Are you an Intelligent fool ?

Most fundamental network design attribute should be simplicity.   When you have a simple network, you can have secure, flexible , scalable, understandable , in fact all important design requirements can be achieved.   But having simplicity is easy to say, hard to achieve.   On the other hand, some amount of complexity is required, as […]

The post Are you an Intelligent fool ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The new branch office SD-WAN model

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts:1. Public cloud is driving a lightweight edge security model Most people agree that SD-WAN can facilitate service chaining, and a selective backhaul model is interesting to many enterprises that want to concentrate next-generation firewall services in larger locations. But with the rapid growth of distributed content in public cloud applications (even from Microsoft and Salesforce, who long resisted this trend that Google pioneered) it’s increasingly counterproductive to backhaul browsing traffic long distances from the end users. It reduces performance, and adds significant load at hubs on the network — not ideal when this can represent 80 percent or more of the traffic.To read this article in full or to leave a comment, please click here

Is your network ready for the Internet of Things?

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

Beware n1wireless.com: Bait & Switch

Over the weekend, I ordered an Apple Airport Extreme wireless router from n1wireless.com. The price was great, and their site stated they had 90 in stock. This afternoon, I received from them via e-mail one of the oldest sales tricks there is–the bait and switch.

With the bait and switch technique, the victim is lured by a low price on a desirable product (the bait). The vendor of the low-priced product claims to be out of the bait, offering a different product at a higher price (the switch). N1Wireless suggested that instead of what I had ordered, I spend $50 more on an Apple Time Capsule product.

I applaud n1wireless.com for their bold ethical choices, but respectfully decline the opportunity to spend more money on a product I don’t want.

The lesson is not a new one. If something is too good to be true, then it probably is. Really, I should know better. I had a similar experience with a different vendor several months back selling a TV at a surprisingly low price. After two weeks of waiting for the order to ship, I had to call support to find out that the TV was on backorder, Continue reading

Beware n1wireless.com: Bait & Switch

Over the weekend, I ordered an Apple Airport Extreme wireless router from n1wireless.com. The price was great, and their site stated they had 90 in stock. This afternoon, I received from them via e-mail one of the oldest sales tricks there is–the bait and switch.

With the bait and switch technique, the victim is lured by a low price on a desirable product (the bait). The vendor of the low-priced product claims to be out of the bait, offering a different product at a higher price (the switch). N1Wireless suggested that instead of what I had ordered, I spend $50 more on an Apple Time Capsule product.

I applaud n1wireless.com for their bold ethical choices, but respectfully decline the opportunity to spend more money on a product I don’t want.

The lesson is not a new one. If something is too good to be true, then it probably is. Really, I should know better. I had a similar experience with a different vendor several months back selling a TV at a surprisingly low price. After two weeks of waiting for the order to ship, I had to call support to find out that the TV was on backorder, Continue reading

IDG Contributor Network: Is the end of net neutrality a threat to IoT development?

The rapid spread of the internet of things quickly revolutionized how companies operated and how consumers interacted with their favorite apps and devices. Today, cars, homes, and even thermostats are all digitally connected, sharing information with one another and making consumer’s lives easier than ever before. But is this stunning phenomenon now in danger?The Federal Communications Commission has put forward a proposal under the guise of “internet freedom” that could very well spell out the end of the internet of things. The gutting of net neutrality rules could pave the way towards an unregulated future, in which the fate of the internet rest in the hands of massive corporations.To read this article in full or to leave a comment, please click here

What is containerd ?

containerd

We have done a few talks in the past on different features of containerd, how it was designed, and some of the problems that we have fixed along the way.  Containerd is used by Docker, Kubernetes CRI, and a few other projects but this is a post for people who may not know what containerd actually does within these platforms.  I would like to do more posts on the featureset and design of containerd in the future but for now, we will start with the basics.

I think the container ecosystem can be confusing at times. Especially with the terminology that we use. Whats this? A runtime. And this? A runtime…  containerd as the name implies, not contain nerd as some would like to troll me with, is a container daemon.  It was originally built as an integration point for OCI runtimes like runc but over the past six months it has added a lot of functionality to bring it up to par with the needs of modern container platforms like Docker and Kubernetes.

containerd

Since there is no such thing as Linux containers in the kernelspace, containers are various kernel features tied together, when you are building a large Continue reading

The OSPF Two Part Metric

Looking at the capabilities of any given protocol running in our networks today, it certainly seems there are few use cases left the protocol cannot support. In fact, modern interior gateway protocols have become so capable that it almost seems like we only need one to support everything. This is not reality, of course—there are many places where a specialized protocol would do better than a general purpose one, and there are still many use cases current protocols cannot support. One such use case, for OSPF, illustrated below, uses a two part metric to solve a very specific problem, as illustrated below.

On the left side of this diagram you can see the “typical” broadcast network. Originally common in what used to be called local area networks, these sorts of broadcast segments are actually more common on metro edges and wireless networks today than in a campus or data center. Anyone familiar with OSPF should already know what the problem is with this sort of configuration—if you build an adjacency between every pair of routers illustrated here, you end up with just too much state. For instance—

  • Each pair of routers in the network will form an adjacency, and hence Continue reading