TECCRS-2500.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

TECCRS-2500.Pdf TECCRS-2500 Enhancements and Trends in Enterprise WAN Design and Deployments Dave Fusik Arvind Durai David Prall Craig Hill Speakers Dave David Arvind Craig Fusik Prall Durai Hill CCIE#4768 CCIE#6508 CCIE#7016 CCIE#1628 CCDE#2013::70 TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Housekeeping • We value your feedback - don't forget to complete your online session evaluations after each session & complete the Overall Conference Evaluation which will be available online • Visit the World of Solutions • Please switch off your mobile phones • Please remember to wear your badge at all times TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Agenda • Kickoff • WAN Architectures and Design Principles • Highly Available WAN Design • QoS for the WAN & Automation use case • IP Multicast for the WAN • Advancements for L3 Segmentation in the WAN TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space cs.co/ciscolivebot#TECCRS-2500 TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Schedule For the Day Session 8:30 am – 10:30 am Break 10:30 am – 10:45 am Session 10:45 am – 12:45 pm Lunch 12:45 pm – 14:30 pm Session 14:30 pm – 16:30 pm Break 16:30 pm – 16:45 pm Session 16:45 pm – 18:45 pm TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 TECCRS-2500 WAN Architectures and Design Principles Dave Fusik, Customer Solutions Architect CCIE 4768 (R&S/Security), CCDE 2013::70 Agenda • WAN Technologies & Solutions • Wide Area Network Overview and Principles • WAN Transport and Overlay Technologies • Cisco vBranch with Enterprise NFV • SD-WAN • Demonstration • WAN Extension into the Cloud • WAN Architecture Design Considerations and Best Practices • Summary TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Wide Area Network Overview and Principles The WAN Technology Continuum Early Networking Early-Mid 1990s Mid 1990s-Late 2000s Today Global Scale Flat/Bridged Multiprotocol Large Scale IP Ubiquity Experimental Networks Business Enabling Mission Critical Business Survival Architectural Architectural Architectural Planning Lessons Lessons Lessons Protocols required for Route first, bridge only Redundancy Scale & Restoration if you must ? Build to Scale DMVPN X.25 Frame-Relay IPv6 Internet 4G/LTE 1960 Protocol 1980 BGP GRE 2000 Future 1970 RIP (BSD) 1990 2010 ARPAnet Metro- TCP/IP OSPF, Tag Ethernet SDWAN ISDN, Switching ATM TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 The Challenge • Build a network that can adapt to • Adapt to business changes a quickly changing business and rapidly and smoothly technical environment • Mergers & divestures • Realize rapid strategic advantage • Changes in the regulatory & from new technologies security requirements • IPv6: global reachability • Changes in public perception of services • Cloud: flexible diversified resources • Internet of Things • Fast-IT • What’s next? TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Network Design Modularity East Theater West Theater Global IP/MPLS Core Tier 1 Tier In-Theater IP/MPLS Core Tier 2 Tier West Region East Region Internet Cloud Public Voice/Video Mobility Tier 3 Tier Metro Metro Service Private Service Public IP IP Service Service TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 Hierarchical Network Principle Use hierarchy to manage network scalability and complexity while reducing routing algorithm overhead Hierarchical design used Hierarchical design has to be… become any design that… • Three routed layers • Splits the network up into • Core, aggregation, access “places” or “regions” • Only one hierarchical • Separates these “regions” by hiding information structure end-to-end • Organizes these “regions” around a network core • “hub and spoke” at a macro level TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Wide Area Network Design Trends Single Provider Design Dual Providers Design Overlay Network Design Enterprise homes all sites into Enterprise will single or dual home Overlay tunneling technologies a single MPLS VPN carrier to sites into one or both carriers to with encryption for provider provide L3 connectivity provide L3 MPLS VPN connectivity transport agnostic design • Pro: Simpler design with • Pro: Protects against MPLS service • Pro: Can use commodity consistent features failure with Single Provider broadband services for lower cost higher bandwidth service • Con: Bound to single carrier • Pro: Potential business leverage for feature velocity for better competitive pricing • Pro: Flexible overlay network topology that couples from the • Con: Does not protect • Con: Increased design complexity physical connectivity against MPLS cloud failure due to service implementation with Single Provider differences (e.g. QoS, BGP AS • Con: Increased design Topology) complexity • Con: Feature differences between • Con: Additional technology providers could force customer to needed for SLA over commodity use least common denominator transport services features. TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Single Carrier Site Types (Non-Transit) . Dual Homed Non Transit Only advertise local prefixes (^$) Typically with Dual CE routers BGP design: eBGP to carrier iBGP between CEs Redistribute cloud learned routes into the site IGP . Single Homed Non Transit Advertise local prefixes and optionally use default route. TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Dual Carrier: Transit vs. Non Transit . To guarantee single homed site reachability to a dual homed site experiencing a failure, transit sites had to be elected. Transit sites would act as a BGP bridge transiting routes between the two provider clouds. To minimize latency costs of transits, transits need to be selected with geographic diversity (e.g. from the East, West and Central US.) TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Single vs. Dual Carriers Single Provider Dual Providers Pro: Common QoS support Pro: More fault domains model Pro: More product offerings to Pro: Only one carrier to “tune” business Pro: Reduced head end Pro: Ability to leverage circuits vendors for better pricing Pro: Nice to have a second Pro: Overall simpler design vendor option Con: Carrier failure could be Con: Increased Bandwidth catastrophic “Paying for bandwidth twice” Con: No leverage to negotiate Con: Increased overall design lower costs complexity Con: May be reduced to “common denominator” between carriers Simplicity vs. Resiliency TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 WAN Transport and Overlay Technologies MPLS L3VPN Topology Definition . MPLS WAN is provided by a service provider . As seen by the enterprise network, every site is one IP “hop” away . Equivalent to a full mesh, or to a “hubless” hub-and-spoke TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Virtual Routing and Forwarding Instance (VRF) Provides Network Virtualization and Path Isolation VRF VRF VRF VRF VRF VRF . Virtualization at Layer 3 forwarding ! PE Router – Multiple VRFs ip vrf blue . Associates to Layer 3 interfaces on router/switch rd 65100:10 . Each VRF has its own route-target import 65100:10 route-target export 65100:10 Forwarding table (CEF) ip vrf yellow rd 65100:20 Routing process (RIP, OSPF, BGP) route-target import 65100:20 route-target export 65100:20 . VRF-Lite ! interface GigabitEthernet0/1.10 Hop-by-hop ip vrf forwarding blue interface GigabitEthernet0/1.20 . MPLS VPN ip vrf forwarding yellow Multi-hop TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Metro Ethernet Service (L2VPN) E-Line (Point-to-Point) E-LAN (Point-to-Multipoint) . Replaces legacy TDM circuits and . Offers point to multipoint Frame-Relay/ATM virtual circuits connectivity (VCs) . Transparent to VLANs and Layer 2 . Point-to-point Ethernet VCs (EVCs) control protocols offer predictable performance for applications . 4 or 6 classes of QoS support . One or more EVCs allowed per single . Supports service multiplexing (Ex. physical interface (UNI) Internet access and corporate VPN via one UNI) . Supports “hub & spoke” topology TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 MPLS (L3VPN) vs. Metro Ethernet (L2VPN) • MPLS Layer 3 Service • MetroE Layer 2 Service • Routing protocol dependent on • Flexibility of routing protocol and the carrier network topology independent of the carrier • Layer 3 capability depends on carrier offering • Customer manages layer 3 QoS • QoS (4 classes/6 classes) • Capable of transport IP and non- • IPv6 capability IP traffic. • Transport IP protocol only • Routing protocol determines • Highly scalable and ideal for large scalability in point-to-multipoint network topology TECCRS-2500 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Types of Overlay Service Layer 2 Overlays Layer 3 Overlays . Layer 2 Tunneling Protocol—Version
Recommended publications
  • Leonard Bernstein
    chapter one Young American Bernstein at Harvard In 1982, at the age of sixty-four, Leonard Bernstein included in his col- lection of his writings, Findings, some essays from his younger days that prefi gured signifi cant elements of his later adult life and career. The fi rst, “Father’s Books,” written in 1935 when he was seventeen, is about his father and the Talmud. Throughout his life, Bernstein was ever mind- ful that he was a Jew; he composed music on Jewish themes and in later years referred to himself as a “rabbi,” a teacher with a penchant to pass on scholarly learning, wisdom, and lore to orchestral musicians.1 Moreover, Bernstein came to adopt an Old Testament prophetic voice for much of his music, including his fi rst symphony, Jeremiah, and his third, Kaddish. The second essay, “The Occult,” an assignment for a freshman composi- tion class at Harvard that he wrote in 1938 when he was twenty years old, was about meeting Dimitri Mitropoulos, who inspired him to take up conducting. The third, his senior thesis of April 1939, was a virtual man- ifesto calling for an organic, vernacular, rhythmically based, distinctly American music, a music that he later championed from the podium and realized in his compositions for the Broadway stage and operatic and concert halls.2 8 Copyrighted Material Seldes 1st pages.indd 8 9/15/2008 2:48:29 PM Young American / 9 EARLY YEARS: PROPHETIC VOICE Bernstein as an Old Testament prophet? Bernstein’s father, Sam, was born in 1892 in an ultraorthodox Jewish shtetl in Russia.
    [Show full text]
  • Mist Teleworker ME
    MIST TELEWORKER GUIDE ​ ​ ​ ​ ​ Experience the corporate network @ home DOCUMENT OWNERS: ​ ​ ​ ​ Robert Young – [email protected] ​ Slava Dementyev – [email protected] ​ Jan Van de Laer – [email protected] ​ 1 Table of Contents Solution Overview 3 How it works 5 Configuration Steps 6 Setup Mist Edge 6 Configure and prepare the SSID 15 Enable Wired client connection via ETH1 / Module port of the AP 16 Enable Split Tunneling for the Corp SSID 17 Create a Site for Remote Office Workers 18 Claim an AP and ship it to Employee’s location 18 Troubleshooting 20 Packet Captures on the Mist Edge 23 2 Solution Overview Mist Teleworker solution leverages Mist Edge for extending a corporate network to remote office workers using an IPSEC secured L2TPv3 tunnel from a remote Mist AP. In addition, MistEdge provides an additional RadSec service to securely proxy authentication requests from remote APs to provide the same user experience as inside the office. WIth Mist Teleworker solution customers can extend their corporate WLAN to employee homes whenever they need to work remotely, providing the same level of security and access to corporate resources, while extending visibility into user network experience and streamlining IT operations even when employees are not in the office. What are the benefits of the Mist Teleworker solution with Mist Edge compared to all the other alternatives? Agility: ● Zero Touch Provisioning - no AP pre-staging required, support for flexible all home coverage with secure Mesh ● Exceptional support with minimal support - leverage Mist SLEs and Marvis Actions Security: ● Traffic Isolation - same level of traffic control as in the office.
    [Show full text]
  • Spirent Testcenter™
    DATASHEET Spirent TestCenter™ L2TPv2 / L2TPv3 Base Packages Convergence is creating a new generation of integrated network Layer 2 Tunneling Protocol (L2TP) is used to support Virtual Private Networks (VPNs) devices and services that are or as part of the delivery of services by ISPs. Spirent TestCenter L2TP Base Package much more complex than ever enables Service Providers and network equipment manufacturers to quickly validate before. Service Providers need subscriber scalability. While L2TPv2 is all about PPPoE subscriber sessions being the ability to deploy networks tunneled to domains, L2TPv3 is more about multi-protocol tunneling. L2TPv3 Base quickly that get Quality of Package provides additional security features, improved encapsulation, and the Experience (QoE) right the first ability to carry data links other than simply Point-to-Point Protocol (PPP) over an time. IP network. L2TPv3 is emerging as a core tunneling and VPN technology for next- generation networks. L2TPv3 provides the flexibility and scalability of IP with the Benefits privacy of Frame Relay and ATM. L2TPv3 will allow network services to be delivered over routed IP networks. Stability and performance of L2TP is critical to many Service • L2TP Tunnel capacity testing Providers and data services. • Session per tunnel testing Spirent can help you address this challenge with Spirent TestCenter with its innovative design. Now you can create and execute more complex test cases in less time with the • Data forwarding across all L2TP same resources—and scale tests higher while debugging problems faster. The results: tunnels lower CAPEX and OPEX, faster time to market, greater market share and higher • L2TP Tunnel stability test profitability, the ability to tunnel thousands of subscribers to thousands of tunnels with authentication and verify data forwarding and receive rates per subscriber.
    [Show full text]
  • A Century of Mathematics in America, Peter Duren Et Ai., (Eds.), Vol
    Garrett Birkhoff has had a lifelong connection with Harvard mathematics. He was an infant when his father, the famous mathematician G. D. Birkhoff, joined the Harvard faculty. He has had a long academic career at Harvard: A.B. in 1932, Society of Fellows in 1933-1936, and a faculty appointmentfrom 1936 until his retirement in 1981. His research has ranged widely through alge­ bra, lattice theory, hydrodynamics, differential equations, scientific computing, and history of mathematics. Among his many publications are books on lattice theory and hydrodynamics, and the pioneering textbook A Survey of Modern Algebra, written jointly with S. Mac Lane. He has served as president ofSIAM and is a member of the National Academy of Sciences. Mathematics at Harvard, 1836-1944 GARRETT BIRKHOFF O. OUTLINE As my contribution to the history of mathematics in America, I decided to write a connected account of mathematical activity at Harvard from 1836 (Harvard's bicentennial) to the present day. During that time, many mathe­ maticians at Harvard have tried to respond constructively to the challenges and opportunities confronting them in a rapidly changing world. This essay reviews what might be called the indigenous period, lasting through World War II, during which most members of the Harvard mathe­ matical faculty had also studied there. Indeed, as will be explained in §§ 1-3 below, mathematical activity at Harvard was dominated by Benjamin Peirce and his students in the first half of this period. Then, from 1890 until around 1920, while our country was becoming a great power economically, basic mathematical research of high quality, mostly in traditional areas of analysis and theoretical celestial mechanics, was carried on by several faculty members.
    [Show full text]
  • Brocade Vyatta Network OS Data Sheet
    DATA SHEET Brocade Vyatta Network OS HIGHLIGHTS A Network Operating System for the Way Forward • Offers a proven, modern network The Brocade® Vyatta® Network OS lays the foundation for a flexible, easy- operating system that accelerates the adoption of next-generation to-use, and high-performance network services architecture capable of architectures meeting current and future network demands. The operating system was • Creates an open, programmable built from the ground up to deliver robust network functionality that can environment to enhance be deployed virtually or as an appliance, and in concert with solutions differentiation, service quality, and from a large ecosystem of vendors, to address various Software-Defined competitiveness Networking (SDN) and Network Functions Virtualization (NFV) use cases. • Supports a broad ecosystem for With the Brocade Vyatta Network OS, organizations can bridge the gap optimal customization and service between traditional and new architectures, as well as leverage existing monetization investments and maximize operational efficiencies. Moreover, they can • Simplifies and automates network compose and deploy unique, new services that will drive differentiation functions to improve time to service, increase operational efficiency, and and strengthen competitiveness. reduce costs • Delivers breakthrough performance flexibility, performance, and operational and scale to meet the needs of any A Proven, Modern Operating efficiency, helping organizations create deployment System The Brocade Vyatta Network OS new service offerings and value. Since • Provides flexible deployment options separates the control and data planes in 2012, the benefits of this operating to support a wide variety of use cases software to fit seamlessly within modern system have been proven by the Brocade SDN and NFV environments.
    [Show full text]
  • Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS LAN Interfaces Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004724-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • What Is a Virtual Private Network?
    C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure such as the Internet or service provider backbone network. The shared service provider backbone network is known as the VPN backbone and is used to transport traffic for multiple VPNs, as well as possibly non-VPN traffic. VPNs provisioned using technologies such as Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits (VC) have been available for a long time, but over the past few years IP and IP/Multiprotocol Label Switching (MPLS)-based VPNs have become more and more popular. This book focuses on describing the deployment of IP- and IP/MPLS-based VPNs. The large number of terms used to categorize and describe the functionality of VPNs has led to a great deal of confusion about what exactly VPNs are and what they can do. The sections that follow cover VPN devices, protocols, technologies, as well as VPN categories and models. VPN Devices Before describing the various VPN technologies and models, it is useful to first describe the various customer and provider network devices that are relevant to the discussion. Devices in the customer network fall into one of two categories: • Customer (C) devices—C devices are simply devices such as routers and switches located within the customer network. These devices do not have direct connectivity to the service provider network. C devices are not aware of the VPN. • Customer Edge (CE) devices—CE devices, as the name suggests, are located at the edge of the customer network and connect to the provider network (via Provider Edge [PE] devices).
    [Show full text]
  • Time-Sensitive Networks Over 5G
    Time-sensitive networks over 5G Bachelor’s thesis Häme University of Applied Sciences Information and Communications Technology Spring 2020 Kaarlo Skogberg TIIVISTELMÄ Tieto- ja viestintätekniikka Hämeen Ammattikorkeakoulu Tekijä Kaarlo Skogberg Vuosi 2020 Työn nimi Aikakriittiset verkot 5G:n yli Työn ohjaaja /t Marko Grönfors (HAMK), Toni Huusko, Juhani Kerovuori TIIVISTELMÄ Opinnäytetyön tarkoitus oli tuottaa vertailu reaaliaikaisista kommunikaa- tiokeinoista nosturin ja etäohjausaseman välille 5G-mobiiliverkon yli. Kent- täväyliä tarvitaan nosturin kanssa kommunikointiin, mutta koska nämä ovat pääosin tason 2 protokollia ja eivät reitity luontaisesti 5G-verkossa täytyy kenttäväylän verkkoliikenne tunneloida. Työssä tutkittiin erilaisia Ethernet-pohjaisia kenttäväyliä sekä tunnelointiteknologioita, jotka kyke- nevät tunneloimaan tason 2 verkkoliikennettä. Tason 2 tunnelointi mah- dollistaa suoran kommunikaation kahden paikallisverkon välillä. Kaikkien työssä tutkittujen Ethernet-pohjaisten kenttäväylien sekä tunnelointipro- tokollien täytyi olla sopivia käytettäväksi teollisessa ympäristössä valituilla verkkolaitteistolla. Työtä varten tutkitun tiedon perusteella esitetään, että käytettävä kenttä- väylä sekä tunnelointiprotokolla tulisi valita saatavilla olevan verkkolait- teiston sekä muun infrastruktuurin perusteella. Kenttäväylää valittaessa reaaliaikaiset vaatimukset olivat käyttötarkoitukseen nähden kevyet, joka avaa enemmän vaihtoehtoja kenttäväylää valittaessa. Yrityksessä käyte- tään jo Profinetia, joka soveltuu mainiosti käyttötarkoitukseen.
    [Show full text]
  • Vyos Documentation Release Current
    VyOS Documentation Release current VyOS maintainers and contributors Jun 04, 2019 Contents: 1 Installation 3 1.1 Verify digital signatures.........................................5 2 Command-Line Interface 7 3 Quick Start Guide 9 3.1 Basic QoS................................................ 11 4 Configuration Overview 13 5 Network Interfaces 17 5.1 Interface Addresses........................................... 18 5.2 Dummy Interfaces............................................ 20 5.3 Ethernet Interfaces............................................ 20 5.4 L2TPv3 Interfaces............................................ 21 5.5 PPPoE.................................................. 23 5.6 Wireless Interfaces............................................ 25 5.7 Bridging................................................. 26 5.8 Bonding................................................. 27 5.9 Tunnel Interfaces............................................. 28 5.10 VLAN Sub-Interfaces (802.1Q)..................................... 31 5.11 QinQ................................................... 32 5.12 VXLAN................................................. 33 5.13 WireGuard VPN Interface........................................ 37 6 Routing 41 6.1 Static................................................... 41 6.2 RIP.................................................... 41 6.3 OSPF................................................... 42 6.4 BGP................................................... 43 6.5 ARP................................................... 45 7
    [Show full text]
  • Preview - Click Here to Buy the Full Publication
    This is a preview - click here to buy the full publication IEC TR 62357-200 ® Edition 1.0 2015-07 TECHNICAL REPORT colour inside Power systems management and associated information exchange – Part 200: Guidelines for migration from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) INTERNATIONAL ELECTROTECHNICAL COMMISSION ICS 33.200 ISBN 978-2-8322-2795-4 Warning! Make sure that you obtained this publication from an authorized distributor. ® Registered trademark of the International Electrotechnical Commission This is a preview - click here to buy the full publication – 2 – IEC TR 62357-200:2015 © IEC 2015 CONTENTS FOREWORD ........................................................................................................................... 6 INTRODUCTION ..................................................................................................................... 8 1 Scope .............................................................................................................................. 9 2 Normative references ...................................................................................................... 9 3 Terms, definitions, abbreviated terms, acronyms and conventions ................................. 13 3.1 Terms and definitions ............................................................................................ 13 3.2 Abbreviations ........................................................................................................ 14 3.3 Conventions .........................................................................................................
    [Show full text]
  • ¾Sthetik/Ästhetisch
    308 ¾sthetik/ästhetisch ¾sthetik/ästhetisch Einleitung: Zur Aktualität des ¾sthetischen (engl. aesthetics, aesthetic, aesthetical; frz. esthØtique; ital. estetica, estetico; span. estØtica, Der Begriff ­¾sthetik¬, im zweiten Drittel des estØtico; russ. 1stetika, 1stetiheskoe) 18. Jh. von Alexander Gottlieb Baumgarten ge- prägt, um die als niedere Erkenntnisvermögen dis- Einleitung: Zur Aktualität des ¾sthetischen; kriminierten Sinne philosophisch zu legitimieren, 1. Wandel der ¾sthetik; 2. Selbstreflexion der ¾sthetik; hat in Deutschland Karriere gemacht. Bevor er a) Erfahrung contra Wahrnehmung; b) Ethik und ¾sthe- sich auch auûerhalb seines Ursprungslandes durch- tik; 3. ¾sthetisierung; I. Der europäische Kontext setzen konnte, hat es fast anderthalb Jahrhunderte einer deutschen Gründung; II. Die Institutiona- lisierung der ¾sthetik; 1. Der Weg zu Baumgartens gebraucht. Nach weiteren hundert Jahren ist nun ­Aesthetica¬; 2. ¾sthetik als Lebenskunst: Der felix der Begriff ¾sthetik weltweit ebenso allgemein aestheticus bei Baumgarten; 3. ­¾sthetik¬ und die ­Theo- wie von seinem ursprünglichen Bedeutungsum- rien der schönen Wissenschaften und Künste¬; 4. ¾stheti- fang entfernt. Daran muûte erinnert werden. sche Pathologie; 5. Der Streit um die neue Wissenschaft; »Pourquois appeler esthØtique un jugement de goßt? III. Kant: Transzendentale ¾sthetik und Kritik des Geschmacks; IV.¾sthetik als Philosophie der schö- [¼] Le jugement de goßt n'est pas un jugement de nen Kunst; 1. Die romantische Kritik der ¾sthetik; connaissance, il n'est pas ­logique¬ mais subjectif et 2. Hegels ¾sthetikbegriff; V.Der europäische Be- donc esthØtique: rapport à l'affect (aisthesis).«1 Man griffstransfer; 1. Frankreich; a) EsthØtique ± ­cette hat von einer »aesthetic world-view« gesprochen science d'importation¬. Von der ­thØorie des sensations¬ zur ­science du beau¬ und ­philosophie des beaux-arts¬; und ¾sthetik sogar eine »guiding science in a gene- b) Zwischen Künstlerästhetik und wissenschaftlicher ral epistemology of the modern age« genannt, die ¾sthetik; 2.
    [Show full text]
  • Implementing SES Network Duplication a Best Practices Guide
    Implementing SES Network Duplication A Best Practices Guide. SIP Enablement Services 5.1 Avaya ABSTRACT This application note is a tutorial on Avaya SIP Enablement Services Network Duplication from a implementation focus. SES Network Duplication basics, protocol examples and rationale are discussed as a Best Practice. The customer is always free to implement SES Network Duplication in any other method they choose for any reasons. The intent of this document is to provide guidelines on implementing Avaya’s SES Network Duplication from a best practices data network view. External posting: www.avaya.com. Application Note June 2008 COMPAS ID 136114 All information in this document is subject to change without notice. Although the information is believed to be accurate, it is provided without guarantee of complete accuracy and without warranty of any kind. It is the user’s responsibility to verify and test all information in this document. Avaya shall not be liable for any adverse outcomes resulting from the application of this document; the user accepts full responsibility. © 2008 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. or Avaya ECS Ltd., a wholly owned subsidiary of Avaya Inc. and may be registered in the US and other jurisdictions. All trademarks identified by ® and ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other registered trademarks or trademarks are property of their respective owners. Table of Contents 1) Introduction-------------------------------------------------------------------------------------------------------------------------------3
    [Show full text]