SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Azman	Ali,	PhD		
Telekom	Malaysia	
(Consultant)	
	
An	Autonomous	Network	
Management?		
Within	the	Context	of	Resilience
“Over	1	million	of	SCADA		devices	over	Internet”	
																																																																														Thales	
Internet	has	fast	becoming	
infrastructure	for	criLcal	
services-	eCommerce,	
eGovernment,	eSurveillence,	DNS,	
Millions	of	SCADA/ICS	devices,	IoTs	
and	other	cyber-physical	applicaAon	
are	currently	deployed	over	Internet	
CriLcal	Infrastructure	on	the	
Internet	aNack	are	sLll	rising	
(1.2	TBps	DDoS	on	Dyns	in	2016,	
CriAcal	Internet	infrastructure	
brought	down	by	TVs,	Camera,	
smartlights	and	Toasters	)	
Background
Background	
GOOD	THING	IS	THAT	SDN,	Big	
Data,	CogniLve	CompuLng	and	
ComputaLonal	Technology	are	
evolving,		
Internet	Traffic	(ie	ANack)	is	hard	to	
model	:	High	Volume	,	High	Velocity,	
Uncertain	environment(very	Dynamic)	.	
Future	(MulAlayered)	Internet	
Management	needs	to	address	these	
characterisAc.
Autonomous	Systems	
IS	AN	AUTONOMOUS	NETWORK		
MANAGEMENT	FEASIBLE	?
IntroducLon	
•  Autonomous	vehicles	are	already	a	reality…	will	the	
same	concept	applicable	for	future	Internet	
Management?	
Discussion	
Trade-offs-
Issues-
Conclusion	
Case	Study		
	Components-	
Design-	
ImplementaAon	
MoLvaLon	
Terminologies-
Benefits-
Current	State
.			
Autonomic	and	Autonomous	refer	to	the	level	of	Authority.	
The	idea	to	to	have	minimum	or	no	human	intervenLon.	
IntroducLon	:	The	Terminologies	
AutomaLc	
	
Set	of	fixed/programmed	
tasks	(ie	SOP,	step	by	step)	
Autonomic	
AutomaLon	with	
Intelligent,	Self-x	
(selforganize,	selVeal	etc),	
ability	to	control	internal	
environment/resources)	
Autonomous	
Self	DirecAon	(effect	
external	environment	–	
ie	autonomous	car,	
drone)	
Intelligence	:		Ability	to	learn,	adapt,	change,	evolve	(make	decision)	Human		
Intelligence	
Machine	
Intelligence
IntroducLon	:	Resilience	
•  Resilience:		Ability	to	Remain	
Opera3on	in	the	face	of	Challenges		
•  Axiom	:	Faults	are	inevitable	(Perfect																
																				systems	are	Infeasible)	
•  Example	Challenges		:	Human	Error,	
Natural	Disaster,	A_ack,	Machine	
Error	,	Flash	Crowd,	Sabotage,	(some	
happen	with	Genuine	reasons	and	
not	necessarily	Malicious)		
	
•  Example	Strategy	:	
–  D2R2+DR		=	Detect	Defend	Remediate	
Recover	+	Diagnose	Refine	
Autonomic	
Autonomous
Why:	Current	State	
•  Current	approaches	work	in	silos	(soluAons	not	designed	to	
fit	into	mulAlayer	defense	strategy)			
•  Cloud	Based	services	such	as	Scrubbing/Clean	Pipe	services	
could	be	costly	(ie	service	cost,	bandwidth+	indirect	cost)	
•  Delay	in	Decision	making	and	AcAon	Triggered	as	most	of	
Security	decision	are	manual	
•  Lack	of	ExperLse	within	organizaAon	to	match	dynamic	
nature	of	challenges	
•  Data	and	Traffic	are	growing	beyond	human	capability	to	
analyze	or	handle	(prone	to	error)
Why?	:			
Current	Challenges	
AUTONOMOUS	MALWARE		
MulLlayered	..	Need	CoordinaLon		
Malware		
are	now	
Intelligently		
Spread	
through	
Botnet
Why	:	The	Benefits	of	Autonomous/autonomic	Systems		
•  CoordinaLon-	The	needs	for	OrchestraAon	of	
acAons	across	mulAple	layers	of	networks		
•  Speed	-	Improve	Time	to	Response		
																				(Real	Time	decision	making	and	acAon)	
•  Avoid	Challenges	that	largely	due	to	human	factor	
•  Retain	experLse	and	experience	within	
organizaAon	
•  Human	to	Focus	of	Strategic	rather	than	technical
How	do	we	do	this?	:		
Components	of	Autonomous	systems		
• Take	input	from	user	(ie	acAon,	parameters)	
• Specified	by	policy	Files	(ie	as	strategy	lookup)	
• Orchestrate	Message	passing	between	Network	
FuncAons	(mulAlayers/mulAcomponents)	
• Translate/Refine	policy	to	low	level	
implementaAon	(can	we	use	voice	recogniAon?)	
• Example	:	Ponder2	,	PonderTalk,	
Policy	Based	
Management	
• 	Decision	to	be	supported	by	fact	
• Perform	specific	task	such	as	monitor	uAlizaAon,	
classify,	control	
• Triggered	through	message	passing	from	
orchestrator	(start,	stop,	send	parameters)	
• Performed	autonomously	unAl	stop	direcAve	
received	
Intelligent	
Network	
FuncLon	
AUTONOMOUS	
INTELLIGENCE
Policy-based	management		
Framework	that	orchestrates	and		
Coordinate	message	passing	
among	Anomaly	Detector,	
Classifier	and	Rate-limiter	
Anomaly	DetecAon,	Classifier	and	
Ratelimiter	implementaAon.	These	are	
considered	rouAne	tasks	that	can	be	allowed	
to	be	autonomous.	They	can	potenAally	be	
deployed	across	SDN	routers	and	switches	
Human	Operators	focus	on	Strategic		
Decision	and	goal	se]ng	using	Policy	
Language	
How	:	Components	of	Autonomous	Systems		
POLICY-BASED		
SYSTEM		
INTELLIGENT	SYSTEMS		
HUMAN			
LOW	LEVEL	
IMPLEMENTATION	LAYER	
HIGH	LEVEL	–		
ORCHESTRATION	LAYER		
1	
2
CASE	STUDIES	:	REALIZING	AUTONOMOUS	SYSTEMS	
•  The	case	study	was	conducted	based	on	2	scenarios		
–  Scenario	1:	Simulated	DDos	using	Network	Topology	of	Service	Provider.	
–  Scenario	2:	DDos	DetecAon	for	DNS	root.servers	A_ack	2015	[1][2]	
SCENARIO	2	(Anomaly	DetecAon	based		
	on	RIPE	DNS	monitoring	traffic/queries)	[3]		
SCENARIO	1	(Simulated	LARGE	scale	of	
A_ack	on	Telco	using	OMNET++	Simulator)		
Reference	:	
[1]	h*p://www.root-servers.org/news/events-of-20160625.txt	
[2]	h*p://thehackernews.com/2015/12/dns-root-servers-ddos-a*ack.html	
[3]	h_ps://www.internetsociety.org/doc/ripe-atlas-probes-and-anchors
Policy	autonomously	Triggered	to	change	the	bandwidth	limit	
(without	human	intervenAon)		
Ponder	2	:	Java	based	Objects	for	Policy	Management	
(orchestraLon)	-	Ponder2	Framework	publicly	available	
CASE	STUDIES	:Component	1:	Policy-Based	Mgmt
Building	Anomaly	Detector	(using	R	pogramming)		to	detect	DNS	A_ack	
based	on	data	collected	from	9000	RIPE	DNS	monitoring	Probes	
Autonomous	Learning	Systems	Library	
Publicly	available	from	:	CRAN	R	
Repository		
		
for	(i	in	1:length(avector)){	
		if	(i	==	1){	
		a	=	teda_r(avector[i])	
				mean	=	a$curr_mean	
				curvar	=	a$curr_var	
				nexk=	a$next_k	
								}	else	{	
		a=	teda_r(avector[i-1],	
									mean,	
									curvar,	
									nexk)	
		mean	=	a$curr_mean	
		curvar	=	a$curr_var	
		nexk=	a$next_k	
								}									
	 # r e s u l t [ i ] < -
list(a$curr_eccentricity,a$curr_typicality,	
a$curr_norm_eccentricity,a$curr_norm_typic
ality,a$outlier,a$ecc_threshold)	
	#	summary	(a)	
A_ack	visualized	and	and	anomaly.	Marked	in	x	(in	real	
Ame).	Message	can	be	sent	to	NMS	or	passed	to	
orchestrator	for	automated	response	(ie	trigger	other	
network	funcAon	such	as	rate-limiter	etc)	.		
CASE	STUDIES	–	Component	2:	Intelligent	Systems
The	Drivers	and	Enablers	
•  Technology	
–  ComputaAonal	Technology	(Cheaper	and	be_er	CPU,	memory)	
–  Big	Data	Technology	(Machine	learning,	Deep	learning,	data	
visualizaAon,	data	preprocessing	(Extract-Transform-Load)	are	made	
easier)	
–  Sokware	Defined	Network	Technology	(No	more	vendor/hardware	
centricity,	allow	highly	customized	use	of	hardware)	
	
•  OrganizaLon		
–  To	enable	real	Ame	decision	making	and	response	
–  To	Adapt	to	policy-based	management	–	focus	on	strategic	task	rather	
than	rouAne	tasks		
–  Business	requirement	are	dynamic	due	to	economic,	poliAc,	cultural	
reason	
–  OrganizaAonal	Mindset	and	culture	(transformaAon	from	manual	to	
automaAon,	upskilling,	strategic)	
•  Individuals		
–  Adequate	Skillset	and	experAse	(ie	SDN,	Phyton,	Big	Data)	
–  Next	level	for	Network/Security	Professionals	??
Autonomous	Systems	Tradeoff	and	Issues	
	
•  Autonomous	systems	design		is	subject	to	Non-
Technical	requirement	or	policies,	someAmes	
economy,	poliAc	or	culture	related	
•  Human	In	the	Loop	should	be	considered	as	
emergency	switch	
•  Accuracy	may	be	second	priority	(aker	speed	
and	efficiency)	
•  May	selecLvely	applicable	(based	on	RISK)	to	
certain	type	of	tasks	compared	to	others	(ie	
rouAne	and	low	risk	tasks	can	be	handled	
autonomously,	but	high	impact	task	needs	
authority	intervenAon)		
–  Hence	Autonomous	systems	is	recommended	at	low	
level	implementaAon	level	(ie	edge	analyAc+acAon),	but	
in	the	context	of	network-wide	deployment	it	should	be	
autonomic	(at	the	moment)
Other	impacts		
•  More	Intelligence	sharing	(mulAple	
providers)	which	can	be	from	other	
context	(ie	social	media	as	sensors)	
•  New	job	definiLons,	less	of		low	skilled	
but	increased	in	mid-skilled	workers	
(means	more	sokware	programming	
skills?)	
•  Cultural	and	mindset	change	(personnel	
and	organizaAonal)	–	data	driven	
•  Changes	are	inevitable,	probably	(in	the	
future)	needs	insAtuAonal	control	or	
regulaAons.
Conclusion	
•  Future	Internet	Management	needs	to	adapt	
Autonomous/Autonomic	and	Intelligent		strategy	
to	address	the	rise	of	a_ack	sophisAcaAon	(&	
challenges)	
•  The	key	components	are	Policy-based	management	
and	Intelligent	Systems	
•  OrganizaLon	and	Individuals	are	key	stakeholders	
in	making	Internet	Management	works	
•  Be_er	computaAonal,	Big	Data	and	SDN	technology	
will	be	technological	driver	for	autonomous	systems
Acknowledgement	
EU	Funded	Research	Framework	7	
www.resumenet.eu	
Reference	:	wiki.i_c.ku.edu/resilinets/Main_Page
Thank	You
Problem	QuesLons	
•  What	is	defined	as	Autonomous	Systems?	
•  What	are	current	state	(shorpalls	of	exisAng	
approaches)	
•  What	are	the	benefits	of	an	autonomous	
Management	of	Network?	
•  What	are	the	Drivers	and	Enablers	
•  How	does	it	works/demonstrated?	
•  Can	Network/Internet	be	autonomously	
managed?	What	are	the	Tradeoff,	issues?	
•  What	are	the	other	impacts
Why?		:	Roadmap	to	Autonomic	Management	
Risk	
Efficiency	
h_ps://www3.technologyevaluaAon.com/research/TEC-report/BI-Maturity-and-Sokware-SelecAon-PerspecAves.html	
h_ps://cogniAveradiosec.wordpress.com/2017/01/28/arAficial-intelligence-as-an-enabler-for-cogniAve-self-organizing-future-networks/

Mais conteúdo relacionado

Mais procurados

Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology5G Network - It's Architecture and Technology
5G Network - It's Architecture and TechnologyRajKumarRaj32
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfMASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfYAAKOVSOLOMON1
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communicationAnkit Anand
 
OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introductionopenstackindia
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 

Mais procurados (20)

Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology
 
Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfMASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
 
Internet of vehicles
Internet of vehiclesInternet of vehicles
Internet of vehicles
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introduction
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 

Semelhante a An Autonomous Network Management? by Dr Azman Ali

Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom PresentationEric Gallant
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentationTim Willoughby
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architectureÉric Grall
 
The STEEP Forces Driving Cloud Computing for CSA IT
The STEEP Forces Driving Cloud Computing for CSA ITThe STEEP Forces Driving Cloud Computing for CSA IT
The STEEP Forces Driving Cloud Computing for CSA ITCraig Rispin
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Slicing Smart Cities. Slice 2 - Applied ICT Technologies
Slicing Smart Cities. Slice 2 - Applied ICT TechnologiesSlicing Smart Cities. Slice 2 - Applied ICT Technologies
Slicing Smart Cities. Slice 2 - Applied ICT TechnologiesJoan Manuel López Ruiz
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 

Semelhante a An Autonomous Network Management? by Dr Azman Ali (20)

Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Smac
SmacSmac
Smac
 
SMAC
SMACSMAC
SMAC
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentation
 
Little.story.it.architecture
Little.story.it.architectureLittle.story.it.architecture
Little.story.it.architecture
 
The STEEP Forces Driving Cloud Computing for CSA IT
The STEEP Forces Driving Cloud Computing for CSA ITThe STEEP Forces Driving Cloud Computing for CSA IT
The STEEP Forces Driving Cloud Computing for CSA IT
 
Zero Human Touch Networks
Zero Human Touch NetworksZero Human Touch Networks
Zero Human Touch Networks
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Slicing Smart Cities. Slice 2 - Applied ICT Technologies
Slicing Smart Cities. Slice 2 - Applied ICT TechnologiesSlicing Smart Cities. Slice 2 - Applied ICT Technologies
Slicing Smart Cities. Slice 2 - Applied ICT Technologies
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 

Mais de MyNOG

Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10MyNOG
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023MyNOG
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksMyNOG
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersMyNOG
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network ControllerMyNOG
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformMyNOG
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalidsMyNOG
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXMyNOG
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in KubernetesMyNOG
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKIMyNOG
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmMyNOG
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEMyNOG
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...MyNOG
 
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveFUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveMyNOG
 
Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...MyNOG
 
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...MyNOG
 
MyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyNOG
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearMyNOG
 

Mais de MyNOG (20)

Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New Frontiers
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalids
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in Kubernetes
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable Paradigm
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
 
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveFUTURE-PROOFING DATA CENTRES from Connectivity Perspective
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
 
Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...Keep Ukraine Connected: A project from the community – for the community by R...
Keep Ukraine Connected: A project from the community – for the community by R...
 
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
Solving Civilization’s Long Term Communication Needs by Dinesh Kummaran, Tran...
 
MyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIXMyIX Updates by Raja Mohan Marappan, MyIX
MyIX Updates by Raja Mohan Marappan, MyIX
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 

Último

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 

Último (20)

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 

An Autonomous Network Management? by Dr Azman Ali