<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized &#8211; SC4 Technology</title>
	<atom:link href="https://sc4t.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://sc4t.com</link>
	<description></description>
	<lastBuildDate>Wed, 29 May 2024 11:28:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
	<item>
		<title>Professional approach to Real Estate</title>
		<link>https://sc4t.com/2023/03/29/professional-approach-to-real-estate/</link>
					<comments>https://sc4t.com/2023/03/29/professional-approach-to-real-estate/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:25:06 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=77</guid>

					<description><![CDATA[What SC4T can do for Real Estate SC4 offers a tailored approach to the design of the ICT infrastructure in Real Estates projects like Smart buildings, Business Campuses and Hotels.New technologies in the ICT world and in the automation sector are starting to collide and merge : as a result more and more building planners [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="77" class="elementor elementor-77" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-29286d51 e-flex e-con-boxed e-con e-parent" data-id="29286d51" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4f7c9b02 elementor-widget elementor-widget-text-editor" data-id="4f7c9b02" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.21.0 - 26-05-2024 */
.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}</style>				<h3>What SC4T can do for Real Estate</h3><p>SC4 offers a tailored approach to the design of the ICT infrastructure in Real Estates projects like Smart buildings, Business Campuses and Hotels.<br />New technologies in the ICT world and in the automation sector are starting to collide and merge : as a result more and more building planners and owners are looking to grab the benefits of the integration of these two worlds. Efficiency, sustainability and savings are enabled by smart adoptions and integration of these two worlds that were considered detached just a while ago.<br />Nowadays a vast array of devices and sensors allows us to collect data from different sources that were traditionally disconnected from the the ICT infrastructure of a building. Two different environments existed: the communication infrastructure were designed to provide just support to devices like PCs, Tablets and Phones. Each building service (heating, AC, plumbing, electrical power) had its infrastructure and was managed in a different way by different devices. Today technology enables us to integrate these different environments and provides a unique, integrated approach to the management need of an intelligent building, be that an Office Complex, a Luxury Hotel or an Hospital.</p><h3>SC4T project engineering for Real Estate </h3><p>The SC4T project engineering design service for Real Estate allows to leverage the extensive knowledge and experience of a well established technology consulting company that can guide the customer to the selection of the most appropriate solution for its ICT, audio, visual and security need.</p><p>At SC4T we work with our customers to plan and define an overall strategy to deliver the the most appropriate smart services to intelligent buildings. Our smart design approach leverages the use of information and communication technologies to enhance the usability, sustainability, efficiency and system interoperability of the infrastructure across the whole lifecycle of a complex building.<br />The unique mix of in-house technology services and multiyear experience allows us to capitalize on our set of leading-edge consultants that constantly strive to exceed customer expectations through a proven, tested design approach and a diligent, proficient engineering background.</p><h3>HIGH level Design and logical Map</h3><p>Using hierarchical network design principles and a structured approach we draft and overall plan for the Cabling, the Network and the external connectivity end points that will be reviewed with the main stakeholders to ensure its correctness and adherence to the requirements.</p><h3>Low level Design of Physical Connectivity</h3><p>The detailed graphical map for structured cabling, wireless and device connectivity (network, servers,…) will be documented in a specific set of drawings.</p><h3>KNX / BACnet / MODBUS integration </h3><p>We use specific tools and devices to provide a seamless integration between building automation systems like KNX, BACnet or MODBUS and the ICT communication infrastructure. This translates in controlling your building temperature, HVAC, access systems and network from a web interface or from a specific App.</p><h3>ICT Design Service for Real Estate </h3><p>SC4T will address and design any traditional ICT service like internal network connectivity, Internet and WAN connectivity, Voice over IP PBX, linear and cable / satellite TV delivery over IP, Video surveillance with proper planning and documentation.<br />SC4T is an expert and well established consultancy firm specialized in ICT, Audio, Video over IP, security and building automation solutions.<br />We offer an holistic approach to highlight the benefits that technology can bring and develop a set of pragmatic solutions that enables end users to meet their goals in terms of efficiency, cost and effectiveness of their investment. <br />We are an industry leader in the design, delivery and integration of smart ICT, IoT (Internet of Things) and automation solutions across all sectors.</p><p> </p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/professional-approach-to-real-estate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5G WILL BE THE FIRST NETWORK TO BE BORN IN THE CLOUD.” (Andre Fuetsch, AT&#038;T)</title>
		<link>https://sc4t.com/2023/03/29/5g-will-be-the-first-network-to-be-born-in-the-cloud-andre-fuetsch-att/</link>
					<comments>https://sc4t.com/2023/03/29/5g-will-be-the-first-network-to-be-born-in-the-cloud-andre-fuetsch-att/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:24:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=75</guid>

					<description><![CDATA[Telco Cloud Paradigm influence both Core and RAN with key principles Telco Cloud is a cloud computing environment optimized for telecom operators, who have the most stringent requirements in terms of performance, quality of service and regulatory obligations. Telco cloud is a software-defined, highly resilient cloud infrastructure that allows telcos to add services more quickly, [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="75" class="elementor elementor-75" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-7b438c85 e-flex e-con-boxed e-con e-parent" data-id="7b438c85" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-37eff753 elementor-widget elementor-widget-text-editor" data-id="37eff753" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Telco Cloud Paradigm influence both Core and RAN with key principles</h3><p class="mb_30">Telco Cloud is a cloud computing environment optimized for telecom operators, who have the most stringent requirements in terms of performance, quality of service and regulatory obligations.</p><p class="mb_30">Telco cloud is a software-defined, highly resilient cloud infrastructure that allows telcos to add services more quickly, respond faster to changes in demand and centrally manage their resources more efficiently.</p><p class="mb_30">The full efficiency is reached when all the Computing, Networking and Storage resources for RAN, Transport and CORE are managed and orchestrated by a single umbrella system, leaving eventually detailed management functions to dedicated element managers (EMSs). The Simplification, Flexibility and Automation of the processes bring to TCO savings.</p><p class="mb_30">Common criteria are being adopted both for Fixed and Mobile Networks (FMC) for network efficiency and unified customer experience regardless of the access media (Wireless, Fiber, Cable). Unified QoS management can be an example.</p><p class="mb_30">Telco clouds are built on the concept of Network Functions Virtualization Infrastructure (NFVI) and Software Defined Networking (SDN). In a telco cloud, Cloud Native Functions and Virtual Network Functions (VNFs) replace physical devices to provide essential network services.</p><h3>5G IS A TECHNOLOGY ENABLER</h3><p>5G introduces Multi-Access Edge Computing (<strong>MEC</strong>), <strong>Network Slicing</strong>, ultra reliable low latency communications (<strong>uRLLC</strong>), massive machine type communication (<strong>mMTC</strong>) in addition to enhanced mobile broadband communication (<strong>eMBB</strong>) thanks to new efficient New Radio. Disaggregation via <strong>Open RAN</strong> offer more flexible deployment scenarios and enlarged vendors ecosystem.</p><p><strong>5G NR (New Radio)</strong> is designed to support huge and multiple type of Users (Human beings and IoT devices) and offer larger capacity introducing new spectrum bandwidth below 6GHz and mmWave e.g. 26 or 28GHz.</p><p><strong>5G SA and NSA</strong> (Standalone and Non Standalone) are designed to benefit from existing 4G networks to smoothly introduce new radio nodes or to rely on the best modern Service Based Architecture (SBA) proposed for New Generation networks</p><h3>5G brings to SP challenges and opportunities</h3><p>1. Changes in the way of working (Software oriented, Agile). In same case internal re-organization is needed. New IT skills are needed in addition to the RF &amp; Network expertise</p><p>2. Enlarged vendors ecosystem, that is a good point to avoid few vendors lock in, but requires more effort at Service Provider side for RFx preparation and answers evaluation and absolutely increased effort for System Integration, to check interoperability among building blocks from different vendors and assure the overall functionality</p><p>3. New type of 5G services as uRLLC (ultra reliable and low latency) and mMTC (massive machine type) bring to new challenge both in Radio Access Network and 5G Core architecture (MEC and Network Slicing). Enhanced MBB services where more throughput is required benefit instead by the introduction of additional spectrum, even bundling different channels in carrier aggregation.ORAN distributed architecture with RU, DU and CU (Radio, Distributed and Central Units) face this requirements but introducing a big impact into the access transport network, with specific requirements for Fronthauling (RU-DU), Middlehauling (DU-CU) in addition to traditional RAN backhauling (CU-Core). When Fibers are not available at remote edge sites, some alternative microwave technologies (as E-Band MW) can be considered but checking the limits of their application in terms of latency and troughput.</p><p>4. Disaggregation of network functions for flexibility and scalability is the key, but a proper migration path is needed to minimize impacts on existing services.Control User Plane Separation (CUPS) can allow different scalability as example, distributing more the User Plane Functions (UPF) at Edge still keeping a more centralized Control Plane (e.g. IMS signalling). CUPS after CORE is now being introduced as well in 5G ORAN (E1 interface)</p><p>5. 5G New Radio implies accurate RF planning to accommodate x 1000 users per single cell (including IoT devices), multiple frequency bands, massive MIMO and Beamforming. New RF Planning tools capabilities are needed to consider the effect of these technologies for thousands of users in different environmental scenarios: indoor vs outdoor, urban, sub-urban, rural. In addition to these specific 5G aspects, colocation of radio on existing 4G/3G/2G sites implies different RF planning and engineering considerations</p><p>6. Backward compatibility to support 2G/3G/LTE/LTE-Advanced/5G. In most of the case (apart Greenfield Operators), 2G/LTE/5G is the minimum set of radio technologies to be supported that brings inside also different Core Elements. 3G is under dismission in many countries, while GSM is still maintained as primitive MTC communication (using GPRS/EDGE)</p><p>7. Cellular IoT driven by NB IoT and 5G requires a specific approach in terms of terminals (Sensors, eSIM), dedicated networks (network slicing), device management and automation skills for network orchestration</p><p>8. In addition to MANO (Management and Orchestration) in the ORAN specifications a new function named RIC (RAN Intelligent Controller) is introduced to enable self optimization, but mainly enabling 3rd party applications via API interfaces</p><h3>How SC4T can support Service providers:</h3><p>1. Assessment of new technologies and new vendors</p><p>2. High Level Design of target architecture in terms of Virtualized Functions in a Telco Cloud Data Center infrastructure, Network topology (how many Central, Edge, Remote DC sites), Trasmission capability, Security and IP plan</p><p>3. Low level design in terms of each node, interface, configuration parameter, from RAN to CORE, including BOM (Bill of Material)</p><p>4. E2E Testing of selected architectures, including Functional tests, Performance and Capacity tests, Product compliance tests, Interoperability tests, Network Element vs Integrated System Tests, Management (BSS/OSS) tests with MANO NFVI new approach to enable Service Automation and new ORAN RIC to open the RAN for new innovative application to 3rd party, something more than SON, (Self Organizing Network) having the purpose of planning automatic optimization</p><p>5. Producing Evaluation Reports after Assessment and Test phases</p><p>6. Specific design and test areas to address RAN, Transport (last mile, metro, backbone network segment) and CORE.</p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/5g-will-be-the-first-network-to-be-born-in-the-cloud-andre-fuetsch-att/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Openstack Project Lab #3</title>
		<link>https://sc4t.com/2023/03/29/openstack-project-lab-3/</link>
					<comments>https://sc4t.com/2023/03/29/openstack-project-lab-3/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:23:10 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=73</guid>

					<description><![CDATA[Installing Openstack Train on MacOS part #3 After having built the Openstack infrastructure on our MacBookPro it’s time now to operate it and illustrate how to define networks, subnets, images and instances. As you might remember we have a the following setup: Our goal is to create and launch an instance on this infrastructure: this [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="73" class="elementor elementor-73" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-63c192a3 e-flex e-con-boxed e-con e-parent" data-id="63c192a3" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4ba261c8 elementor-widget elementor-widget-text-editor" data-id="4ba261c8" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Installing Openstack Train on MacOS part #3</h3><p class="p1">After having built the Openstack infrastructure on our MacBookPro it’s time now to operate it and illustrate how to define networks, subnets, images and instances. As you might remember we have a the following setup:</p><p><img fetchpriority="high" decoding="async" class="alignnone wp-image-17714 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology.webp" alt="image 40 blog site sc4technology" width="1638" height="664" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology.webp 1638w, https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology-300x122.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology-1024x415.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology-768x311.webp 768w, https://sc4t.com/wp-content/uploads/2024/05/image-40-blog-site-sc4technology-1536x623.webp 1536w" sizes="(max-width: 1638px) 100vw, 1638px" /></p><p>Our goal is to create and launch an instance on this infrastructure: this VM will be connected to a VXLAN network with a specific IP address space but will be reachable through an IP address published on the External network. The VM will be able to access the Internet through a virtual router defined in the Openstack infrastructure. In order to properly setup the target environment we will need to define some components as network administrator while some others need to be defined at the user level (the user that will own the VM and run application on it). So let’s define 2 shell scripts to ease switching from the admin to the user role :<br />stack@ctl:~$ cat admin-openrc <br />export OS_PROJECT_DOMAIN_NAME=Default <br />export OS_USER_DOMAIN_NAME=Default <br />export OS_PROJECT_NAME=admin export OS_USERNAME=admin <br />export OS_PASSWORD=stack$ <br />export OS_AUTH_URL=http://ctl:5000/v3 <br />export OS_IDENTITY_API_VERSION=3 <br />export OS_IMAGE_API_VERSION=2</p><p>stack@ctl:~$ cat demo-openrc <br />export OS_PROJECT_DOMAIN_NAME=Default <br />export OS_USER_DOMAIN_NAME=Default <br />export OS_PROJECT_NAME=myproject <br />export OS_USERNAME=myuser <br />export OS_PASSWORD=stack$ <br />export OS_AUTH_URL=http://ctl:5000/v3 <br />export OS_IDENTITY_API_VERSION=3 <br />export OS_IMAGE_API_VERSION=2</p><p>Now let’s check our infrastructure to verify that the prerequisites are in place. This has to be checked as an admin user, hence:<br />stack@ctl:~$ . admin-openrc <br />stack@ctl:~$ openstack endpoint list</p><p><img decoding="async" class="alignnone wp-image-17715 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-41-blog-site-sc4technology.webp" alt="image 41 blog site sc4technology" width="1377" height="466" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-41-blog-site-sc4technology.webp 1377w, https://sc4t.com/wp-content/uploads/2024/05/image-41-blog-site-sc4technology-300x102.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-41-blog-site-sc4technology-1024x347.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-41-blog-site-sc4technology-768x260.webp 768w" sizes="(max-width: 1377px) 100vw, 1377px" /></p><p>The endpoints needed for the different Openstack modules to communicate between them are properly setup.</p><p><img decoding="async" class="alignnone wp-image-17716 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-42-blog-site-sc4technology.webp" alt="image 42 blog site sc4technology" width="1531" height="394" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-42-blog-site-sc4technology.webp 1531w, https://sc4t.com/wp-content/uploads/2024/05/image-42-blog-site-sc4technology-300x77.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-42-blog-site-sc4technology-1024x264.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-42-blog-site-sc4technology-768x198.webp 768w" sizes="(max-width: 1531px) 100vw, 1531px" /></p><p>The network agents and compute services are up and running And Nova is providing the needed resources to launch a VM.<br />Let’s check if we already have some networks defined</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17717 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-43-blog-site-sc4technology.webp" alt="image 43 blog site sc4technology" width="1016" height="222" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-43-blog-site-sc4technology.webp 1016w, https://sc4t.com/wp-content/uploads/2024/05/image-43-blog-site-sc4technology-300x66.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-43-blog-site-sc4technology-768x168.webp 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></p><p>It looks like we have a few networks defined, the “provider” network is the one that is connecting to the external world and this is where the floating ip addresses will be defined. This provider network has been created with the following command:<br />openstack network create &#8211;share &#8211;external &#8211;provider-physical-network provider —provider-network-type flat provider</p><p>The net0x networks are VXLAN networks that were created previously. The related subnets (in Openstack a subnet is essentially an IP address space) are listed below:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17718 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-44-blog-site-sc4technology.webp" alt="image 44 blog site sc4technology" width="1210" height="218" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-44-blog-site-sc4technology.webp 1210w, https://sc4t.com/wp-content/uploads/2024/05/image-44-blog-site-sc4technology-300x54.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-44-blog-site-sc4technology-1024x184.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-44-blog-site-sc4technology-768x138.webp 768w" sizes="(max-width: 1210px) 100vw, 1210px" /></p><p class="p1">Creating the VXLAN where to launch the VM is a 2 step process: at first we will generate the “physical network” and then we’ll associate an IP address space to it. This has to be completed as a user so we will need to source the right credentials:</p><p class="p3"><i>stack@ctl:~$ . demo-openr</i></p><p class="p1">Let’s create the network net05</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17719 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology.webp" alt="image 45 blog site sc4technology" width="1626" height="620" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology.webp 1626w, https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology-300x114.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology-1024x390.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology-768x293.webp 768w, https://sc4t.com/wp-content/uploads/2024/05/image-45-blog-site-sc4technology-1536x586.webp 1536w" sizes="(max-width: 1626px) 100vw, 1626px" /></p><p>We have now a new network as outlined by:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17720 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-46-blog-site-sc4technology.webp" alt="image 46 blog site sc4technology" width="1358" height="284" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-46-blog-site-sc4technology.webp 1358w, https://sc4t.com/wp-content/uploads/2024/05/image-46-blog-site-sc4technology-300x63.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-46-blog-site-sc4technology-1024x214.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-46-blog-site-sc4technology-768x161.webp 768w" sizes="(max-width: 1358px) 100vw, 1358px" /></p><p>We can now associate an IP address space to net05 by creating an Openstack subnet:<br />stack@ctl:~$ openstack subnet create &#8211;network net05 \ <br />&gt; &#8211;dns-nameserver 8.8.4.4 &#8211;gateway 10.5.5.1 \<br />&gt; &#8211;subnet-range 10.5.5.1/24 subnet05</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17721 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology.webp" alt="image 47 blog site sc4technology" width="1630" height="530" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology.webp 1630w, https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology-300x98.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology-1024x333.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology-768x250.webp 768w, https://sc4t.com/wp-content/uploads/2024/05/image-47-blog-site-sc4technology-1536x499.webp 1536w" sizes="(max-width: 1630px) 100vw, 1630px" /></p><p>We now have a subnet associated with the net05 network:</p><p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-17722" src="https://sc4t.com/wp-content/uploads/2024/05/image-48-blog-site-sc4technology-300x62.webp" alt="image 48 blog site sc4technology" width="300" height="62" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-48-blog-site-sc4technology-300x62.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-48-blog-site-sc4technology-1024x211.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-48-blog-site-sc4technology-768x158.webp 768w, https://sc4t.com/wp-content/uploads/2024/05/image-48-blog-site-sc4technology.webp 1367w" sizes="(max-width: 300px) 100vw, 300px" /></p><p>And by listing the subnet we can see the Ip address space associated:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17723 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology.webp" alt="image 49 blog site sc4technology" width="1615" height="280" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology.webp 1615w, https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology-300x52.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology-1024x178.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology-768x133.webp 768w, https://sc4t.com/wp-content/uploads/2024/05/image-49-blog-site-sc4technology-1536x266.webp 1536w" sizes="(max-width: 1615px) 100vw, 1615px" /></p><p class="p1">Note that creating a new subnet translates into creating a new namespace in the Linux host, hence the output of the ip nets commands permits to relate the subnet just created to the specific namespace. (id: 6 namespace is composed by qdhcp + Openstack network ID relative to net05)</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17724 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-50-blog-site-sc4technology.webp" alt="image 50 blog site sc4technology" width="794" height="238" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-50-blog-site-sc4technology.webp 794w, https://sc4t.com/wp-content/uploads/2024/05/image-50-blog-site-sc4technology-300x90.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-50-blog-site-sc4technology-768x230.webp 768w" sizes="(max-width: 794px) 100vw, 794px" /></p><p>We can now proceed to launch our VM on net05, but before that we can check the flavor (type of virtual hardware) and images available</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17725 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-51-blog-site-sc4technology.webp" alt="image 51 blog site sc4technology" width="993" height="446" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-51-blog-site-sc4technology.webp 993w, https://sc4t.com/wp-content/uploads/2024/05/image-51-blog-site-sc4technology-300x135.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-51-blog-site-sc4technology-768x345.webp 768w" sizes="(max-width: 993px) 100vw, 993px" /></p><p>We need two additional parameters before creating the VM: the keypair is used to connect to the VM via ssh without the need for a user password and the security group is used to enable ssh and ICMP through the default iptables created at launch time. As this is a network created for a specific user we need to source the right credentials<br />stack@ctl:~$ . demo-openr</p><p>And the create the security group and the key pair<br />stack@ctl:~$ openstack security group rule create &#8211;proto tcp &#8211;dst-port 22 default <br />stack@ctl:~$ openstack security group rule create &#8211;proto icmp default <br />stack@ctl:~$ ssh-keygen -q -N “&#8221; <br />openstack keypair create &#8211;public-key ~/.ssh/id_rsa.pub keyA</p><p>We can now create and run an instance on this network</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17726" src="https://sc4t.com/wp-content/uploads/2024/05/image-52-blog-site-sc4technology.webp" alt="image 52 blog site sc4technology" width="1448" height="850" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-52-blog-site-sc4technology.webp 1448w, https://sc4t.com/wp-content/uploads/2024/05/image-52-blog-site-sc4technology-300x176.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-52-blog-site-sc4technology-1024x601.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-52-blog-site-sc4technology-768x451.webp 768w" sizes="(max-width: 1448px) 100vw, 1448px" /></p><p>Take note of the id (b7030d0e-3a62-4fed-aa03-e55e1aa16540) of this server as we will use it later. We now have an additional VM: VM55 with IP address 10.5.5.213.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17727" src="https://sc4t.com/wp-content/uploads/2024/05/image-53-blog-site-sc4technology.webp" alt="image 53 blog site sc4technology" width="1368" height="260" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-53-blog-site-sc4technology.webp 1368w, https://sc4t.com/wp-content/uploads/2024/05/image-53-blog-site-sc4technology-300x57.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-53-blog-site-sc4technology-1024x195.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-53-blog-site-sc4technology-768x146.webp 768w" sizes="(max-width: 1368px) 100vw, 1368px" /></p><p>Now to enable this VM to access the Internet we need to connect it to a router that will provide connectivity between net05 and the provider network.<br />So let’s try to see if we have a router for that:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17728" src="https://sc4t.com/wp-content/uploads/2024/05/image-54-blog-site-sc4technology.webp" alt="image 54 blog site sc4technology" width="1357" height="160" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-54-blog-site-sc4technology.webp 1357w, https://sc4t.com/wp-content/uploads/2024/05/image-54-blog-site-sc4technology-300x35.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-54-blog-site-sc4technology-1024x121.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-54-blog-site-sc4technology-768x91.webp 768w" sizes="(max-width: 1357px) 100vw, 1357px" /></p><p>We need to check if r01 has an interface on network net05 and if not we need to add that interface to r01. This can be checked by looking at the details of router r01 through the command<br />stack@ctl:~$ openstack router show r01<br />Unfortunately the output of this command is not easy to read, I prefer to look at the associated namespace</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17729" src="https://sc4t.com/wp-content/uploads/2024/05/image-55-blog-site-sc4technology.webp" alt="image 55 blog site sc4technology" width="1297" height="316" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-55-blog-site-sc4technology.webp 1297w, https://sc4t.com/wp-content/uploads/2024/05/image-55-blog-site-sc4technology-300x73.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-55-blog-site-sc4technology-1024x249.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-55-blog-site-sc4technology-768x187.webp 768w" sizes="(max-width: 1297px) 100vw, 1297px" /></p><p>So there is no interface on r01 for net05, let’s add one </p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17730" src="https://sc4t.com/wp-content/uploads/2024/05/image-56-blog-site-sc4technology.webp" alt="image 56 blog site sc4technology" width="1326" height="162" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-56-blog-site-sc4technology.webp 1326w, https://sc4t.com/wp-content/uploads/2024/05/image-56-blog-site-sc4technology-300x37.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-56-blog-site-sc4technology-1024x125.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-56-blog-site-sc4technology-768x94.webp 768w" sizes="(max-width: 1326px) 100vw, 1326px" /></p><p>Router r01 now has an interface on net05, hence we can try to ping the VM from that interface:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17731" src="https://sc4t.com/wp-content/uploads/2024/05/image-57-blog-site-sc4technology.webp" alt="image 57 blog site sc4technology" width="1263" height="296" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-57-blog-site-sc4technology.webp 1263w, https://sc4t.com/wp-content/uploads/2024/05/image-57-blog-site-sc4technology-300x70.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-57-blog-site-sc4technology-1024x240.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-57-blog-site-sc4technology-768x180.webp 768w" sizes="(max-width: 1263px) 100vw, 1263px" /></p><p>Good ! We can ping the VM interface, it’s time now to add a floating IP address to that VM so we can ssh into it from any host on the provider network.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17732" src="https://sc4t.com/wp-content/uploads/2024/05/image-58-blog-site-sc4technology.webp" alt="image 58 blog site sc4technology" width="1473" height="392" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-58-blog-site-sc4technology.webp 1473w, https://sc4t.com/wp-content/uploads/2024/05/image-58-blog-site-sc4technology-300x80.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-58-blog-site-sc4technology-1024x273.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-58-blog-site-sc4technology-768x204.webp 768w" sizes="(max-width: 1473px) 100vw, 1473px" /></p><p>We can now assign this Floating IP address (192.168.1.171) to VM55<br />stack@ctl:~$ openstack server add floating ip VM55 192.168.1.171<br />And try to ping this Floating IP address</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17733" src="https://sc4t.com/wp-content/uploads/2024/05/image-59-blog-site-sc4technology.webp" alt="image 59 blog site sc4technology" width="892" height="238" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-59-blog-site-sc4technology.webp 892w, https://sc4t.com/wp-content/uploads/2024/05/image-59-blog-site-sc4technology-300x80.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-59-blog-site-sc4technology-768x205.webp 768w" sizes="(max-width: 892px) 100vw, 892px" /></p><p class="p1">So we can reach VM55 from CTL interface on the provider network, let’s identify the interface name</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17734" src="https://sc4t.com/wp-content/uploads/2024/05/image-60-blog-site-sc4technology.webp" alt="image 60 blog site sc4technology" width="1262" height="340" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-60-blog-site-sc4technology.webp 1262w, https://sc4t.com/wp-content/uploads/2024/05/image-60-blog-site-sc4technology-300x81.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-60-blog-site-sc4technology-1024x276.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-60-blog-site-sc4technology-768x207.webp 768w" sizes="(max-width: 1262px) 100vw, 1262px" /></p><p class="p1">We can now ssh into VM55:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17735" src="https://sc4t.com/wp-content/uploads/2024/05/image-61-blog-site-sc4technology.webp" alt="image 61 blog site sc4technology" width="1224" height="528" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-61-blog-site-sc4technology.webp 1224w, https://sc4t.com/wp-content/uploads/2024/05/image-61-blog-site-sc4technology-300x129.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-61-blog-site-sc4technology-1024x442.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-61-blog-site-sc4technology-768x331.webp 768w" sizes="(max-width: 1224px) 100vw, 1224px" /></p><p class="p1">As this setup is made of just 1 compute node and 1 controller node, let’s check on compute node to identify VM55, go to /var/lib/nova on the compute node</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17736 size-full" src="https://sc4t.com/wp-content/uploads/2024/05/image-62-blog-site-sc4technology.webp" alt="image 62 blog site sc4technology" width="710" height="300" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-62-blog-site-sc4technology.webp 710w, https://sc4t.com/wp-content/uploads/2024/05/image-62-blog-site-sc4technology-300x127.webp 300w" sizes="(max-width: 710px) 100vw, 710px" /></p><p>Let’s check the files in the instance director</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17737" src="https://sc4t.com/wp-content/uploads/2024/05/image-63-blog-site-sc4technology.webp" alt="image 63 blog site sc4technology" width="610" height="94" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-63-blog-site-sc4technology.webp 610w, https://sc4t.com/wp-content/uploads/2024/05/image-63-blog-site-sc4technology-300x46.webp 300w" sizes="(max-width: 610px) 100vw, 610px" /></p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17738" src="https://sc4t.com/wp-content/uploads/2024/05/image-64-blog-site-sc4technology.webp" alt="image 64 blog site sc4technology" width="1088" height="340" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-64-blog-site-sc4technology.webp 1088w, https://sc4t.com/wp-content/uploads/2024/05/image-64-blog-site-sc4technology-300x94.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-64-blog-site-sc4technology-1024x320.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-64-blog-site-sc4technology-768x240.webp 768w" sizes="(max-width: 1088px) 100vw, 1088px" /></p><p>We have a number of subdirectory named after the ID of the instance, let’s check it out: the server creation command for VM55 has returned an ID of b7030d0e-3a62-4fed-aa03-e55e1aa16540, which is listed in the command output above. Change to that directory:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17739" src="https://sc4t.com/wp-content/uploads/2024/05/image-65-blog-site-sc4technology.webp" alt="image 65 blog site sc4technology" width="1088" height="210" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-65-blog-site-sc4technology.webp 1088w, https://sc4t.com/wp-content/uploads/2024/05/image-65-blog-site-sc4technology-300x58.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-65-blog-site-sc4technology-1024x198.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-65-blog-site-sc4technology-768x148.webp 768w" sizes="(max-width: 1088px) 100vw, 1088px" /></p><p>It looks like we have the disk image file and the console output log.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17740" src="https://sc4t.com/wp-content/uploads/2024/05/image-66-blog-site-sc4technology.webp" alt="image 66 blog site sc4technology" width="1388" height="538" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-66-blog-site-sc4technology.webp 1388w, https://sc4t.com/wp-content/uploads/2024/05/image-66-blog-site-sc4technology-300x116.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-66-blog-site-sc4technology-1024x397.webp 1024w, https://sc4t.com/wp-content/uploads/2024/05/image-66-blog-site-sc4technology-768x298.webp 768w" sizes="(max-width: 1388px) 100vw, 1388px" /></p><p>VM55 is running on the compute node, it’s a CirrOS image it can be accessed by ssh on the floating IP 192.168.1.171; from its perspective VM55 believes it is connected to net05 (10.5.5.0/25) with the IP address 10.5.5.213. As a final step let’s check if VM55 can ping google.com:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17741" src="https://sc4t.com/wp-content/uploads/2024/05/image-67-blog-site-sc4technology.webp" alt="image 67 blog site sc4technology" width="818" height="276" srcset="https://sc4t.com/wp-content/uploads/2024/05/image-67-blog-site-sc4technology.webp 818w, https://sc4t.com/wp-content/uploads/2024/05/image-67-blog-site-sc4technology-300x101.webp 300w, https://sc4t.com/wp-content/uploads/2024/05/image-67-blog-site-sc4technology-768x259.webp 768w" sizes="(max-width: 818px) 100vw, 818px" /></p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/openstack-project-lab-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Telco Digital Transformation vs 5G and Cloud open readness</title>
		<link>https://sc4t.com/2023/03/29/telco-digital-transformation-vs-5g-and-cloud-open-readness/</link>
					<comments>https://sc4t.com/2023/03/29/telco-digital-transformation-vs-5g-and-cloud-open-readness/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:21:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=71</guid>

					<description><![CDATA[Service Provider Next Generation Networks and Data Center consideration SC4T plays a central role as an internal enabler toovercome challenges such as breaking with outdated organizationalstructures, the lack of collaboration in the telecommunicationsindustry or the “war of talents” against large industry players.Through innovation, agility and new working concepts, SC4T enables the organization to attract talent [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="71" class="elementor elementor-71" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-72c027f1 e-flex e-con-boxed e-con e-parent" data-id="72c027f1" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-6416be20 elementor-widget elementor-widget-text-editor" data-id="6416be20" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Service Provider Next Generation Networks and Data Center consideration</h3><p>SC4T plays a central role as an internal enabler to<br />overcome challenges such as breaking with outdated organizational<br />structures, the lack of collaboration in the telecommunications<br />industry or the “war of talents” against large industry players.<br />Through innovation, agility and new working concepts, SC4T enables the organization to attract talent and thus become both flexible and resistant to competitors.</p><p>The implementation of such a new work concept means internally to give employees freedom for self-development, for example through high performance teams, and externally for a better customer focus. The applied methodology of SC4T has already been successfully implemented in many companies within the framework of projects. In this way, an organization can transform itself from within and meet the requirements of a continuously changing economic environment.<br />The network infrastructure forms the core asset of every carrier. New technologies and changing market requirements open up new ways to provide the best possible coverage, capacity and quality at the lowest possible cost. SC4T is able to describe ways to achieve efficient, convergent &amp; QoS-based expansion of mobile and fixed network infrastructures.<br />The range of available access technologies is becoming steadily wider. New technologies enable more capacity and coverage at lower cost. 5G and fiber optic networks set the standard and must be introduced.</p><h3><strong>The Network</strong></h3><p>New demand on Digital Transformation requires the construction of area-wide fibre infrastructures and 5G networks. The associated infrastructure expansion is not economically viable for a single carrier and is also ecologically questionable, which is why more and more partnerships, network sharing and heterogeneous networks will emerge in the future.</p><p>SC4T is able to explain technologies for access networks, efficient and demand-oriented planning, different possibilities of infrastructure sharing and the advancing disaggregation.</p><p>The network infrastructure forms the core asset of every carrier. New technologies and changing market requirements open up new ways to provide the best possible coverage, capacity and quality at the lowest possible cost.</p><p>SC4T is able to describe ways to achieve efficient, convergent &amp; QoS-based expansion of mobile and fixed network infrastructures. The possibilities range from new technologies for access networks such as satellites or campus networks, integrated and demand-oriented planning approaches, through the disaggregation of hardware and software in access to the diverse possibilities of cooperation and sharing of infrastructures.</p><p>Use multiple physical fixed and mobile access technologies to provide seamless access for all customers!</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17615 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-11-blog-site-sc4technology.webp" alt="image 11 blog site sc4technology" width="1039" height="469" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-11-blog-site-sc4technology.webp 1039w, https://sc4t.com/wp-content/uploads/2024/02/image-11-blog-site-sc4technology-300x135.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-11-blog-site-sc4technology-1024x462.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-11-blog-site-sc4technology-768x347.webp 768w" sizes="(max-width: 1039px) 100vw, 1039px" /></p><p>The range of available access technologies is becoming steadily wider. New technologies enable more capacity and coverage at lower cost. 5G and fiber optic networks set the standard and must be introduced. Complementary technologies can be used to extend the range, e.g. heterogeneous networks or satellites, and to enable private solutions, e.g. 5G campus networks.</p><p>“Access Disaggregation, the separation of hardware and software in the access network, enables more flexible and vendor-independent design of the network”</p><p>Migrate from integrated vendor specific black boxes with proprietary interfaces to standard white boxes with open interfaces and separation of data and control plane. Disaggregation allows operators to mix and match equipment to enable faster time-to-market and flexible customized networks.</p><p>Disaggregation is applicable in the mobile radio network (ORAN) but also in the fixed network (SEBA [SDN-enabled Broadband access]). Access 4.0 provides a concrete example of Fixed Access Disaggregation and works with vEPC for 5G Next Generation networks.</p><p>SC4T developed the Best Practice for Telco Operator to address several Migration Projects from Network Access (vRAN or O-RAN) to Edge, MEC, Central and Core Networks with vEPC structure using more than 10000 network devices, two or three Telco Hybrid Cloud in several Data Centers, over 5000 cabinets, Cyber Security structure and over 2500 physical Servers, running VMware and OpenStack with over 50000 Virtual Machine Applications using Kubernets, Docker, and several Vendors like Cisco, Ericsson, Altiostar, Mavenir.</p><h3><strong>The Services for Telcos</strong></h3><p><img loading="lazy" decoding="async" class="alignnone wp-image-17617 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology.webp" alt="image 12 blog site sc4technology" width="750" height="750" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology.webp 750w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-300x300.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-150x150.webp 150w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-70x70.webp 70w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-302x302.webp 302w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-84x84.webp 84w, https://sc4t.com/wp-content/uploads/2024/02/image-12-blog-site-sc4technology-130x130.webp 130w" sizes="(max-width: 750px) 100vw, 750px" /></p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of OTN Optical Transport Network with WDM/DWDM designing architecture for IP Converged Packet and optical transportation,</p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of IP Core, vEPC Architecture,</p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of Metro / Regional IP EDGE, RDG, CDN, TIR,</p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of Enhanced WIFI,</p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of vRAN and O-RAN Radio Access Network ,</p><p>&#8211; Supporting Design, Development, Configure, Testing and implementation of IP network automation solutions on Cisco NSO platform,</p><p>&#8211; SC4T Best Practice includes Designing Project and Validation Documents, drawn up according to an omnibus-comprehensive Blueprint:</p><p>&#8211; Network, Security, Data Center &amp; Routing Audit,</p><p>&#8211; Telcos IP Core network assessment,</p><p>&#8211; Migration plan to Telco Cloud on different data centers including VxLAN Multi Hybrid Cloud,</p><p>&#8211; DETAILED DESIGN REPORT: Segment Routing, EVPN, Traffic Engineering, etc.</p><p>&#8211; Functionality (QoS, BGPFlowSpec, TWAMP, Telemetry),</p><p>&#8211; Network and / or control elements (collection network, PCE controller, etc.),</p><p>&#8211; Automation of procedures and security configuration supplied with the IPSecurity Service Chain solution for the protection of 4G and 5G radio backhauling,</p><p>&#8211; Design and implementation of Cisco NSO Network Orchestrator services with configuration template,</p><p>&#8211; Development of automation use cases on the components of the Cisco NSO platform through the Devops development model: iterations and analysis of requirements, development, testing, preparation of packages ready for deployment on operating platforms. Developments include xml templates and YANG templates and Python or Java code for managing the use of templates,</p><p>&#8211; Segment Routing on IP Core network for migration to TelcCloud with 5G vEPC services,</p><p>&#8211; Traffic Engineering on IP Core network,</p><p>&#8211; Integration and validation of vCDN overlay services,</p><p>&#8211; Support for Virtualization of Route Reflector functions on NFVi platform,</p><p>&#8211; Support for the definition and implementation of a new interconnection architecture with national peers,</p><p>&#8211; Support for the design of the MEC 5G structure,</p><p>&#8211; Support for the design of the Remote Radio Unit structure.</p><p>&#8211; Support for the design of the disaggregated MultiBase Band unit structure for Radio Open Radio Access Network and vRAN with Cisco, Mavenir and Altiostar,</p><p>&#8211; Architectural support of connectivity towards control elements (eg Route Reflector) of the POPs of the IP backbone,</p><p>&#8211; Support for the introduction and evolution of Nexus ACI Data Centers in Telco Clouds for migration to the Next Generation network and integration with VMWARE NSX,</p><p>&#8211; Support for the redesign of Segment Routing architectures on the Metro / Regional Network,</p><p>&#8211; Support for the design of TE Segment Routing architectures on Cisco ASR9K and NCS560 / ASR907XR Metro / Regional Network,</p><p>&#8211; Support for the design of the EVPN Anycast GW Cisco ASR9K and NCS560 / ASR907 XR architectures,</p><p>&#8211; Support for the validation of QoS architectures,</p><p>&#8211; Support for the design of PTP / syncE architectures,</p><p>&#8211; Support for the design and planning of Segment Routing architectures on IP Edge network,</p><p>&#8211; Support for the design and planning of virtualized Security architectures in Service Chain from O-RAN to IP Core 5G,</p><p>&#8211; Support for the design and design of access networks and vCPE definition of the Enterprise customers of Telcos, Virtualization of Services and design of configurations for virtualized services in vCPE,</p><p>&#8211; Support in the definition of Configuration Best Practices and Design Collaboration / Consultation / Review for the platform devices (ASR9k, ASR1k, ISG, WLC, FW, UCS) and the WiFi and wired networks of Telco customers. Definition of integrated platforms for the transport of customers’ wireless networks in the IP Core Telco network,</p><p>After having built the Openstack infrastructure on our MacBookPro it’s time now to operate it and illustrate how to define networks, subnets, images and instances. As you might remember we have a the following setup :</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17618 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology.webp" alt="image 13 blog site sc4technology" width="1638" height="664" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology.webp 1638w, https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology-300x122.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology-1024x415.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology-768x311.webp 768w, https://sc4t.com/wp-content/uploads/2024/02/image-13-blog-site-sc4technology-1536x623.webp 1536w" sizes="(max-width: 1638px) 100vw, 1638px" /></p><p>Our goal is to create and launch an instance on this infrastructure: this VM will be connected to a VXLAN network with a specific IP address space but will be reachable through an IP address published on the External network. The VM will be able to access the Internet through a virtual router defined in the Openstack infrastructure. In order to properly setup the target environment we will need to define some components as network administrator while some others need to be defined at the user level (the user that will own the VM and run application on it). So let’s define 2 shell scripts to ease switching from the admin to the user role :<br />stack@ctl:~$ cat admin-openrc<br />export OS_PROJECT_DOMAIN_NAME=Default<br />export OS_USER_DOMAIN_NAME=Default<br />export OS_PROJECT_NAME=admin export OS_USERNAME=admin<br />export OS_PASSWORD=stack$<br />export OS_AUTH_URL=http://ctl:5000/v3<br />export OS_IDENTITY_API_VERSION=3<br />export OS_IMAGE_API_VERSION=2</p><p>stack@ctl:~$ cat demo-openrc<br />export OS_PROJECT_DOMAIN_NAME=Default<br />export OS_USER_DOMAIN_NAME=Default<br />export OS_PROJECT_NAME=myproject<br />export OS_USERNAME=myuser<br />export OS_PASSWORD=stack$<br />export OS_AUTH_URL=http://ctl:5000/v3<br />export OS_IDENTITY_API_VERSION=3<br />export OS_IMAGE_API_VERSION=2</p><p>Now let’s check our infrastructure to verify that the prerequisites are in place. This has to be checked as an admin user, hence:<br />stack@ctl:~$ . admin-openrc<br />stack@ctl:~$ openstack endpoint list</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17619 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-14-blog-site-sc4technology.webp" alt="image 14 blog site sc4technology" width="1377" height="467" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-14-blog-site-sc4technology.webp 1377w, https://sc4t.com/wp-content/uploads/2024/02/image-14-blog-site-sc4technology-300x102.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-14-blog-site-sc4technology-1024x347.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-14-blog-site-sc4technology-768x260.webp 768w" sizes="(max-width: 1377px) 100vw, 1377px" /></p><p>The endpoints needed for the different Openstack modules to communicate between them are properly setup.</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17620 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-15-blog-site-sc4technology.webp" alt="image 15 blog site sc4technology" width="1531" height="394" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-15-blog-site-sc4technology.webp 1531w, https://sc4t.com/wp-content/uploads/2024/02/image-15-blog-site-sc4technology-300x77.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-15-blog-site-sc4technology-1024x264.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-15-blog-site-sc4technology-768x198.webp 768w" sizes="(max-width: 1531px) 100vw, 1531px" /></p><p>The network agents and compute services are up and running And Nova is providing the needed resources to launch a VM.<br />Let’s check if we already have some networks defined</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17621 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-16-blog-site-sc4technology.webp" alt="image 16 blog site sc4technology" width="1016" height="222" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-16-blog-site-sc4technology.webp 1016w, https://sc4t.com/wp-content/uploads/2024/02/image-16-blog-site-sc4technology-300x66.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-16-blog-site-sc4technology-768x168.webp 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></p><p>It looks like we have a few networks defined, the “provider” network is the one that is connecting to the external world and this is where the floating ip addresses will be defined. This provider network has been created with the following command:<br />openstack network create &#8211;share &#8211;external &#8211;provider-physical-network provider —provider-network-type flat provider</p><p>The net0x networks are VXLAN networks that were created previously. The related subnets (in Openstack a subnet is essentially an IP address space) are listed below:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17622 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-17-blog-site-sc4technology.webp" alt="image 17 blog site sc4technology" width="1210" height="218" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-17-blog-site-sc4technology.webp 1210w, https://sc4t.com/wp-content/uploads/2024/02/image-17-blog-site-sc4technology-300x54.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-17-blog-site-sc4technology-1024x184.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-17-blog-site-sc4technology-768x138.webp 768w" sizes="(max-width: 1210px) 100vw, 1210px" /></p><p>Creating the VXLAN where to launch the VM is a 2 step process: at first we will generate the “physical network” and then we’ll associate an IP address space to it. This has to be completed as a user so we will need to source the right credentials:</p><p>stack@ctl:~$ . demo-openr</p><p>Let’s create the network net05</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17623 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology.webp" alt="image 18 blog site sc4technology" width="1626" height="620" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology.webp 1626w, https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology-300x114.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology-1024x390.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology-768x293.webp 768w, https://sc4t.com/wp-content/uploads/2024/02/image-18-blog-site-sc4technology-1536x586.webp 1536w" sizes="(max-width: 1626px) 100vw, 1626px" /></p><p>We have now a new network as outlined by:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17624 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-19-blog-site-sc4technology.webp" alt="image 19 blog site sc4technology" width="1358" height="284" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-19-blog-site-sc4technology.webp 1358w, https://sc4t.com/wp-content/uploads/2024/02/image-19-blog-site-sc4technology-300x63.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-19-blog-site-sc4technology-1024x214.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-19-blog-site-sc4technology-768x161.webp 768w" sizes="(max-width: 1358px) 100vw, 1358px" /></p><p>We can now associate an IP address space to net05 by creating an Openstack subnet:<br />stack@ctl:~$ openstack subnet create &#8211;network net05 \<br />&gt; &#8211;dns-nameserver 8.8.4.4 &#8211;gateway 10.5.5.1 \<br />&gt; &#8211;subnet-range 10.5.5.1/24 subnet05</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17625 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology.webp" alt="image 20 blog site sc4technology" width="1630" height="530" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology.webp 1630w, https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology-300x98.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology-1024x333.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology-768x250.webp 768w, https://sc4t.com/wp-content/uploads/2024/02/image-20-blog-site-sc4technology-1536x499.webp 1536w" sizes="(max-width: 1630px) 100vw, 1630px" /></p><p>We now have a subnet associated with the net05 network:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17626 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-21-blog-site-sc4technology.webp" alt="image 21 blog site sc4technology" width="1367" height="283" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-21-blog-site-sc4technology.webp 1367w, https://sc4t.com/wp-content/uploads/2024/02/image-21-blog-site-sc4technology-300x62.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-21-blog-site-sc4technology-1024x212.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-21-blog-site-sc4technology-768x159.webp 768w" sizes="(max-width: 1367px) 100vw, 1367px" /></p><p>And by listing the subnet we can see the Ip address space associated:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17627 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology.webp" alt="image 22 blog site sc4technology" width="1615" height="280" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology.webp 1615w, https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology-300x52.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology-1024x178.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology-768x133.webp 768w, https://sc4t.com/wp-content/uploads/2024/02/image-22-blog-site-sc4technology-1536x266.webp 1536w" sizes="(max-width: 1615px) 100vw, 1615px" /></p><p>Note that creating a new subnet translates into creating a new namespace in the Linux host, hence the output of the ip nets commands permits to relate the subnet just created to the specific namespace. (id: 6 namespace is composed by qdhcp + Openstack network ID relative to net05)</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17631 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-23-blog-site-sc4technology.webp" alt="image 23 blog site sc4technology" width="794" height="238" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-23-blog-site-sc4technology.webp 794w, https://sc4t.com/wp-content/uploads/2024/02/image-23-blog-site-sc4technology-300x90.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-23-blog-site-sc4technology-768x230.webp 768w" sizes="(max-width: 794px) 100vw, 794px" /></p><p>We can now proceed to launch our VM on net05, but before that we can check the flavor (type of virtual hardware) and images available</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17632 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-24-blog-site-sc4technology.webp" alt="image 24 blog site sc4technology" width="993" height="446" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-24-blog-site-sc4technology.webp 993w, https://sc4t.com/wp-content/uploads/2024/02/image-24-blog-site-sc4technology-300x135.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-24-blog-site-sc4technology-768x345.webp 768w" sizes="(max-width: 993px) 100vw, 993px" /></p><p>We need two additional parameters before creating the VM: the keypair is used to connect to the VM via ssh without the need for a user password and the security group is used to enable ssh and ICMP through the default iptables created at launch time. As this is a network created for a specific user we need to source the right credentials<br />stack@ctl:~$ . demo-openr</p><p>And the create the security group and the key pair<br />stack@ctl:~$ openstack security group rule create &#8211;proto tcp &#8211;dst-port 22 default<br />stack@ctl:~$ openstack security group rule create &#8211;proto icmp default<br />stack@ctl:~$ ssh-keygen -q -N “&#8221;<br />openstack keypair create &#8211;public-key ~/.ssh/id_rsa.pub keyA</p><p>We can now create and run an instance on this network</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17633 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-25-blog-site-sc4technology.webp" alt="image 25 blog site sc4technology" width="1448" height="850" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-25-blog-site-sc4technology.webp 1448w, https://sc4t.com/wp-content/uploads/2024/02/image-25-blog-site-sc4technology-300x176.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-25-blog-site-sc4technology-1024x601.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-25-blog-site-sc4technology-768x451.webp 768w" sizes="(max-width: 1448px) 100vw, 1448px" /></p><p>Take note of the id (b7030d0e-3a62-4fed-aa03-e55e1aa16540) of this server as we will use it later. We now have an additional VM: VM55 with IP address 10.5.5.213.</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17634 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-26-blog-site-sc4technology.webp" alt="image 26 blog site sc4technology" width="1368" height="259" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-26-blog-site-sc4technology.webp 1368w, https://sc4t.com/wp-content/uploads/2024/02/image-26-blog-site-sc4technology-300x57.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-26-blog-site-sc4technology-1024x194.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-26-blog-site-sc4technology-768x145.webp 768w" sizes="(max-width: 1368px) 100vw, 1368px" /></p><p>Now to enable this VM to access the Internet we need to connect it to a router that will provide connectivity between net05 and the provider network.<br />So let’s try to see if we have a router for that:</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17635 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-27-blog-site-sc4technology.webp" alt="image 27 blog site sc4technology" width="1357" height="160" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-27-blog-site-sc4technology.webp 1357w, https://sc4t.com/wp-content/uploads/2024/02/image-27-blog-site-sc4technology-300x35.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-27-blog-site-sc4technology-1024x121.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-27-blog-site-sc4technology-768x91.webp 768w" sizes="(max-width: 1357px) 100vw, 1357px" /></p><p>We need to check if r01 has an interface on network net05 and if not we need to add that interface to r01. This can be checked by looking at the details of router r01 through the command<br />stack@ctl:~$ openstack router show r01<br />Unfortunately the output of this command is not easy to read, I prefer to look at the associated namespace</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17639 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-28-blog-site-sc4technology.webp" alt="image 28 blog site sc4technology" width="1297" height="316" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-28-blog-site-sc4technology.webp 1297w, https://sc4t.com/wp-content/uploads/2024/02/image-28-blog-site-sc4technology-300x73.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-28-blog-site-sc4technology-1024x249.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-28-blog-site-sc4technology-768x187.webp 768w" sizes="(max-width: 1297px) 100vw, 1297px" /></p><p>So there is no interface on r01 for net05, let’s add one</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17640 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-29-blog-site-sc4technology.webp" alt="image 29 blog site sc4technology" width="1326" height="162" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-29-blog-site-sc4technology.webp 1326w, https://sc4t.com/wp-content/uploads/2024/02/image-29-blog-site-sc4technology-300x37.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-29-blog-site-sc4technology-1024x125.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-29-blog-site-sc4technology-768x94.webp 768w" sizes="(max-width: 1326px) 100vw, 1326px" /></p><p>Router r01 now has an interface on net05, hence we can try to ping the VM from that interface:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17641" src="https://sc4t.com/wp-content/uploads/2024/02/image-30-blog-site-sc4technology.webp" alt="image 30 blog site sc4technology" width="1263" height="296" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-30-blog-site-sc4technology.webp 1263w, https://sc4t.com/wp-content/uploads/2024/02/image-30-blog-site-sc4technology-300x70.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-30-blog-site-sc4technology-1024x240.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-30-blog-site-sc4technology-768x180.webp 768w" sizes="(max-width: 1263px) 100vw, 1263px" /></p><p>Good ! We can ping the VM interface, it’s time now to add a floating IP address to that VM so we can ssh into it from any host on the provider network.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17643" src="https://sc4t.com/wp-content/uploads/2024/02/image-31-blog-site-sc4technology.webp" alt="image 31 blog site sc4technology" width="1473" height="392" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-31-blog-site-sc4technology.webp 1473w, https://sc4t.com/wp-content/uploads/2024/02/image-31-blog-site-sc4technology-300x80.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-31-blog-site-sc4technology-1024x273.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-31-blog-site-sc4technology-768x204.webp 768w" sizes="(max-width: 1473px) 100vw, 1473px" /></p><p>We can now assign this Floating IP address (192.168.1.171) to VM55<br />stack@ctl:~$ openstack server add floating ip VM55 192.168.1.171<br />And try to ping this Floating IP address</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17644" src="https://sc4t.com/wp-content/uploads/2024/02/image-32-blog-site-sc4technology.webp" alt="image 32 blog site sc4technology" width="892" height="238" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-32-blog-site-sc4technology.webp 892w, https://sc4t.com/wp-content/uploads/2024/02/image-32-blog-site-sc4technology-300x80.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-32-blog-site-sc4technology-768x205.webp 768w" sizes="(max-width: 892px) 100vw, 892px" /></p><p>So we can reach VM55 from CTL interface on the provider network, let’s identify the interface name</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17645" src="https://sc4t.com/wp-content/uploads/2024/02/image-33-blog-site-sc4technology.webp" alt="image 33 blog site sc4technology" width="1262" height="340" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-33-blog-site-sc4technology.webp 1262w, https://sc4t.com/wp-content/uploads/2024/02/image-33-blog-site-sc4technology-300x81.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-33-blog-site-sc4technology-1024x276.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-33-blog-site-sc4technology-768x207.webp 768w" sizes="(max-width: 1262px) 100vw, 1262px" /></p><p>We can now ssh into VM55:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17646" src="https://sc4t.com/wp-content/uploads/2024/02/image-34-blog-site-sc4technology.webp" alt="image 34 blog site sc4technology" width="1224" height="528" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-34-blog-site-sc4technology.webp 1224w, https://sc4t.com/wp-content/uploads/2024/02/image-34-blog-site-sc4technology-300x129.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-34-blog-site-sc4technology-1024x442.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-34-blog-site-sc4technology-768x331.webp 768w" sizes="(max-width: 1224px) 100vw, 1224px" /></p><p class="p1">As this setup is made of just 1 compute node and 1 controller node, let’s check on compute node to identify VM55, go to /var/lib/nova on the compute node</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17647" src="https://sc4t.com/wp-content/uploads/2024/02/image-35-blog-site-sc4technology.webp" alt="image 35 blog site sc4technology" width="710" height="300" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-35-blog-site-sc4technology.webp 710w, https://sc4t.com/wp-content/uploads/2024/02/image-35-blog-site-sc4technology-300x127.webp 300w" sizes="(max-width: 710px) 100vw, 710px" /></p><p>Let’s check the files in the instance director</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17648" src="https://sc4t.com/wp-content/uploads/2024/02/image-36-blog-site-sc4technology.webp" alt="image 36 blog site sc4technology" width="1088" height="340" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-36-blog-site-sc4technology.webp 1088w, https://sc4t.com/wp-content/uploads/2024/02/image-36-blog-site-sc4technology-300x94.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-36-blog-site-sc4technology-1024x320.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-36-blog-site-sc4technology-768x240.webp 768w" sizes="(max-width: 1088px) 100vw, 1088px" /></p><p>We have a number of subdirectory named after the ID of the instance, let’s check it out: the server creation command for VM55 has returned an ID of b7030d0e-3a62-4fed-aa03-e55e1aa16540, which is listed in the command output above. Change to that directory:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17649" src="https://sc4t.com/wp-content/uploads/2024/02/image-37-blog-site-sc4technology.webp" alt="image 37 blog site sc4technology" width="1088" height="210" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-37-blog-site-sc4technology.webp 1088w, https://sc4t.com/wp-content/uploads/2024/02/image-37-blog-site-sc4technology-300x58.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-37-blog-site-sc4technology-1024x198.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-37-blog-site-sc4technology-768x148.webp 768w" sizes="(max-width: 1088px) 100vw, 1088px" /></p><p>It looks like we have the disk image file and the console output log.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17650" src="https://sc4t.com/wp-content/uploads/2024/02/image-38-blog-site-sc4technology.webp" alt="image 38 blog site sc4technology" width="1388" height="538" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-38-blog-site-sc4technology.webp 1388w, https://sc4t.com/wp-content/uploads/2024/02/image-38-blog-site-sc4technology-300x116.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-38-blog-site-sc4technology-1024x397.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-38-blog-site-sc4technology-768x298.webp 768w" sizes="(max-width: 1388px) 100vw, 1388px" /></p><p>VM55 is running on the compute node, it’s a CirrOS image it can be accessed by ssh on the floating IP 192.168.1.171; from its perspective VM55 believes it is connected to net05 (10.5.5.0/25) with the IP address 10.5.5.213. As a final step let’s check if VM55 can ping google.com:</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17651" src="https://sc4t.com/wp-content/uploads/2024/02/image-39-blog-site-sc4technology.webp" alt="image 39 blog site sc4technology" width="818" height="276" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-39-blog-site-sc4technology.webp 818w, https://sc4t.com/wp-content/uploads/2024/02/image-39-blog-site-sc4technology-300x101.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-39-blog-site-sc4technology-768x259.webp 768w" sizes="(max-width: 818px) 100vw, 818px" /></p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/telco-digital-transformation-vs-5g-and-cloud-open-readness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Openstack Project Lab #2</title>
		<link>https://sc4t.com/2023/03/29/openstack-project-lab-2/</link>
					<comments>https://sc4t.com/2023/03/29/openstack-project-lab-2/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:20:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=69</guid>

					<description><![CDATA[Installing Openstack Train on MacOS part #2 As a follow up to the previous post on installing the Train Release in a virtual environment on a MacBook Pro, here are the configuration steps needed. I will detail the general procedure to install the different modules highlighting where specific care is needed to overcome some not [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="69" class="elementor elementor-69" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-891a328 e-flex e-con-boxed e-con e-parent" data-id="891a328" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-28a4d17e elementor-widget elementor-widget-text-editor" data-id="28a4d17e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Installing Openstack Train on MacOS part #2</h3><p class="mb_30">As a follow up to the previous post on installing the Train Release in a virtual environment on a MacBook Pro, here are the configuration steps needed. I will detail the general procedure to install the different modules highlighting where specific care is needed to overcome some not so clear instructions in the official documentation.<br />We will install the following modules which are needed to launch an instance in the virtual environment and connect it to the external network (or to the Internet in our case).</p><p>&#8211; Keystone<br />&#8211; Glance<br />&#8211; Placement <br />&#8211; Nova<br />&#8211; Neutron <br />&#8211; Horizon</p><p>Keystone is needed to provide centralized identity service authentication and authorization, Glance is the image service that enables you to create a set of OS images that can be loaded on an instance as needed, Placement is used to track resource (compute nodes, storage pools, IP allocation pools,…) inventories and usages, Nova provides the tools to provision compute instances (aka virtual servers) while Neutron is needed to build the virtual networks where these instances will run and to provide connectivity to external networks. Finally Horizon is a web based GUI that provides an easy way to interact with the system.</p><p>Actually before installing these modules there are some prerequisites that needs to be satisfied.<br />I have already highlighted the MariaDB release needed; other modules that need to be installed are :</p><p>&#8211; Chrony: NTP client/server to sync time across the different nodes</p><p>&#8211; Memcached: Keystone uses Memcached to cache authorization tokens</p><p>&#8211; Rabbitmq (Message Queue): used to coordinate operations and status information among services.</p><p>&#8211; Etcd: a distributed reliable key-value store used for distributed key locking, storing configuration, keeping track of service live-ness and other scenarios.</p><p>Typically these services are run on the controller node.<br />Finally, on all nodes participating in the OpenStack Cloud (Controller, Compute, Storage, Network) the OpenStack Packages are to be installed.<br />The installation of these prerequisites is rather smooth and you can safely follow the procedure described in the official documentation. <br />There are a number of PASSWORDs that needs to be defined for the different services that will be run: the documentation provides an easy to follow schema of what is needed and where. For the sake of simplicity in this install I have chosen to use a single, unique password set to PASSWORD.</p><p>There is a very similar pattern in installing the different OpenStack Module. The main difference to consider is understanding which modules need to be installed in the Controller and which modules need to be installed on the other nodes (Compute, Networks, Storage,…). <br />For modules that needs to be installed in the controller node the pattern can be summarized as follow:</p><p>&#8211; Create the Database (which will store all the service related related objects)</p><p>&#8211; Source the proper credentials (admin)</p><p>&#8211; Create the User, Role, Service and endpoints for the specific service</p><p>&#8211; Edit the configuration files</p><p>&#8211; Populate the Database</p><p>&#8211; Restart the Service.</p><p>That being said you can safely follow the installation instruction for Keystone and Glance on the official OpenStack documentation. Same goes for Placement with a small hiccup : be aware that in order to verify the proper installation by running the following :</p><p>$ placement-status upgrade check</p><p>you need to explicitly specify the location of the configuration file (placement.conf) with the flag &#8211;config-file</p><p>Once you are done with these 3 basic services you can jump to the Nova and Neutron Modules which need to be installed on BOTH the Controller and Compute Nodes.<br />Let’s start with installing Nova on the Controller node. Proceed in the usual way creating the Database, the service credentials (user, role, service) and endpoints as detailed here. When editing the main configuration file (/etc/nova/nova.conf) the my_ip parameter under the [DEFAULT] stanza has to be set to the value of the Management interface for the controller node, in our case this value is 10.0.1.36/24. <br />Furthermore the nova.conf file has to include a specific stanza referring to the Neutron service. I found a bit confusing to jump from Nova documentation to the Neutron one, so I’m attaching the typical stanza that needs to be added to the nova.conf file.</p><p>[neutron]<br />auth_url = http://CTL:5000<br />auth_type = password<br />project_domain_name = default<br />user_domain_name = default<br />region_name = RegionOne<br />project_name = service<br />username = neutron<br />password = PASSWORD<br />service_metadata_proxy = true<br />metadata_proxy_shared_secret = PASSWORD</p><p>You can now proceed with the other usual configuration steps.</p><p>As said, Nova needs to be installed on the Compute nodes as well. The procedure is slightly different as this time you just need to install the compute node components and configure the /etc/nova/nova.conf file. Again the my_ip parameter under the [DEFAULT] stanza has to be set to the value of the Management interface for the compute node, in our case this value is 10.0.1.16/24. The same goes for the Neutron section which has to be included and looks like the following</p><p>[neutron]<br />auth_url = http://CTL:5000<br />auth_type = password<br />project_domain_name = default<br />user_domain_name = default<br />region_name = RegionOne<br />project_name = service<br />username = neutron<br />password = PASSWORD</p><p>Next up is Neutron Installation. As with Nova the installation is split between the Controller and Compute Node. You can follow the install instructions here. The usual installation steps apply for Neutron on the Controller node, but again you need to carefully edit a few configuration files. Much like previously, the /etc/neutron/neutron.conf file includes a stanza referring to the Nova setup:</p><p>[nova]<br />auth_url = http://CTL:5000<br />auth_type = password<br />project_domain_name = default<br />user_domain_name = default<br />region_name = RegionOne<br />project_name = service<br />username = nova<br />password = PASSWORD</p><p>Furthermore the [DEFAULT] stanza includes service_plugins parameter which allows you to specify the kind of functionalities that you want to get out of Neutron (in our case L3 routing by using keyword router, or qos for quality of service,…)</p><p>[DEFAULT]<br />service_plugins = router</p><p>With Neutron you need to edit a couple of more files. These are the /etc/neutron/plugins/ml2/ml2_conf.ini and the /etc/neutron/plugins/ml2/linuxbridge_agent.ini files.<br />The ML2 plug-in uses the Linux bridge mechanism to build layer-2 (bridging and switching) virtual networking infrastructure for instances. <br />The ml2_conf.ini will look like</p><p>[DEFAULT]<br />[ml2]<br />type_drivers = flat,vlan,vxlan<br />tenant_network_types = vxlan<br />mechanism_drivers = linuxbridge,l2population<br />extension_drivers = port_security</p><p>[ml2_type_flat]<br />flat_networks = provider</p><p>[ml2_type_geneve]<br />[ml2_type_gre]<br />[ml2_type_vlan]<br />network_vlan_ranges = provider</p><p>[ml2_type_vxlan]<br />vni_ranges = 1:1000</p><p>[ovs_driver]<br />[securitygroup]<br />enable_ipset = true<br />[sriov_driver]</p><p>The type_drivers parameter enables to specify which type of network can be created by neutron, the tenant_network_types specifies the kind of network that will be used by tenants (self-service networks created by non privileged users). The mechanism_drivers specifies the OpenStack drivers that will provide virtual bridging capabilities (linuxbridge) and optimize BUM (Broadcast, Unknown and Multicast) traffic (l2population).</p><p>The Linux bridge agent builds layer-2 (bridging and switching) virtual networking infrastructure for instances and handles security groups <br />Edit the file /etc/neutron/plugins/ml2/linuxbridge_agent.ini to reflect the following:</p><p>[DEFAULT]<br />[agent]<br />[linux_bridge]<br />physical_interface_mappings = provider:ens38</p><p>[network_log]</p><p>[securitygroup]<br />enable_security_group = true<br />firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver</p><p>[vxlan]<br />enable_vxlan = true<br />local_ip = 200.1.1.14<br />l2_population = true</p><p>The physical_interface_mappings parameter handles the connection between the physical interface (ens38) and the logical name of the network (provider) that will be used to create a flat network type (see the ml2_conf.ini file). Basically this tells that interface ens38 will provide a physical connection to the flat network named “provider”.  The local_ip = 200.1.1.14 parameter specifies the source of the VXLAN network (VTEP) that will be used by tenants. <br />At this point you need to edit &amp; configure 2 additional files to provide L3 routing and DHCP capabilities for virtual instances launched on the tenant network in this OpenStack deployment.</p><p>Edit the file /etc/neutron/l3_agent.ini to reflect the following:</p><p>[DEFAULT]<br />interface_driver = linuxbridge<br />[agent]<br />[network_log]<br />[ovs]</p><p>Edit the file /etc/neutron/dhcp_agent.ini to reflect the following :  </p><p>[DEFAULT]<br />interface_driver = linuxbridge<br />dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq<br />enable_isolated_metadata = true</p><p>We can now proceed to set Neutron in the compute Node. We just need to install the Neutron component for the compute node as specified here. In order for the compute node to properly interface with the Neutron infrastructure the file /etc/neutron/plugins/ml2/ml2_conf.ini will have to look like:</p><p>[DEFAULT]<br />[agent]<br />[linux_bridge]<br />physical_interface_mappings = provider:ens38</p><p>[network_log]</p><p>[securitygroup]<br />enable_security_group = true<br />firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver</p><p>[vxlan]<br />enable_vxlan = true<br /># VXLAN tunnel source<br />local_ip = 200.1.1.2<br />l2_population = true</p><p>At this point, if everything has been properly configured, you should be able to operate your setup by creating a virtual machine flavor (template defining the amount of CPU, RAM, Disk,…)and launching that instance on a previously create tenant (VXLAN) network.</p><p>I will outline the required commands to interact and operate the OpenStack infrastructure in another post.</p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/openstack-project-lab-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Openstack Project Lab #1</title>
		<link>https://sc4t.com/2023/03/29/openstack-project-lab-1/</link>
					<comments>https://sc4t.com/2023/03/29/openstack-project-lab-1/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:18:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=67</guid>

					<description><![CDATA[Installing Openstack Train on MacOS part#1 As a side effort on an Openstack project I was involved I decided to install Openstack Train on my Mac. It was a great learning experience as I had to face multiple compatibility issues between the different environments. So let me dig into the details: I have a MacBookPro [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="67" class="elementor elementor-67" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-1797e270 e-flex e-con-boxed e-con e-parent" data-id="1797e270" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-54b232da elementor-widget elementor-widget-text-editor" data-id="54b232da" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Installing Openstack Train on MacOS part#1</h3><p>As a side effort on an Openstack project I was involved I decided to install Openstack Train on my Mac. It was a great learning experience as I had to face multiple compatibility issues between the different environments.</p><p>So let me dig into the details: <br />I have a MacBookPro with 32Gb RAM running Catalina 10.15.1, my virtual environment is based on VMware Fusion (version 11.5.1 which, as far as I know, is the one needed with Catalina).<br />I started by generating 2 virtual machines under Fusion, both running Ubuntu 18.04.03 server. Each VM is equipped with 3 virtual interfaces, more details on their role will be provided later.<br />I verified that the VMs were up and running and had Internet<br />connectivity so I could start installing the Openstack Train release.<br />At this point I encountered the first issue which, unfortunately, would have shown up only later while I was struggling to debug the<br />environment.</p><p>As usual, the connection from my Mac to the LAN and up to the Internet was through the WiFi interface. I never had any problem before even with different virtual environments so that was the natural choice.<br />Unfortunately, as I discovered later, when trying to debug the reason why the openstack ports did not transition to the active state,</p><p>Openstack under Fusion on a Mac doesn’t like WiFi!</p><p>So if you want to test this environment yourself, I suggest you start<br />from the very beginning with a wired ethernet connection: you will need an USB-C/Ethernet connector for your Mac which is easily available though Amazon.</p><p>So the setup will be:<br />&#8211; 1 Mac with enough memory (at least 16GB) running Catalina 10.15.1<br />&#8211; A wired Ethernet connection from the Mac to switch/router providing<br />&#8211; Internet access<br />&#8211; WMware Fusion 11.5.1<br />&#8211; 2 VMs under Fusion each running Ubuntu server 18.04LTS equipped with 3<br />&#8211; NICs, 2vCPUs, 4GB RAM</p><p>At this point you can start to setup the TRAIN environment by following the Openstack Installation Guide for the community edition (https://docs.openstack.org/train/#install-guides).</p><p>Another hiccups you need to be aware of: the Ubuntu distribution<br />includes MariaDB version 10.1.<br />Again, it took me a while to discover that Train requires MariaDB to be at least version 10.3 or greater. So upgrade your MariaDB before<br />starting to install and configure Openstack modules.<br />Follow this link for instructions on upgrading MariaDB.<br />You can follow the instructions on the official Openstack Docs but be aware there are a few inconsistencies that require some specific workarounds. I will detail the main configuration files in a following<br />post.<br />What I believe you need to fully digest is the networking model that<br />Openstack is based on and that is detailed in the following picture.</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17601 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-5-blog-site-sc4technology.webp" alt="image 5 blog site sc4technology" width="1378" height="718" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-5-blog-site-sc4technology.webp 1378w, https://sc4t.com/wp-content/uploads/2024/02/image-5-blog-site-sc4technology-300x156.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-5-blog-site-sc4technology-1024x534.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-5-blog-site-sc4technology-768x400.webp 768w" sizes="(max-width: 1378px) 100vw, 1378px" /></p><p>Each VM under Fusion has 3 network interfaces named:<br />&#8211; ens33<br />&#8211; ens38<br />&#8211; ens39</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17602 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-6-blog-site-sc4technology.webp" alt="image 6 blog site sc4technology" width="631" height="302" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-6-blog-site-sc4technology.webp 631w, https://sc4t.com/wp-content/uploads/2024/02/image-6-blog-site-sc4technology-300x144.webp 300w" sizes="(max-width: 631px) 100vw, 631px" /></p><p>in Fusion terminology. The first one, ens33 is used to connect to the<br />Management Network (10.0.1.0/24) and it is set a as “host only” network adapter.<br />The same config is valid for the other VM, where again the first interface ens33 is set as “host only” and assigned to the same management network (10.0.1.0/24). Fusion enables connectivity between these 2 interfaces so you can ping them and ensure they see each other.</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17603 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-7-blog-site-sc4technology.webp" alt="image 7 blog site sc4technology" width="616" height="332" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-7-blog-site-sc4technology.webp 616w, https://sc4t.com/wp-content/uploads/2024/02/image-7-blog-site-sc4technology-300x162.webp 300w" sizes="(max-width: 616px) 100vw, 616px" /></p><p>The second interface is used to provide external connectivity through the MAC and it is set as bridged interface on your physical ethernet connection. This way you can reach out to the Internet and<br />download the required packages. This network is based on the 192.168.1.0/24 subnet, is connected to the Internet through my home gateway and the 2 VMs looks like regular physical nodes<br />to my host MAC.</p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17604 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-8-blog-site-sc4technology.webp" alt="image 8 blog site sc4technology" width="632" height="270" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-8-blog-site-sc4technology.webp 632w, https://sc4t.com/wp-content/uploads/2024/02/image-8-blog-site-sc4technology-300x128.webp 300w" sizes="(max-width: 632px) 100vw, 632px" /></p><p>Finally the third interface ens39 is again set as “host only” and it is used to source the VXLAN tunnels where the tenant networks will be created.<br />This Openstack setup could have been implemented with 2 network interfaces only on the VMs, but I believe the 3 NIC setup helps to better visualize the networking requirements and architecture.</p><p>To summarize, you have at this point each VM connected to 3 network segments:</p><p>&#8211; The Management Network 10.0.10/24 (interface ens33 set as host only in Fusion);<br />&#8211; The External Network 192.168.1.0/24 aka Provider network in Openstack terminology (interface ens38 set as Bridged in Fusion);<br />&#8211; The VXLAN source network 200.1.1.0/24 (interface ens39 set as host only in Fusion).</p><p>The following details the netplan (/etc/netplan/50-cloud-init.yaml) configuration for the Controller Node:</p><p>network:<br />ethernets:<br />ens33:<br />addresses:<br />&#8211; 10.0.1.36/24<br />ens38:<br />dhcp: true<br />ens39:<br />addresses:<br />&#8211; 10.0.1.36/24</p><p>Note that ens38 is getting its ip address from the dhcp server in my<br />home gateway: in order for the controller and compute node to always get the same IP address I have reserved them on the gateway using their MAC address.</p><p>The /etc/hosts file needs to be setup to resolve the host names (ctl &amp; compute) in the management address of the nodes (10.0.1.36 and 10.0.1.16 respectively).</p><p>A clear understanding of the roles that these interfaces will play in<br />setting up your Openstack environment is critical to avoid<br />misconfiguration and issues later on.</p><p>So ens33 needs to be connected to the management network: this will be used by Openstack nodes for internal communication to setup the needed functionalities. In Openstack configuration files this address is referenced as the my_ip parameter.</p><p>The ens39 interface represents the VTEP that will be used by the<br />controller and compute nodes to build the VXLAN based tenant networks. In Openstack configuration files this address is referenced as the local_ip parameter (found in the neutron cfg files).<br />Finally the ens38 interface is where the external network is connected to the controller and compute nodes. This network is used to provide external connectivity to the VM instances running on tenant networks through the adoption of Floating IPs (basically using NAT between the interface on the tenant network and the floating IP address assigned on the external network). This parameter is found on the neutron cfg files as parameter “physical_interface_mappings” and has to be defined in the<br />format “external_network_name:interface_name”(ex. provider:ens38, where provider is an arbitrary name assigned to the external network). This name will be used to reference this particular network further on in the configuration files.</p><p>In the next post I will examine the main Neutron and Nova configuration files and how they interrelated.</p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/openstack-project-lab-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>It makes sense to seek a right in-house parsing Traffic Flow monitor?</title>
		<link>https://sc4t.com/2023/03/29/it-makes-sense-to-seek-a-right-in-house-parsing-traffic-flow-monitor/</link>
					<comments>https://sc4t.com/2023/03/29/it-makes-sense-to-seek-a-right-in-house-parsing-traffic-flow-monitor/#respond</comments>
		
		<dc:creator><![CDATA[admin_sc4t3ch]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 06:15:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://wp1.themevibrant.com/newwp/buildnox2/?p=56</guid>

					<description><![CDATA[Essential Advice on Choosing a Network Traffic Monitor “Too many Customer asked us to have a Traffic Monitor not commercial product, permit an in-depth customization solution, so SC4T NETTRAFF® Network traffic monitoring reviews, analyzes and manages network traffic for any abnormality. Monitoring of network traffic is carried out by sending the server separately Monitoring INbound [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="56" class="elementor elementor-56" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5e28cc37 e-flex e-con-boxed e-con e-parent" data-id="5e28cc37" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-64358390 elementor-widget elementor-widget-text-editor" data-id="64358390" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<h3>Essential Advice on Choosing a Network Traffic Monitor</h3><p class="mb_30">“Too many Customer asked us to have a Traffic Monitor not commercial product, permit an in-depth customization solution, so SC4T NETTRAFF® Network traffic monitoring reviews, analyzes and manages network traffic for any abnormality. <br />Monitoring of network traffic is carried out by sending the server separately Monitoring INbound and OUTbound traffic on two different network interfaces.<br />In the Monitoring Server there are two complementary software:</p><p>1. The probe software, which operates according to the Netflow V9 specifications, continuously analyzes all packets received providing raw data on traffic flows</p><p>2. The Nettraff monitoring software, takes the raw data provided by the probe software, themclassifies, filters them and inserts them in the data base flow table, also takes the data provided by the network interface counters with two different samples: every 6 seconds and every minute, save the different traffic samples (INbound and OUTbound) in 4 different tablesin the Data Base and uses them to build graphs of network traffic.</p><p class="p1"><span class="s1">To avoid the flooding of useless and insignificant data in the Data Base (also called noise of<span class="Apple-converted-space">  </span>fund) which would increase its size with a negative impact on Sorting times from the DB, the software by default sets a filter through which only the flows that are taken over are taken 5 minutes have a size greater than 100 KB and discards the smaller flows that, for theirs<span class="Apple-converted-space">  </span>very small size, can not create problems to the network and applications</span><span class="s2">.</span></p><p class="p1"><span class="s1"><b>NETTRAFF® Feature: </b></span></p><p class="p1"><span class="s1"><b>Internal network visibility </b></span></p><p class="p1"><span class="s1">Network flow monitoring software which supports protocols such as Netflow, IPFix, JFlow, sFlow etc. can provide complete visibility of internal network traffic. With SC4 NETTRAFF® , IT department can generate insightful reports about following types and kinds of traffic .</span></p><p class="p1"><span class="s1">Traffic for Top Applications | Traffic for Top Conversations | Traffic Destinations with Host IP | Top Traffic Sources With IP address | Top Traffic Receivers with IP | IP to IP Traffic | Protocol Traffic | Port Traffic | Application Traffic</span></p><p class="p1"><span class="s1"><b>Identification of slow applications</b></span></p><p class="p1"><span class="s1">Speed aka performance plays an important role in user experience. One of the most raised help desk ticket is about application (web application, Go-to-Meeting, Skype etc.) being slow or getting crashed. There can be 100s of reasons out of which only one or two will be relevant at any particular time. Identifying the reason is not only time-consuming but costly as well. The next generation Netflow software can filter and report the accurate cause. By combining the internal data reports with the external resources, the system administrator can learn a lot about the system and the faulty network.</span></p><p class="p1"><span class="s1"><b>Detection of spyware and other hacks</b></span></p><p class="p1"><span class="s1">When these worms attack your network, they form a very unusual data flow in and out. With the help of Netflow, these unusual patterns are easy to detect. In case you are not using some data analyzer, these patterns often go unchecked due to the fact that these are designed to fool the human administrator.</span></p><p class="p1"><span class="s1">Most of these worms often cause non-financial problems by creating a bad image for the company. However, in some cases, the effect of these worms can include high rates of financial loss as well.</span></p><p class="p1"><span class="s1"><b>Departmental bandwidth usage</b></span></p><p class="p1"><span class="s1">If you are worried about the overall usage of the network and unable to find out which department is using the data flow in a massive amount, Netflow can come in handy. It can track and point out IPs and devices which are using the network resources. The administration can take proper action to reduce the pressure on the network then.</span></p><p><img loading="lazy" decoding="async" class="alignnone wp-image-17592 size-full" src="https://sc4t.com/wp-content/uploads/2024/02/image-3-blog-site-sc4technology.webp" alt="image 3 blog site sc4technology" width="1377" height="557" srcset="https://sc4t.com/wp-content/uploads/2024/02/image-3-blog-site-sc4technology.webp 1377w, https://sc4t.com/wp-content/uploads/2024/02/image-3-blog-site-sc4technology-300x121.webp 300w, https://sc4t.com/wp-content/uploads/2024/02/image-3-blog-site-sc4technology-1024x414.webp 1024w, https://sc4t.com/wp-content/uploads/2024/02/image-3-blog-site-sc4technology-768x311.webp 768w" sizes="(max-width: 1377px) 100vw, 1377px" /></p>						</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://sc4t.com/2023/03/29/it-makes-sense-to-seek-a-right-in-house-parsing-traffic-flow-monitor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
