture definition in Open Networking Foundation (ONF), a Software Defined Network (SDN) includes three vertically
SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. www.openflow.org. SDN to OpenFlow. OpenFlow a valid technology!
SDN/OenFlow Performance U!, Winterschool, Zurich www.oenflow.org Kurt Baumann [email protected] Zurich, 08. March 2013 Outline SDN to OenFlow OenFlow a valid technology! Basic Concet How it works
Sage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
Concurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
Sage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
Sage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist
I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence
Extending your Qt Android application using JNI
Extending your Qt Android alication using JNI Dev Days, 2014 Presented by BogDan Vatra Material based on Qt 5.3, created on November 13, 2014 Extending your alication using JNI Extending your alication
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES Brian Levy CTO SERVICE PROVIDER SECTOR EMEA JUNIPER NETWORKS CIO DILEMA IT viewed as cost center
ShareFile Enterprise: Security Whitepaper
ShareFile Enterrise: 2 Table of contents Introduction 4 SaaS alication tier 5 ShareFiles servers: Web, API, and database overview 5 SaaS alication tier security 6 Encrytion 6 Hash-based message authentication
Storage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide
Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view
Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service
Agile VPN for Carrier/SP Network ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Introduction In order to meet strong service demand on their network and respond to the new competition (who
NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity
NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 [email protected] Yutaka Takeda Panasonic Communications San Diego,
Secure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Cloud, SDN and the Evolution of
Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
Software Model Checking: Theory and Practice
Software Model Checking: Theory and Practice Lecture: Secification Checking - Temoral Logic Coyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are coyrighted
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
WhiteWave's Integrated Managed File Transfer (MFT)
WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12
LuaFlow, an open source Openflow Controller
Worksho 2012 LuaFlow, an oen source Oenflow Controller Rahael Amorim [email protected] [email protected] Renato Aguiar [email protected] Talk Overview What is OenFlow? How OenFlow Works
Migration to Object Oriented Platforms: A State Transformation Approach
Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,
DevOps and Container Security
DevOs and Container Security Mike Bartock IT Secialist NIST Paul Cichonski Cloud Architect Lanco John Morello Chief Technology Officer Twistlock Raghu Yeluri Princial Engineer Intel Certain commercial
SDN Practices in China Mobile. Lu Huang [email protected]
SDN Practices in China Mobile Lu Huang [email protected] SDN : Bandwidth improvement, Virtualization, Service-chaining 1.Average utility is lower than 50%, but partial links are congested 2.Tenant
with VMware vsphere 5.1 (ESXi)
Scaling XenDeskto 7 to 5,000 users with VMware vshere 5.1 (ESXi) Citrix Solutions Lab Validated Solutions Design Guide 2 Table of contents Contents Citrix XenDeskto 7 6 Executive Summary 7 Project overview
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari
SMALL BUSINESS GRANTS PROGRAM GUIDELINES
SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
Electronic Commerce Research and Applications
Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra
Drinking water systems are vulnerable to
34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental
Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State
Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation
Zero Touch Network- as- a- Service: Agile, Assured and Orchestrated with NFV
Zero Touch Network- as- a- Service: Agile, Assured and Orchestrated with NFV 1 Catalyst Demo ObjecDves 1. Address market demand for on- demand, assured, cloud- centric network services 2. Bridge gap(s)
Prof. Dr.- Ing. Firoz Kaderali Dipl.-Ing. Alex Essoh
Intrusion Detection - Introduction and Outline Prof. Dr.- Ing. Firoz Kaderali Dil.-Ing. Alex Essoh Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Major Intrusion Detection
Cloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete
COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)
NEC contribution to OpenDaylight: Virtual Tenant Network (VTN) June. 2013 NEC Page 1 Agenda OpenDaylight Virtual Tenant Network - VTN Model Live Demo VTN Implementation Page 2 OpenDaylight Virtual Tenant
Visualization, Management, and Control for Cisco IWAN
Visualization, Management, and Control for Cisco IWAN Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether that connection is Multiprotocol Label
Rummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
C-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
New Virtual Application Networks Innovations Advance Software-defined Network Leadership
New Virtual Application Networks Innovations Advance Software-defined Network Leadership Simplifying, Scaling and Automating the Network Gartner Hype Cycle 10 Year Cycle 2008 2011 2012 2 Source: Gartner
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
Parlay VoXip Voice over IP Gateway ISDN /VoIP (SIP) conversion + advanced call routing features. Unique Voice over IP Gateway / ISDN to SIP converter
arlay Voice over I Gateway /VoI (SI) conversion + advanced call routing features arlay Unique Voice over I Gateway / to SI converter Migration to VoI, using equipment without modification Call routing
A Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents
Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Luís Paulo Reis, Nuno Lau 2 and Eugénio Costa Oliveira LIACC Artificial Intelligence and Comuter Science Lab., University
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
IMS INTEGRATED MANAGED SERVICES MONITORING, MAINTENANCE, MANAGEMENT. Epoch Universal
MONITORING, MAINTENANCE, MANAGEMENT HQ: 1 Technology Dr. C511, Irvine, CA 92618 NC: 6331 Carmel Rd. Bldg B CharloHe, NC 28226 SC: 1320 Main St Suite 300 Columbia, SC 29201 Support: [email protected]
Free Software Development. 2. Chemical Database Management
Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN
How to Build Successful DSL s. Jos Warmer Leendert Versluijs
How to Build Successful DSL s Jos Warmer Leendert Versluijs Jos Warmer Expert in Model Driven Development One of the authors of the UML standard Author of books Praktisch UML MDA Explained Object Constraint
Why FOUNDATION Fieldbus?
Product Bulletin PB 244-R3 Fieldbus Cables Fieldbus Tye A cables rovide installation flexibility in many different environments, including outdoors and where multile or extended cable runs are required.
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.
SDN FOR IP/OPTICAL TRANSPORT NETWORKS
SDN FOR IP/OPTICAL TRANSPORT NETWORKS Tony Kourlas IP Routing and Transport Group, Alcatel-Lucent April 2014 THE EVOLUTION OF IP & OPTICAL NETWORKS Cloud-optimized IP routing & transport IP routing networks
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
White Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
Title: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, [email protected] Phone : (54) 231-7688,
Virtual CPE and Software Defined Networking
Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative
Strategies for Capturing
Strategies for Capturing Next Wave of Telco Opportunities Chia Tan [email protected] Director of SP Engineering Asia Pacific Japan, Cisco Systems AGENDA 1. ICT s 3 rd Platform creates a Hyper-disruptive
Application Defined E2E Security for Network Slices. Linda Dunbar ([email protected]) Diego Lopez (diego.r.lopez@telefonica.
Application Defined E2E Security for Network Slices Linda Dunbar ([email protected]) Diego Lopez ([email protected] ) Into the Inter-connected World Internet Mobile Internet Internet of
Dynamic Service Chaining for NFV/SDN
Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy
Business Development Services and Small Business Growth in Bangladesh
Universal Journal of Industrial and Business Management 1(2): 54-61, 2013 DOI: 10.13189/ujibm.2013.010206 htt://www.hrub.org Business Develoment Services and Small Business Growth in Bangladesh Md. Serazul
Preparing your Business for Virtualization. Mirko Voltolini VP Network Technology [email protected]
Preparing your Business for Virtualization Mirko Voltolini VP Network Technology [email protected] SDN and NFV are transforming networks The virtualisation of IT has transformed the consumption
Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA
Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Technology shifts center on applications Advanced threats APIs Internet of things Mobility SDDC/Cloud
VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
Cisco NFV Solution for the Cisco Evolved Services Platform
Cisco NFV Solution for the Cisco Evolved Services Platform Cisco Knowledge Network Presentation Vijay Venugopal Senior Manager, Product Marketing, Cisco Cloud and Virtualization Group September 2014 Agenda
Masters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
NFV and SDN Answer or Question?
NFV and SDN Answer or Question? Barry Graham Senior Program Director - Agile 2015 TM Forum 1 TM Forum: A Brief Introduction TM Forum is a non-profit global industry association which brings together the
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera [email protected]. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera [email protected] VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
A highly-underactuated robotic hand with force and joint angle sensors
A highly-underactuated robotic hand with force and joint angle sensors Long Wang*, Joseh DelPreto**, Sam Bhattacharyya*, Jonathan Weisz***, Peter K. Allen*** *Mechanical Engineering, **Electrical Engineering,
Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011
Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
ONF Organization 2015/6/9. Outline. Outline
2015 Sring:Future Internet Class 2015.6.9 for Future Internet: art 2 Jun Bi Tsinghua University Outline The Driving Force for Transforming the Network rchitecture Considering the "Genes" of the Success
Microsoft Exchange 2013 Citrix NetScaler Deployment Guide
Microsoft Exchange 2013 Citrix NetScaler 2 Table of contents What s new in Microsoft Exchange 2013 3 Exchange 2013 Architecture 3 Load Balancing Exchange 2013 5 Lync and SharePoint integration 6 Mobility
day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows Azure Storage... 3 day 2 5
Developers Workshop presented by MVP & v-tsp Damir Dobrić Chief Architect and Managing Developer daenet GmbH, Frankfurt / Main day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015
Transport SDN Toolkit: Framework and APIs John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit Providing carriers with essential tools in the Transport SDN toolkit How to apply SDN to a
Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang [email protected]. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang [email protected] Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
CUBIC AND QUARTIC FORMULAS. James T. Smith San Francisco State University
CUBIC AND QUARTIC FORMULAS James T. Smith San Francisco State University Quadratic formula You ve met the uadratic formula in algebra courses: the solution of the uadratic euation ax + bx + c = 0 with
Reducing Outages and Degradations. With Proactive Application Performance Monitoring. Ted Wilson VP Business Development SL Corporation ted@sl.
Reducing Outages and Degradations With Proactive Application Performance Monitoring Ted Wilson VP Business Development SL Corporation [email protected] Agenda Application Performance Monitoring What s All the
Transport SDN Directions. March 20, 2013 Lyndon Ong Ciena [email protected]
Transport SDN Directions March 20, 2013 Lyndon Ong Ciena [email protected] SDN Potential Benefits of Transport SDN SDN Benefit Transport Network Impact Network Utilization Application-aware optimization
Design of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
Using LISP for Secure Hybrid Cloud Extension
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF 89, London, UK A New Use Case for LISP It s a use
