Computer Networks
Youtube search... ...Google search
- Telecommunications ... Computer Networks ... 5G ... Satellite Communications ... Quantum Communications ... Communication Agents ... Smart Cities ... Digital Twin ... Internet of Things (IoT)
- Risk, Compliance and Regulation ... Ethics ... Privacy ... Law ... AI Governance ... AI Verification and Validation
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Zero Trust
- Analytics ... Visualization ... Graphical Tools ... Diagrams & Business Analysis ... Requirements ... Loop ... Bayes ... Network Pattern
- Development ... Notebooks ... AI Pair Programming ... Codeless ... Hugging Face ... AIOps/MLOps ... AIaaS/MLaaS
- Virtualization - Dynamic Spectrum Sharing (DSS)
- Self-Organizing
- Containers; Docker, Kubernetes & Microservices
- Excel ... Documents ... Database; Vector & Relational ... Graph ... LlamaIndex
- Policy ... Policy vs Plan ... Constitutional AI ... Trust Region Policy Optimization (TRPO) ... Policy Gradient (PG) ... Proximal Policy Optimization (PPO)
- Architectures for AI ... Generative AI Stack ... Enterprise Architecture (EA) ... Enterprise Portfolio Management (EPM) ... Architecture and Interior Design
Transport Agnostic - capability is achieved by splitting the control/management ‘planes’ from the data ‘plane’, using software defined networking (SDN) mechanisms to dynamically redirect traffic to the best transport, as opposed to having control/management/data on the same ‘plane’. The users/edge devices delegate (are agnostic) the tasks of assigning transport addresses/routes/protocols/mechanisms are used. From a security point of view, users/edge never access the control/management ‘planes’!
Contents
Cognitive Network (CN)
In communication networks, cognitive network is a new type of data network that makes use of cutting edge technology from several research areas to solve some problems current networks are faced with. Cognitive network is different from cognitive radio as it covers all the layers of the OSI model. Cognitive Network | Wikipedia
Intent-Based Networking (IBN)
- Intelligent Automation
- Intelligent Assurance
- Understanding what's on the Network
- Detecting Threats in encrypted traffic
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) is a networking technology that enhances the efficiency and speed of data transmission across networks by using labels to route packets instead of traditional IP addresses. This technology is particularly useful in large networks where the traditional routing methods can become complex and inefficient. MPLS operates independently of the underlying IP addressing and routing protocols, allowing for more flexible and efficient routing of traffic.
MPLS works by assigning labels to packets, which are then used to determine the path the packet should take through the network. This label-switched path (LSP) is determined by the first device (usually a router) that processes the packet, which then forwards the packet along the LSP to its destination. This process is much faster and more efficient than traditional routing methods, which require each device in the path to perform a routing lookup for each packet.
MPLS supports a variety of protocols and technologies, including IP, ATM, and Frame Relay, and it interfaces with existing routing protocols such as RSVP and OSPF. It also provides mechanisms for traffic engineering, quality of service (QoS), and the creation of virtual private networks (VPNs) both at Layer 2 and Layer 3.
In addition to improving network performance, MPLS also offers features like traffic engineering, which allows for the optimization of network paths based on various constraints such as bandwidth availability, and the creation of VPNs that can transport different types of traffic over the same network infrastructure.
MPLS is widely used in enterprise and service provider networks to deliver advanced, value-added services over a single infrastructure. It can be integrated seamlessly with existing infrastructure and supports a wide range of platforms, making it a versatile solution for both service providers and enterprises.
For example, in a service provider network, MPLS can be used to aggregate subscribers with differing access links on an MPLS edge without changing their current environments. This allows for the delivery of a wide variety of services over a single infrastructure, including Layer 3 VPNs, Layer 2 VPNs, Traffic Engineering, QoS, GMPLS, and IPv6.
In summary, MPLS is a powerful technology that enhances network efficiency and performance by using labels to route packets, supporting a wide range of protocols and technologies, and offering advanced features like traffic engineering and VPN creation.
Software-Defined Enterprise (SDE) / Software-Defined Networking (SDN) / Software-defined Wide Area Network (SD-WAN)
Youtube search... ...Google search
- Artificial Intelligence Enabled Software Defined Networking: A Comprehensive Overview | Majd Latah and Levent Toker
- SDN, AI, and DevOps | Russ White - Rule11 Reader
- Defense Information Systems Agency (DISA)
- 3 Use Cases for Machine Learning Within SD-WAN | Lanner
- SDN, AI and DevOps | Russ White - Juniper
Virtual network architecture that allows enterprises to leverage any combination of transport services to securely connect users to applications. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. This concept is similar to how software-defined networking implements virtualization technology to improve data center management and operation. Wikipedia
- WAN Optimization
- Fault Prediction
- Network Management
- Security
|
|
|
|
|
|
|
|
Explained
|
|
Network Functions Virtualization (NFV)
Youtube search... ...Google search
NFV or Virtual Network Function (VNF) allows network operators to manage and expand their network capabilities on demand using virtual, software based applications where physical boxes once stood in the network architecture. This makes it easier to load-balance, scale up and down, and move functions across distributed hardware resources. With continual updates, operators can keep things running on the latest software without interruption to their customers. On the road to NFV deployment | Ericsson
For example, a virtual session border controller could be deployed to protect a network without the typical cost and complexity of obtaining and installing physical network protection units. Other examples of NFV include virtualized load balancers, firewalls, intrusion detection devices and WAN accelerators. ...The NFV framework consists of three main components:
- Virtualized network functions (VNFs) are software implementations of network functions that can be deployed on a network functions virtualization infrastructure (NFVI).
- Network functions virtualization infrastructure (NFVI) is the totality of all hardware and software components that build the environment where NFVs are deployed. The NFV infrastructure can span several locations. The network providing connectivity between these locations is considered as part of the NFV infrastructure.
- Network functions virtualization management and orchestration architectural framework (NFV-MANO Architectural Framework) is the collection of all functional blocks, data repositories used by these blocks, and reference points and interfaces through which these functional blocks exchange information for the purpose of managing and orchestrating NFVI and VNFs.
The building block for both the NFVI and the NFV-MANO is the NFV platform. In the NFVI role, it consists of both virtual and physical processing and storage resources, and virtualization software. Network function virtualization | Wikipedia
|
|
|
|