Difference between revisions of "Computer Networks"
m |
m |
||
| Line 17: | Line 17: | ||
[https://www.google.com/search?q=-neural+cognitive+network+intent+ai+computer+SDN+SD-WAN+Functions+Virtualization+NFV+artificial+intelligence+deep+machine+learning ...Google search] | [https://www.google.com/search?q=-neural+cognitive+network+intent+ai+computer+SDN+SD-WAN+Functions+Virtualization+NFV+artificial+intelligence+deep+machine+learning ...Google search] | ||
| − | * [[Telecommunications]] ... [[Computer Networks]] ... [[Telecommunications#5G|5G]] ... [[Satellite#Satellite Communications|Satellite Communications]] ... [[Quantum | + | * [[Telecommunications]] ... [[Computer Networks]] ... [[Telecommunications#5G|5G]] ... [[Satellite#Satellite Communications|Satellite Communications]] ... [[Quantum Communications]] ... [[Agents#Communication | Agents]] ... [[AI Generated Broadcast Content|AI Broadcast; Radio, Stream, TV]] |
* [[Risk, Compliance and Regulation]] ... [[Ethics]] ... [[Privacy]] ... [[Law]] ... [[AI Governance]] ... [[AI Verification and Validation]] | * [[Risk, Compliance and Regulation]] ... [[Ethics]] ... [[Privacy]] ... [[Law]] ... [[AI Governance]] ... [[AI Verification and Validation]] | ||
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]] | * [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]] | ||
Revision as of 14:16, 22 August 2023
Youtube search... ...Google search
- Telecommunications ... Computer Networks ... 5G ... Satellite Communications ... Quantum Communications ... Agents ... AI Broadcast; Radio, Stream, TV
- Risk, Compliance and Regulation ... Ethics ... Privacy ... Law ... AI Governance ... AI Verification and Validation
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Zero Trust
- Analytics ... Visualization ... Graphical Tools ... Diagrams & Business Analysis ... Requirements ... Loop ... Bayes ... Network Pattern
- Development ... Notebooks ... AI Pair Programming ... Codeless, Generators, Drag n' Drop ... AIOps/MLOps ... AIaaS/MLaaS
- Virtualization - Dynamic Spectrum Sharing (DSS)
- Self-Organizing
- Containers; Docker, Kubernetes & Microservices
- Excel ... Documents ... Database; Vector & Relational ... Graph ... LlamaIndex
- Policy ... Policy vs Plan ... Constitutional AI ... Trust Region Policy Optimization (TRPO) ... Policy Gradient (PG) ... Proximal Policy Optimization (PPO)
Transport Agnostic - capability is achieved by splitting the control/management ‘planes’ from the data ‘plane’, using software defined networking (SDN) mechanisms to dynamically redirect traffic to the best transport, as opposed to having control/management/data on the same ‘plane’. The users/edge devices delegate (are agnostic) the tasks of assigning transport addresses/routes/protocols/mechanisms are used. From a security point of view, users/edge never access the control/management ‘planes’!
Contents
Cognitive Network (CN)
In communication networks, cognitive network is a new type of data network that makes use of cutting edge technology from several research areas to solve some problems current networks are faced with. Cognitive network is different from cognitive radio as it covers all the layers of the OSI model. Cognitive Network | Wikipedia
Intent-Based Networking (IBN)
- Intelligent Automation
- Intelligent Assurance
- Understanding what's on the Network
- Detecting Threats in encrypted traffic
Software-Defined Enterprise (SDE) / Software-Defined Networking (SDN) / Software-defined Wide Area Network (SD-WAN)
Youtube search... ...Google search
- Artificial Intelligence Enabled Software Defined Networking: A Comprehensive Overview | Majd Latah and Levent Toker
- SDN, AI, and DevOps | Russ White - Rule11 Reader
- Defense Information Systems Agency (DISA)
- 3 Use Cases for Machine Learning Within SD-WAN | Lanner
- SDN, AI and DevOps | Russ White - Juniper
Virtual network architecture that allows enterprises to leverage any combination of transport services to securely connect users to applications. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. This concept is similar to how software-defined networking implements virtualization technology to improve data center management and operation. Wikipedia
- WAN Optimization
- Fault Prediction
- Network Management
- Security
|
|
|
|
|
|
|
|
Explained
|
|
Network Functions Virtualization (NFV)
Youtube search... ...Google search
NFV or Virtual Network Function (VNF) allows network operators to manage and expand their network capabilities on demand using virtual, software based applications where physical boxes once stood in the network architecture. This makes it easier to load-balance, scale up and down, and move functions across distributed hardware resources. With continual updates, operators can keep things running on the latest software without interruption to their customers. On the road to NFV deployment | Ericsson
For example, a virtual session border controller could be deployed to protect a network without the typical cost and complexity of obtaining and installing physical network protection units. Other examples of NFV include virtualized load balancers, firewalls, intrusion detection devices and WAN accelerators. ...The NFV framework consists of three main components:
- Virtualized network functions (VNFs) are software implementations of network functions that can be deployed on a network functions virtualization infrastructure (NFVI).
- Network functions virtualization infrastructure (NFVI) is the totality of all hardware and software components that build the environment where NFVs are deployed. The NFV infrastructure can span several locations. The network providing connectivity between these locations is considered as part of the NFV infrastructure.
- Network functions virtualization management and orchestration architectural framework (NFV-MANO Architectural Framework) is the collection of all functional blocks, data repositories used by these blocks, and reference points and interfaces through which these functional blocks exchange information for the purpose of managing and orchestrating NFVI and VNFs.
The building block for both the NFVI and the NFV-MANO is the NFV platform. In the NFVI role, it consists of both virtual and physical processing and storage resources, and virtualization software. Network function virtualization | Wikipedia
|
|
|
|