Network Collective

Author Archives: Network Collective

History Of Networking – Jeff Tantsura – Segment Routing

In this episode of History of Networking, Jeff Tantsura (Chair of the IETF Routing Area Working Group and Consulting VP of Network Architecture at Futurewei) joins Network Collective to discuss the origins and history of Segment Routing.

Episode Links:


Jeff Tantsura
Guest
Jordan Martin
Host
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Jeff Tantsura – Segment Routing appeared first on Network Collective.

Episode 17 – BGP: Peering and Reachability

In this Community Roundtable episode, returning guests Russ White and Nick Russo start our three part deep dive into the Border Gateway Protocol, or BGP, with a look at terminology, how peer relationships form, the differences between internal and external BGP, and scaling techniques.

 

Show Links

https://tools.ietf.org/html/rfc4271

https://www.ietf.org/rfc/rfc1771.txt

http://bgp.us/

 

Show Notes

Overview

  • BGP is an external gateway protocol used widely in both the public internet and with enterprise organizations
  • BGP is the only external gateway protocol and is traditionally used primarily to connect networks to other networks
  • BGP was built primarily for policy propagation to provide reliability, scalability, and control
  • BGP v4 is created which is the base version we still use today though updated over the year

 

Terminology

  • Devices running BGP are called speakers
    • A connection between two speakers is called a peering session
    • The two speakers are often called peers or neighbors
  • Network Layer Reachability Information is a key term to remember — NLRI
    • Address Families (AFs) carry NLRIs for different topologies and different kinds of reachability information (v4, v6, ethernet, mpls, etc.
  • Autonomous System–a set of bgp speakers contained within a single administrative domain (with some rather loose Continue reading

History Of Networking – Alistair Woodman – VoIP

In this episode of History of Networking, Alistair Woodman joins us to discuss the beginnings of commercial VoIP including a look at early protocols, CTI and the early days of ATM versus Frame-Relay versus IP.


Alistair Woodman
Guest
Russ White
Host
Donald Sharp
Host
Phil Gervasi
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Alistair Woodman – VoIP appeared first on Network Collective.

History Of Networking – Alistair Woodman – VoIP

In this episode of History of Networking, Alistair Woodman joins us to discuss the beginnings of commercial VoIP including a look at early protocols, CTI and the early days of ATM versus Frame-Relay versus IP.


Alistair Woodman
Guest
Russ White
Host
Donald Sharp
Host
Phil Gervasi
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Alistair Woodman – VoIP appeared first on Network Collective.

Episode 16 – Overview of Overlays

Whether it’s a single GRE tunnel or a full Datacenter fabric, network overlays have played significant role in empowering network engineers to implement policy beyond simple IP reachability. In episode 16 of Network Collective we take a broad look at the types of overlays available to use in our networks, why you might want to implement an overlay, and some of the things to watch out for when employing overlay networking. Joining the NC hosts are two excellent guests: Ron Fuller, currently an SE at VMware on the NSX product team, and Warren Jackson, Technical Architect at WWT with a focus on SD-WAN technology.


Ron Fuller
Guest
Warren Jackson
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 16 – Overview of Overlays appeared first on Network Collective.

Episode 16 – Overview of Overlays

Whether it’s a single GRE tunnel or a full Datacenter fabric, network overlays have played significant role in empowering network engineers to implement policy beyond simple IP reachability. In episode 16 of Network Collective we take a broad look at the types of overlays available to use in our networks, why you might want to implement an overlay, and some of the things to watch out for when employing overlay networking. Joining the NC hosts are two excellent guests: Ron Fuller, currently an SE at VMware on the NSX product team, and Warren Jackson, Technical Architect at WWT with a focus on SD-WAN technology.


Ron Fuller
Guest
Warren Jackson
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 16 – Overview of Overlays appeared first on Network Collective.

History Of Networking – Roland Dobbins – DDoS

In this episode of History of Networking on Network Collective, Roland Dobbins from Arbor Networks joins us to talk about his role in mitigating distributed denial of service (DDoS) attacks on the internet.


Roland Dobbins
Guest
Russ White
Host
Donald Sharp
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Roland Dobbins – DDoS appeared first on Network Collective.

History Of Networking – Roland Dobbins – DDoS

In this episode of History of Networking on Network Collective, Roland Dobbins from Arbor Networks joins us to talk about his role in mitigating distributed denial of service (DDoS) attacks on the internet.


Roland Dobbins
Guest
Russ White
Host
Donald Sharp
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Roland Dobbins – DDoS appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

History Of Networking – Fred Baker – RAVEN and Internet Surveillance

Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.

Show Notes


Fred Baker
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.

History Of Networking – Fred Baker – RAVEN and Internet Surveillance

Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.

Show Notes


Fred Baker
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.

Episode 15 – Characteristics of a Well Run Network

In episode 15, Pete Welcher and Chris Kane join us to talk about what exactly characterizes a well run network. Is it great documentation? Is it consistent application of best practices? Maybe it’s process and procedure? Join our guests, and the decades of experience they bring, as they sit around the virtual roundtable to share their thoughts on the topic.

 

Show Notes

Design

  • Keep it simple. Just because you can, doesn’t mean you should
  • Complexity is not just a networking attribute, it’s an overall system attribute
  • Proper design leads to simplicity (most of the time)
  • What technologies are simple? How do you recognize complexity? Is vendor lock-in one indicator? Network management software / API lock-in another growing one?
  • There are some pretty simple campus/user, datacenter, Internet Edge, and WAN approaches Big organizations can handle and may need a bit more complexity — or not
  • Modularity- too many moving parts that have to work together = complex

Operations

  • Transparent Network. It just works
  • Able to easily implement changes
  • Agnostic to both today’s needs and flexible to absorb tomorrow’s needs
  • Up-to-date diagrams and documentation matter
    • Organized around OSI layers
    • Documented naming conventions with fixed fields
    • MTTR e.g. from NetMRI and Continue reading

Episode 15 – Characteristics of a Well Run Network

In episode 15, Pete Welcher and Chris Kane join us to talk about what exactly characterizes a well run network. Is it great documentation? Is it consistent application of best practices? Maybe it’s process and procedure? Join our guests, and the decades of experience they bring, as they sit around the virtual roundtable to share their thoughts on the topic.

 

Show Notes

Design

  • Keep it simple. Just because you can, doesn’t mean you should
  • Complexity is not just a networking attribute, it’s an overall system attribute
  • Proper design leads to simplicity (most of the time)
  • What technologies are simple? How do you recognize complexity? Is vendor lock-in one indicator? Network management software / API lock-in another growing one?
  • There are some pretty simple campus/user, datacenter, Internet Edge, and WAN approaches Big organizations can handle and may need a bit more complexity — or not
  • Modularity- too many moving parts that have to work together = complex

Operations

  • Transparent Network. It just works
  • Able to easily implement changes
  • Agnostic to both today’s needs and flexible to absorb tomorrow’s needs
  • Up-to-date diagrams and documentation matter
    • Organized around OSI layers
    • Documented naming conventions with fixed fields
    • MTTR e.g. from NetMRI and Continue reading

History Of Networking – Donnie Savage – EIGRP

Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.


Donnie Savage
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.

History Of Networking – Donnie Savage – EIGRP

Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.


Donnie Savage
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.

History Of Networking – Donnie Savage – EIGRP

Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.


Donnie Savage
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.

Episode 14 – Digging Deep into the IS-IS Routing Protocol

In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
 


Russ White
Guest
Nicholas Russo
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 14 – Digging Deep into the IS-IS Routing Protocol appeared first on Network Collective.

Episode 14 – Digging Deep into the IS-IS Routing Protocol

In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.

 

Show Links

https://www.iso.org/standard/30932.html

https://tools.ietf.org/html/rfc1142

https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm

 

Show Notes

  • IS-IS Characteristics
    • IS-IS is a graph
      • Vertices, edges, link types, cost
      • Uses Dijkstra’s algorithm
      • Based on Type Link Value protocol (TLV) instead of fixed type fields which allows IS-IS to be very extensible
      • Similar to OSPF, but the P-node is called the DIS, not the DR, and behaves a bit differently
      • Originally built for host routing
    • Not an IP protocol
      • direct encapsulation to L2, ethertype 0xFEFE
      • Provides some inherent security benefits (very hard to reach in and attack; OSPF solved this with TTL security)
    • QoS over L2VPNs

History Of Networking – Radia Perlman – Spanning Tree

Radia Perlman joins Network Collective to talk about the history of the Spanning Tree Protocol. Love it or hate it, it’s been a fundamental part of every Ethernet network for the past 30 years and isn’t likely to fade away any time soon.


Radia Perlman
Guest
Jordan Martin
Host
Donald Sharp
Host
Russ White
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Radia Perlman – Spanning Tree appeared first on Network Collective.