Future Intent-Based Networking


Book Description

So-called Intent-Based Networking (IBN) is founded on well-known SDN (Software-Defined Networking) and represents one of the most important emerging network infrastructure opportunities. The IBN is the beginning of a new era in the history of networking, where the network itself translates business intentions into appropriate network configurations for all devices. This minimizes manual effort, provides an additional layer of network monitoring, and provides the ability to perform network analytics and take full advantage of machine learning. The centralized, software-defined solution provides process automation and proactive problem solving as well as centralized management of the network infrastructure. With software-based network management, many operations can be performed automatically using intelligent control algorithms (artificial intelligence and machine learning). As a result, network operation costs, application response times and energy consumption are reduced, network reliability and performance are improved, network security and flexibility are enhanced. This will be a benefit for existing networks as well as evolved LTE-based mobile networks, emerging Internet of Things (IoT), Cloud systems, and soon for the future 5G/6G networks. The future networks will reach a whole new level of self-awareness, self-configuration, self-optimization, self-recovery and self-protection. This volume consists of 28 chapters, based on recent research on IBN.The volume is a collection of the most important research for the future intent-based networking deployment provided by different groups of researchers from Ukraine, Germany, Slovak Republic, Switzerland, South Korea, China, Czech Republic, Poland, Brazil, Belarus and Israel. The authors of the chapters from this collection present in depth extended research results in their scientific fields.The presented contents are highly interesting while still being rather practically oriented and straightforward to understand. Herewith we would like to wish all our readers a lot of inspiration by studying of the volume!




The Complete Guide to SCION


Book Description

When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.




ITIL 4 High-Velocity IT


Book Description

ITIL is a widely adopted body of knowledge and best practices for successful IT Service Management that links with training and certification.




ITIL® 2011 Edition - A Pocket Guide


Book Description

For trainers free additional material of this book is available. This can be found under the "Training Material" tab. Log in with your trainer account to access the material. Note: This pocket book is available in several languages: English, German, Dutch. Since 2001 the Van Haren Publishing ITIL Pocket Guides have helped readers all over the world to understand the essentials of ITIL (IT Infrastructure Library), the leading framework for IT service management. This pocket guide does exactly the same as previous editions: offering a concise summary of ITIL, based on ITIL® 2011 Edition. We have condensed the full ITIL framework, found in 2000 pages, into just 200 pocket-sized pages! It means that this book is an essential time-saving and cost-effective guide to ITIL 2011 Edition -- for both industry experts and students alike. Primarily it is a quick, portable reference tool to ITIL for all professionals in the service management community. What is the ‘lifecycle’ approach? What are the key service management processes and functions? Secondly the ITIL pocket guide can be used as part of the training material for everyone who wants to certify for the ITIL Foundation exam. The guide contents cover all of the specifications of AXELOS’ ITIL Foundation Certificate syllabus.




The Digital Practitioner Pocket Guide


Book Description

The Digital Practitioner Pocket Guide is designed to be a handy reference guide to selected parts of the Digital Practitioner Body of KnowledgeTM Standard. It is designed to help: • Those who require a first introduction and basic understanding of the Digital Practitioner Body of Knowledge Standard • Individuals who wish to create and manage product offerings with an increasing digital component, or lead their organization through Digital Transformation • IT professionals working within any size organization, from a startup through to a large enterprise, that has adopted digital approaches It covers the following topics: • A brief introduction to the Digital Practitioner Body of Knowledge Standard • An introduction to key terminology, key concepts, and the structure of the Body of Knowledge • Basic concepts employed by the Digital Practitioner • The capabilities of digital infrastructure and initial concerns for its effective, efficient, and secure operation • The objectives and activities of application development • Why product management is formalized as a company or team grows, and the differences between product and project management • The key concerns and practices of work management as a team increases in size • The basic concepts and practices of operations management in a digital/IT context • How to coordinate as the organization grows into multiple teams and multiple products • IT investment and portfolio management • Organizational structure, human resources, and cultural factors • Governance, risk, security, and compliance • Information and data management on a large scale • Practices and methods for managing complexity using Enterprise Architecture




Cassandra: The Definitive Guide, (Revised) Third Edition


Book Description

Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This revised third edition--updated for Cassandra 4.0 and new developments in the Cassandra ecosystem, including deployments in Kubernetes with K8ssandra--provides technical details and practical examples to help you put this database to work in a production environment. Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra's nonrelational design, with special attention to data modeling. Developers, DBAs, and application architects looking to solve a database scaling issue or future-proof an application will learn how to harness Cassandra's speed and flexibility. Understand Cassandra's distributed and decentralized structure Use the Cassandra Query Language (CQL) and cqlsh (the CQL shell) Create a working data model and compare it with an equivalent relational model Design and develop applications using client drivers Explore cluster topology and learn how nodes exchange data Maintain a high level of performance in your cluster Deploy Cassandra onsite, in the cloud, or with Docker and Kubernetes Integrate Cassandra with Spark, Kafka, Elasticsearch, Solr, and Lucene




Emergency Response Guidebook


Book Description

Does the identification number 60 indicate a toxic substance or a flammable solid, in the molten state at an elevated temperature? Does the identification number 1035 indicate ethane or butane? What is the difference between natural gas transmission pipelines and natural gas distribution pipelines? If you came upon an overturned truck on the highway that was leaking, would you be able to identify if it was hazardous and know what steps to take? Questions like these and more are answered in the Emergency Response Guidebook. Learn how to identify symbols for and vehicles carrying toxic, flammable, explosive, radioactive, or otherwise harmful substances and how to respond once an incident involving those substances has been identified. Always be prepared in situations that are unfamiliar and dangerous and know how to rectify them. Keeping this guide around at all times will ensure that, if you were to come upon a transportation situation involving hazardous substances or dangerous goods, you will be able to help keep others and yourself out of danger. With color-coded pages for quick and easy reference, this is the official manual used by first responders in the United States and Canada for transportation incidents involving dangerous goods or hazardous materials.




The IT4ITTM reference architecture, Version 2.0


Book Description

The Open Group IT4IT Reference Architecture, Version 2.0, an Open Group Standard, provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT. The Open Group IT4IT Reference Architecture standard comprises a reference architecture and a value chain-based operating model. The IT Value Chain has four value streams supported by a reference architecture to drive efficiency and agility. The four value streams are: Strategy to Portfolio Request to Fulfill Requirement to Deploy Detect to Correct Each IT Value Stream is centered on a key aspect of the service model, the essential data objects (information model), and functional components (functional model) that support it. Together, the four value streams play a vital role in helping IT control the service model as it advances through its lifecycle. The IT4IT Reference Architecture: Provides prescriptive guidance on the specification of and interaction with a consistent service model backbone (common data model/context) Supports real-world use-cases driven by the Digital Economy (e.g., Cloud-sourcing, Agile, DevOps, and service brokering) Embraces and complements existing process frameworks and methodologies (e.g., ITIL®, CoBIT®, SAFe, and TOGAF®) by taking a data-focused implementation model perspective, essentially specifying an information model across the entire value chain The audience for this standard is: IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective IT Professionals / Practitioners who are focused on instrumenting the IT management landscape IT Leaders who are concerned about their operating model Enterprise Architects who are responsible for IT business transformation Topics covered include: An introduction to the standard and the purpose of the IT4IT work Key terminology of the standard An introduction for executives and others introducing the IT Value Chain and IT4IT Reference Architecture concepts IT4IT Core, which defines the structure of the IT4IT standard as well as the process and document structure used by the IT4IT standard The Strategy to Portfolio (S2P) Value Stream The Requirement to Deploy (R2D) Value Stream The Request to Fulfill (R2F) Value Stream The Detect to Correct (D2C) Value Stream Background information on the standard.