Difference between revisions of "Computer Networks"
m |
m |
||
| Line 28: | Line 28: | ||
* [[Excel]] ... [[LangChain#Documents|Documents]] ... [[Database|Database; Vector & Relational]] ... [[Graph]] ... [[LlamaIndex]] | * [[Excel]] ... [[LangChain#Documents|Documents]] ... [[Database|Database; Vector & Relational]] ... [[Graph]] ... [[LlamaIndex]] | ||
* [[Policy]] ... [[Policy vs Plan]] ... [[Constitutional AI]] ... [[Trust Region Policy Optimization (TRPO)]] ... [[Policy Gradient (PG)]] ... [[Proximal Policy Optimization (PPO)]] | * [[Policy]] ... [[Policy vs Plan]] ... [[Constitutional AI]] ... [[Trust Region Policy Optimization (TRPO)]] ... [[Policy Gradient (PG)]] ... [[Proximal Policy Optimization (PPO)]] | ||
| + | * [[Architectures]] for AI ... [[Generative AI Stack]] ... [[Enterprise Architecture (EA)]] ... [[Enterprise Portfolio Management (EPM)]] ... [[Architecture and Interior Design]] | ||
| + | |||
<b>Transport Agnostic</b> - capability is achieved by splitting the control/management ‘planes’ from the data ‘plane’, using software defined networking (SDN) mechanisms to dynamically redirect traffic to the best transport, as opposed to having control/management/data on the same ‘plane’. The users/edge devices delegate (are agnostic) the tasks of assigning transport addresses/routes/protocols/mechanisms are used. From a security point of view, users/edge never access the control/management ‘planes’! | <b>Transport Agnostic</b> - capability is achieved by splitting the control/management ‘planes’ from the data ‘plane’, using software defined networking (SDN) mechanisms to dynamically redirect traffic to the best transport, as opposed to having control/management/data on the same ‘plane’. The users/edge devices delegate (are agnostic) the tasks of assigning transport addresses/routes/protocols/mechanisms are used. From a security point of view, users/edge never access the control/management ‘planes’! | ||
Revision as of 13:57, 18 September 2023
Youtube search... ...Google search
- Telecommunications ... Computer Networks ... 5G ... Satellite Communications ... Quantum Communications ... Communication Agents ... Smart Cities ... Digital Twin ... Internet of Things (IoT)
- Risk, Compliance and Regulation ... Ethics ... Privacy ... Law ... AI Governance ... AI Verification and Validation
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Zero Trust
- Analytics ... Visualization ... Graphical Tools ... Diagrams & Business Analysis ... Requirements ... Loop ... Bayes ... Network Pattern
- Development ... Notebooks ... AI Pair Programming ... Codeless, Generators, Drag n' Drop ... AIOps/MLOps ... AIaaS/MLaaS
- Virtualization - Dynamic Spectrum Sharing (DSS)
- Self-Organizing
- Containers; Docker, Kubernetes & Microservices
- Excel ... Documents ... Database; Vector & Relational ... Graph ... LlamaIndex
- Policy ... Policy vs Plan ... Constitutional AI ... Trust Region Policy Optimization (TRPO) ... Policy Gradient (PG) ... Proximal Policy Optimization (PPO)
- Architectures for AI ... Generative AI Stack ... Enterprise Architecture (EA) ... Enterprise Portfolio Management (EPM) ... Architecture and Interior Design
Transport Agnostic - capability is achieved by splitting the control/management ‘planes’ from the data ‘plane’, using software defined networking (SDN) mechanisms to dynamically redirect traffic to the best transport, as opposed to having control/management/data on the same ‘plane’. The users/edge devices delegate (are agnostic) the tasks of assigning transport addresses/routes/protocols/mechanisms are used. From a security point of view, users/edge never access the control/management ‘planes’!
Contents
Cognitive Network (CN)
In communication networks, cognitive network is a new type of data network that makes use of cutting edge technology from several research areas to solve some problems current networks are faced with. Cognitive network is different from cognitive radio as it covers all the layers of the OSI model. Cognitive Network | Wikipedia
Intent-Based Networking (IBN)
- Intelligent Automation
- Intelligent Assurance
- Understanding what's on the Network
- Detecting Threats in encrypted traffic
Software-Defined Enterprise (SDE) / Software-Defined Networking (SDN) / Software-defined Wide Area Network (SD-WAN)
Youtube search... ...Google search
- Artificial Intelligence Enabled Software Defined Networking: A Comprehensive Overview | Majd Latah and Levent Toker
- SDN, AI, and DevOps | Russ White - Rule11 Reader
- Defense Information Systems Agency (DISA)
- 3 Use Cases for Machine Learning Within SD-WAN | Lanner
- SDN, AI and DevOps | Russ White - Juniper
Virtual network architecture that allows enterprises to leverage any combination of transport services to securely connect users to applications. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. This concept is similar to how software-defined networking implements virtualization technology to improve data center management and operation. Wikipedia
- WAN Optimization
- Fault Prediction
- Network Management
- Security
|
|
|
|
|
|
|
|
Explained
|
|
Network Functions Virtualization (NFV)
Youtube search... ...Google search
NFV or Virtual Network Function (VNF) allows network operators to manage and expand their network capabilities on demand using virtual, software based applications where physical boxes once stood in the network architecture. This makes it easier to load-balance, scale up and down, and move functions across distributed hardware resources. With continual updates, operators can keep things running on the latest software without interruption to their customers. On the road to NFV deployment | Ericsson
For example, a virtual session border controller could be deployed to protect a network without the typical cost and complexity of obtaining and installing physical network protection units. Other examples of NFV include virtualized load balancers, firewalls, intrusion detection devices and WAN accelerators. ...The NFV framework consists of three main components:
- Virtualized network functions (VNFs) are software implementations of network functions that can be deployed on a network functions virtualization infrastructure (NFVI).
- Network functions virtualization infrastructure (NFVI) is the totality of all hardware and software components that build the environment where NFVs are deployed. The NFV infrastructure can span several locations. The network providing connectivity between these locations is considered as part of the NFV infrastructure.
- Network functions virtualization management and orchestration architectural framework (NFV-MANO Architectural Framework) is the collection of all functional blocks, data repositories used by these blocks, and reference points and interfaces through which these functional blocks exchange information for the purpose of managing and orchestrating NFVI and VNFs.
The building block for both the NFVI and the NFV-MANO is the NFV platform. In the NFVI role, it consists of both virtual and physical processing and storage resources, and virtualization software. Network function virtualization | Wikipedia
|
|
|
|