Muutke küpsiste eelistusi

E-raamat: Network Programmability and Automation Fundamentals

  • Formaat: 800 pages
  • Sari: Networking Technology
  • Ilmumisaeg: 06-May-2021
  • Kirjastus: Cisco Press
  • Keel: eng
  • ISBN-13: 9780135183670
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 56,15 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 800 pages
  • Sari: Networking Technology
  • Ilmumisaeg: 06-May-2021
  • Kirjastus: Cisco Press
  • Keel: eng
  • ISBN-13: 9780135183670
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Modernize and optimize network management with APIs and automation Legacy network management approaches dont scale adequately and cant be automated well. This guide will help meet tomorrows challenges by adopting network programmability based on Application Programming Interfaces (APIs). Using these techniques, you can improve efficiency, reliability, and flexibility; simplify implementation of high-value technologies; automate routine administrative and security tasks; and deploy services far more rapidly. Four expert authors help you transition from a legacy mindset to one based on solving problems with software. They explore todays emerging network programmability and automation ecosystem; introduce each leading programmable interface; and review the protocols, tools, techniques, and technologies that underlie network programmability. Youll master key concepts through hands-on examples you can run using Linux, Python, Cisco DevNet sandboxes, and other easily accessible tools. This guide is for all network architects, engineers, operations, and software professionals who want to integrate programmability into their networks. It offers valuable background for Cisco DevNet certificationand skills you can use with any platform, whether you have software development experience or not.





Master core concepts and explore the network programmability stack Manage network software and run automation scripts in Linux environments Solve real problems with Python and its Napalm and Nornir automation frameworks Make the most of the HTTP protocol, REST architectural framework, and SSH Encode your data with XML, JSON, or YAML Understand and build data models using YANG that offer a foundation for model-based network programming Leverage modern network management protocols, from gRPC and gNMI to NETCONF and RESTCONF Meet stringent service provider KPIs in large-scale, fast-changing networks Program Cisco devices running IOS XE, IOS XR, and NX-OS as well as Meraki, DNA Center, and Webex platforms Program non-Cisco platforms such as Cumulus Linux and Arista EOS Go from zero to hero with Ansible network automation Plan your next steps with more advanced tools and technologies
Introduction xxix
Part I Introduction
Chapter 1 The Network Programmability And Automation Ecosystem
1(20)
First, A Few Definitions
2(12)
Network Management
3(2)
Automation
5(1)
Orchestration
6(1)
Programmability
7(1)
Virtualization And Abstraction
8(5)
Software-Defined Networking
13(1)
Intent-Based Networking
13(1)
Your Network Programmability And Automation Toolbox
14(5)
Python
15(1)
Ansible
15(1)
Linux
16(1)
Virtualization
17(1)
Yang
17(1)
Protocols
18(1)
Encoding The Protocols
18(1)
Transporting The Protocols
18(1)
Software And Network Engineers: The New Era
19(2)
Part II Linux
Chapter 2 Linux Fundamentals
21(98)
The Story Of Linux
21(5)
History
21(1)
Linux Today
22(1)
Linux Development
22(1)
Linux Architecture
23(3)
Linux Distributions
26(1)
The Linux Boot Process
26(2)
A Linux Command Shell Primer
28(3)
Finding Help In Linux
31(4)
Files And Directories In Linux
35(22)
The Linux File System
35(3)
File And Directory Operations
38(1)
Navigating Directories
38(3)
Viewing Files
41(5)
File Operations
46(2)
Directory Operations
48(3)
Hard And Soft Links
51(1)
Hard Links
51(4)
Soft Links
55(2)
Input And Output Redirection
57(10)
Archiving Utilities
67(6)
Linux System Maintenance
73(21)
Job, Process, And Service Management
73(10)
Resource Utilization
83(2)
System Information
85(6)
System Logs
91(3)
Installing And Maintaining Software On Linux
94(24)
Manual Compilation And Installation
96(1)
Rpm
97(4)
Yum
101(16)
Dnf
117(1)
Summary
118(1)
Chapter 3 Linux Storage, Security, And Networks
119(64)
Linux Storage
119(16)
Physical Storage
119(9)
Logical Volume Manager
128(7)
Linux Security
135(23)
User And Group Management
136(7)
File Security Management
143(5)
Access Control Lists
148(7)
Linux System Security
155(3)
Linux Networking
158(23)
The Ip Utility
159(9)
The Network Manager Service
168(6)
Network Scripts And Configuration Files
174(5)
Network Services: Dns
179(2)
Summary
181(2)
Chapter 4 Linux Scripting
183(66)
Regular Expressions And The Grep Utility
184(9)
The Awk Programming Language
193(3)
The Sed Utility
196(7)
General Structure Of Shell Scripts
203(4)
Output And Input
207(8)
Output
207(4)
Input
211(4)
Variables
215(8)
Integers And Strings
216(4)
Indexed And Associative Arrays
220(3)
Conditional Statements
223(9)
The If-Then Construct
224(6)
The Case-In Construct
230(2)
Loops
232(6)
The For-Do Loop
232(4)
The While-Do Loop
236(1)
The Until-Do Loop
237(1)
Functions
238(4)
Expect
242(4)
Summary
246(3)
Part III Python
Chapter 5 Python Fundamentals
249(62)
Scripting Languages Versus Programming Languages
250(3)
Network Programmability
253(2)
Computer Science Concepts
255(5)
Object-Oriented Programming
256(2)
Algorithms
258(2)
Python Fundamentals
260(49)
Python Installation
260(3)
Python Code Execution
263(7)
Python Data Types
270(1)
Variables
270(3)
Numbers
273(3)
Strings
276(5)
Operators
281(5)
Python Data Structures
286(1)
List
286(4)
Dictionaries
290(2)
Tuples
292(2)
Sets
294(1)
Control Flow
295(1)
If-Else Statements
296(5)
For Loops
301(3)
While Loops
304(2)
Functions
306(3)
Summary
309(1)
References
310(1)
Chapter 6 Python Applications
311(76)
Organizing The Development Environment
311(22)
Git
312(5)
Docker
317(14)
The Virtualenv Tool
331(2)
Python Modules
333(3)
Python Applications
336(49)
Web/Api Development
336(1)
Django
337(8)
Flask
345(8)
Network Automation
353(1)
Napalm
354(5)
Nornir
359(4)
Templating With Jinja2
363(12)
Orchestration
375(1)
Docker
376(2)
Kubernetes
378(4)
Machine Learning
382(3)
Summary
385(2)
Part IV Transport
Chapter 7 Http And Rest
387(82)
Http Overview
387(5)
The Rest Framework
392(2)
The Http Connection
394(3)
Client/Server Communication
394(1)
Http/1.1 Connection Enhancements
395(1)
Persistent Connections
395(1)
Pipelining
396(1)
Compression
396(1)
Http Transactions
397(18)
Client Requests
397(1)
Get
398(1)
Head
398(1)
Post
399(3)
Put
402(3)
Delete
405(2)
Connect
407(1)
Options
407(1)
Trace
408(1)
Server Status Codes
408(3)
1Xx Informational Status Codes
411(1)
2Xx Successful Status Codes
411(1)
3Xx Redirection Status Codes
412(1)
4Xx Client Error Status Codes
413(1)
5Xx Server Error Status Codes
414(1)
Server Status Codes On Cisco Devices
414(1)
Http Messages
415(16)
Http General Header Fields
418(1)
Cache Servers: Cache-Control And Pragma
418(2)
Connection
420(1)
Date
420(1)
Upgrade
420(1)
Via
421(1)
Transfer-Encoding
421(1)
Trailer
422(1)
Client Request Header Fields
422(1)
Content Negotiation Header Fields: Accept, Accept-Charset, Accept-Encoding And Accept-Language
423(1)
Client Authentication Credentials: Authorization, Proxy-Authorization And Cookie
423(1)
Host
424(1)
Expect
424(1)
Max-Forwards
424(1)
Request Context: From, Referer And User-Agent
424(1)
Te
425(1)
Server Response Header Fields
425(1)
Age
425(1)
Validator Header Fields: Etag And Last-Modified
425(1)
Response Authentication Challenges: X-Authenticate And Set-Cookie
426(1)
Response Control Header Fields: Location, Retry-After, And Vary
426(1)
Response Context: Server
427(1)
The Http Entity Header Fields
427(1)
Control Header Fields: Allow
428(1)
Representation Metadata Header Fields: Content-X
428(2)
Content-Length
430(1)
Expires
430(1)
Resource Identification
431(5)
Uri, Url, And Urn
431(1)
Uri Syntax
432(1)
Uri Components
432(3)
Characters
435(1)
Absolute And Relative References
436(1)
Postman
436(11)
Downloading And Installing Postman
438(1)
The Postman Interface
438(3)
Using Postman
441(6)
Http And Bash
447(8)
Http And Python
455(12)
Tcp Over Python: The Socket Module
455(3)
The Urllib Package
458(6)
The Requests Package
464(3)
Summary
467(2)
Chapter 8 Advanced Http
469(40)
Http/1.1 Authentication
469(18)
Basic Authentication
472(2)
Oauth And Bearer Tokens
474(2)
Client Registration
476(1)
Authorization Grant
477(4)
Access Token
481(2)
Api Call To The Resource Server
483(1)
State Management Using Cookies
483(4)
Transport Layer Security (Tls) And Https
487(16)
Cryptography Primer
488(1)
Key Generation And Exchange
488(4)
Stream And Block Data Encryption
492(1)
Message Integrity And Authenticity
493(2)
Encryption And Message Integrity And Authenticity Combined
495(1)
Digital Signatures And Peer Authentication
496(2)
Tls 1.3 Protocol Operation
498(2)
The Tls Version 1.3 Handshake
500(2)
0-Rtt And Early Data
502(1)
The Record Protocol
503(1)
Http Over Tls (Https)
503(1)
Http/2
503(5)
Streams, Messages, And Frames
504(1)
Frame Multiplexing
505(1)
Binary Message Framing
506(1)
Other Http/2 Optimizations
507(1)
Summary
508(1)
Chapter 9 Ssh
509(44)
Ssh Overview
509(12)
Ssh1
510(2)
Ssh2
512(1)
Ssh Transport Layer Protocol
513(1)
Ssh Authentication Protocol
514(4)
Ssh Connection Protocol
518(3)
Setting Up Ssh
521(5)
Setting Up Ssh On Centos
521(5)
Enabling Ssh On Cisco Devices
526(14)
Configuring And Verifying Ssh On Cisco Ios Xe
526(6)
Configuring Ssh On Ios Xr
532(5)
Configuring Ssh On Nx-Os
537(3)
Secure File Transfer
540(11)
Setting Up Sftp On Cisco Devices
545(4)
Secure Copy Protocol
549(2)
Summary
551(1)
References
551(2)
Part V Encoding
Chapter 10 Xml
553(38)
Xml Overview, History, And Usage
553(1)
Xml Syntax And Components
554(8)
Xml Document Building Blocks
554(4)
Xml Attributes, Comments, And Namespaces
558(3)
Xml Formatting Rules
561(1)
Making Xml Valid
562(12)
Xml Dtd
563(2)
Xsd
565(9)
Brief Comparison Of Xsd And Dtd
574(1)
Navigating Xml Documents
574(4)
Xpath
574(4)
Xml Stylesheet Language Transformations (Xslt)
578(2)
Processing Xml Files With Python
580(8)
Summary
588(3)
Chapter 11 Json
591(24)
Javascript Object Notation (Json)
591(4)
Json Data Format And Data Types
592(3)
Json Schema Definition (Jsd)
595(19)
Structure Of The Json Schema
595(3)
Repetitive Objects In The Json Schema
598(4)
Referencing External Json Schemas
602(7)
Using Json Schemas For Data Validation
609(5)
Summary
614(1)
Chapter 12 Yaml
615(24)
Yaml Structure
616(10)
Collections
618(2)
Scalars
620(1)
Tags
621(3)
Anchors
624(1)
Yaml Example
625(1)
Handling Yaml Data Using Python
626(11)
Summary
637(2)
Part VI Modeling
Chapter 13 Yang
639(50)
A Data Modeling Primer
639(3)
What Is A Data Model?
639(1)
Why Data Modeling Matters
640(2)
Yang Data Models
642(21)
Structure Of A Yang Module
644(2)
Data Types In A Yang Module
646(1)
Built-In Data Types
647(1)
Derived Data Types
648(1)
Data Modeling Nodes
649(1)
Leaf Nodes
649(2)
Leaf-List Nodes
651(1)
Container Nodes
652(1)
List Nodes
653(1)
Grouping Nodes
654(2)
Augmentations In Yang Modules
656(2)
Deviations In Yang Modules
658(4)
Yang 1.1
662(1)
Types Of Yang Modules
663(10)
The Home Of Yang Modules
664(2)
Native (Vendor-Specific) Yang Modules
666(4)
Ietf Yang Modules
670(1)
Openconfig Yang Modules
671(2)
Yang Tools
673(15)
Using Pyang
673(6)
Using Pyangbind
679(4)
Using Pyang To Create Jtox Drivers
683(5)
Summary
688(1)
Part VII Protocols
Chapter 14 Netconf And Restconf
689(92)
Netconf
689(50)
Netconf Overview
689(3)
Netconf Architecture
692(1)
The Netconf Transport Layer
693(1)
Netconf Transport Protocol Requirements
693(1)
Netconf Over Ssh
694(1)
The Netconf Messages Layer
695(1)
Hello Messages
696(2)
Rpc Messages
698(1)
Rpc-Reply Messages
699(2)
The Netconf Operations Layer
701(1)
Retrieving Data: <Get> And <Get-Config>
702(10)
Changing Configuration: <Edit-Config>, <Copy-Config>, And <Delete-Config>
712(8)
Datastore Operations: <Lock> And <Unlock>
720(1)
Session Operations: <Close-Session> And <Kill-Session>
721(1)
Candidate Configuration Operations: <Commit>, <Discard-Changes>, And <Cancel-Commit>
722(2)
Configuration Validation: <Validate>
724(1)
The Netconf Content Layer
725(6)
Netconf Capabilities
731(1)
The Writable Running Capability
732(1)
The Candidate Configuration Capability
732(1)
The Confirmed Commit Capability
732(1)
The Rollback-On-Error Capability
732(1)
The Validate Capability
733(1)
The Distinct Startup Capability
733(1)
The Url Capability
733(2)
The Xpath Capability
735(1)
Netconf Using Python: Ncclient
735(4)
Restconf
739(40)
Protocol Overview
739(3)
Protocol Architecture
742(1)
The Restconf Transport Layer
743(1)
The Restconf Messages Layer
743(1)
Request Messages
743(1)
Response Messages
744(1)
Constructing Restconf Messages
745(1)
Restconf Http Headers
745(1)
Restconf Error Reporting
746(1)
Resources
746(1)
The Api Resource
747(2)
The Datastore Resource
749(1)
The Schema Resource
750(3)
The Data Resource
753(3)
The Operations Resource
756(2)
The Yang Library Version Resource
758(1)
Methods And The Restconf Operations Layer
759(1)
Retrieving Data: Options, Get, And Head
759(4)
Editing Data: Post, Put, Patch, And Delete
763(8)
Query Parameters
771(6)
Restconf And Python
777(2)
Summary
779(2)
Chapter 15 Grpc, Protobuf, And Gnmi
781(38)
Requirements For Efficient Transport
781(1)
History And Principles Of Grpc
782(2)
Grpc As A Transport
784(2)
The Protocol Buffers Data Format
786(4)
Working With Grpc And Protobuf In Python
790(8)
The Gnmi Specification
798(1)
The Anatomy Of Gnmi
799(15)
The Get Rpc
801(6)
The Set Rpc
807(3)
The Capabilities Rpc
810(1)
The Subscribe Rpc
811(3)
Managing Network Elements With Gnmi/Grpc
814(4)
Summary
818(1)
Chapter 16 Service Provider Programmability
819(62)
The Sdn Framework For Service Providers
819(4)
Requirements For Service Provider Networks Of The Future
819(2)
Sdn Controllers For Service Provider Networks
821(2)
Segment Routing (Sr)
823(20)
Segment Routing Basics
823(9)
Segment Routing Traffic Engineering
832(11)
Bgp Link State (Bgp-Ls)
843(16)
Bgp-Ls Basics
843(7)
Bgp-Ls Route Types
850(4)
Node Nlri
854(2)
Link Nlri
856(2)
Prefix Nlri
858(1)
Path Computation Element Protocol (Pcep)
859(21)
Typical Pcep Call Flow
861(4)
Pcep Call Flow With Delegation
865(2)
Configuring Pcep In Cisco Ios Xr
867(13)
Summary
880(1)
Part VIII Programmability Applications
Chapter 17 Programming Cisco Platforms
881(76)
Api Classification
882(1)
Network Platforms
883(39)
Networking Apis
884(1)
Open Nx-Os Programmability
884(1)
Ios Xe Programmability
885(1)
Ios Xr Programmability
886(1)
Use Cases
887(1)
Use Case 1 Linux Shells
887(6)
Use Case 2 Nx-Api Cli
893(5)
Use Case 3 Nx-Api Rest
898(7)
Use Case 4 Netconf
905(17)
Meraki
922(9)
Meraki Apis
922(1)
Meraki Use Case: Dashboard Api
923(8)
Dna Center
931(11)
Dna Center Apis
933(1)
Intent Api
934(1)
Device Management
934(1)
Event Notifications And Webhooks
935(1)
Integration Api
935(1)
Use Case: Intent Api
936(6)
Collaboration Platforms
942(12)
Cisco's Collaboration Portfolio
942(2)
Collaboration Apis
944(1)
Cisco Unified Communications Manager (Cucm)
944(1)
Webex Meetings
945(1)
Webex Teams
945(1)
Webex Devices
946(1)
Finesse
946(2)
Use Case: Webex Teams
948(6)
Summary
954(3)
Chapter 18 Programming Non-Cisco Platforms
957(32)
General Approaches To Programming Networks
957(5)
The Vendor/Api Matrix
957(1)
Programmability Via The Cli
958(1)
Programmability Via Snmp
959(1)
Programmability Via The Linux Shell
960(1)
Programmability Via Netconf
960(1)
Programmability Via Restconf And Rest Apis
961(1)
Programmability Via Grpc/Gnmi
961(1)
Implementation Examples
962(25)
Converting The Traditional Cli To A Programmable One
962(5)
Classical Linux-Based Programmability
967(6)
Managing Network Devices With Netconf/Yang
973(5)
Managing Network Devices With Restconf/Yang
978(9)
Summary
987(2)
Chapter 19 Ansible
989(120)
Ansible Basics
989(14)
How Ansible Works
990(6)
Ad Hoc Commands And Playbooks
996(4)
The World Of Ansible Modules
1000(3)
Extending Ansible Capabilities
1003(31)
Connection Plugins
1003(2)
Variables And Facts
1005(8)
Filters
1013(3)
Conditionals
1016(8)
Loops
1024(10)
Jinja2 Templates
1034(21)
The Need For Templates
1034(6)
Variables, Loops, And Conditions
1040(9)
Using Python Functions In Jinja2
1049(1)
The Join() Function
1050(1)
The Split() Function
1051(3)
The Map() Function
1054(1)
Using Ansible For Cisco Ios Xe
1055(18)
Operational Data Verification Using The Ios_Command Module
1058(3)
General Configuration Using The Ios_Config Module
1061(8)
Configuration Using Various Ios_* Modules
1069(4)
Using Ansible For Cisco Ios Xr
1073(11)
Operational Data Verification Using The Iosxr_Command Module
1075(3)
General Configuration Using The Iosxr_Config Module
1078(5)
Configuration Using Various Iosxr_* Modules
1083(1)
Using Ansible For Cisco Nx-Os
1084(11)
Operational Data Verification Using The Nxos_Command Module
1086(4)
General Configuration Using The Nxos_Config Module
1090(3)
Configuration Using Various Nxos_* Modules
1093(2)
Using Ansible In Conjunction With Netconf
1095(13)
Operational Data Verification Using The Netconf_Get Module
1098(5)
General Configuration Using The Netconf_Config Module
1103(5)
Summary
1108(1)
Part IX Looking Ahead
Chapter 20 Looking Ahead
1109(12)
Some Rules Of Thumb
1109(3)
Automate The Painful Stuff
1109(1)
Don't Automate A Broken Process
1110(1)
Clean Up Your Network
1110(1)
Find Your Sources Of Truth
1110(1)
Avoid Automation You Can't Reuse
1111(1)
Document What You Do
1111(1)
Understand What Level Of Complexity You're Willing To Handle
1111(1)
Do A Cost/Benefit Analysis
1112(1)
What Do You Study Next?
1112(6)
Model-Driven Telemetry
1113(1)
Containers: Docker And Kubernetes
1114(1)
Application Hosting
1115(1)
Software Development Methodologies
1116(1)
Miscellaneous Topics
1117(1)
What Does All This Mean For Your Career?
1118(3)
Index 1121
Khaled Abuelenain, CCIE No. 27401 (R&S, SP), is currently the Consulting Director at Acuative, a Cisco Managed Services Master Partner. Khaled has spent the past 18 years designing, implementing, operating, and automating networks and clouds. He specializes in service provider technologies, SD-WAN, data center technologies, programmability, automation, and cloud architectures. Khaled is especially interested in Linux and OpenStack.

Khaled is a contributing author of the best-selling Cisco Press book Routing TCP/IP, Volume II, 2nd edition, by Jeff Doyle. He also blogs frequently on network programmability and automation on blogs.cisco.com. Khaled is also a member of the DevNet500 group, being one of the first 500 individuals in the world to become DevNet certified. Khaled lives in Riyadh, Saudi Arabia, and when not working or writing, he likes to run marathons and skydive. He can be reached at kabuelenain@gmail.com, on Twitter at @kabuelenain or on LinkedIn at linkedin.com/in/kabuelenain.

Jeff Doyle, CCIE No. 1919, is a Member of Technical Staff at Apstra. Specializing in IP routing protocols, complex BGP policy, SDN/NFV, data center fabrics, IBN, EVPN, MPLS, and IPv6, Jeff has designed or assisted in the design of large-scale IP and IPv6 service provider networks in 26 countries over 6 continents.

Jeff is the author of CCIE Professional Development: Routing TCP/IP, Volumes I and II and OSPF and IS-IS: Choosing an IGP for Large-Scale Networks; a co-author of Software-Defined Networking: Anatomy of OpenFlow; and an editor and contributing author of Juniper Networks Routers: The Complete Reference. Jeff is currently writing CCIE Professional Development: Switching TCP/IP. He also writes for Forbes and blogs for both Network World and Network Computing. Jeff is one of the founders of the Rocky Mountain IPv6 Task Force, is an IPv6 Forum Fellow, and serves on the executive board of the Colorado chapter of the Internet Society (ISOC).

Anton Karneliuk, CCIE No. 49412 (R&S, SP), is a Network Engineer and Manager at THG Hosting, responsible for the development, operation, and automation of networks in numerous data centers across the globe and the international backbone. Prior to joining THG, Anton was a team lead in Vodafone Group Network Engineering and Delivery, focusing on introduction of SDN and NFV projects in Germany. Anton has 15 years of extensive experience in design, rollout, operation, and optimization of large-scale service providers and converged networks, focusing on IP/MPLS, BGP, network security, and data center Clos fabrics built using EVPN/VXLAN. He also has several years of full-stack software development experience for network management and automation.

Anton holds a B.S. in telecommunications and an M.S. in information security from Belarusian State University of Informatics and Radio Electronics. You can find him actively blogging about network automation and running online training at Karneliuk. com. Anton lives with his wife in London.

Vinit Jain, CCIE No. 22854 (R&S, SP, Security & DC), is a Network Development Engineer at Amazon, managing the Amazon network backbone operations team. Previously, he worked as a technical leader with the Cisco Technical Assistance Center (TAC), providing escalation support in routing and data center technologies. Vinit is a speaker at various networking forums, including Cisco Live! events. He has co-authored several Cisco Press titles, such as Troubleshooting BGP, and Troubleshooting Cisco Nexus Switches and NX-OS, LISP Network Deployment and Troubleshooting, and has authored and co-authored several video courses, including BGP Troubleshooting, the CCNP DCCOR Complete Video Course, and the CCNP ENCOR Complete Video Course. In addition to his CCIEs, Vinit holds multiple certifications related to programming and databases. Vinit graduated from Delhi University in mathematics and earned a masters in information technology from Kuvempu University in India. Vinit can be found on Twitter as @VinuGenie.