If you’ve been following Embrane over the past several months, you know we’ve been focusing almost exclusively on differentiating our business in the SDN space by promoting the fact that we have been the only company securing and announcing a steady stream of paying, in-production customers. As a result, we’ve been placing less emphasis on touting the advancements we’ve made on the technology side. However, since it’s our technology leadership that’s attracting our rapidly growing customer base, it’s time to show off our technology chops too. This week our SDN leadership becomes even more evident with the introduction of our new application-centric networking solutions.
(Okay, it’s not exclusively a technology announcement since we announced another new customer, Ryan Labs Asset Management. More on them in a bit.)
While most vendors started their SDN movement from the bottom up, looking at ways to add agility at the connectivity layer (a.k.a. Layer 2), Embrane continues to take a top-down approach to the network. We focus on the network services that support, enhance and secure the ever-growing number of business applications in an enterprise data center. After all, applications drive enterprises business. The newest release of the Embrane heleos Continue reading
I can say at the beginning that more and more fellows is visiting this blog. Finally networking knowledge project did succeed to get some fans from out there so I felt the need to thank you all for visiting this place. As you can see here from the blog post list I didn’t follow this movement myself these […]
As a follow-on to my previous article on onePK – Cisco onePK: Now I Get It – I recorded a screencast in which I talk about what a onePK-enabled network is capable of. I also demonstrate two applications which make use of onePK to gather telemetry from the network and also program the network.
Please leave a comment below with any questions or feedback.
In this community show recorded at Cisco Live US 2013 in Orlando, Cooper Lees, Lauren Mahoit and Colin McNamara join Packet Pushers hosts Greg Ferro and Ethan Banks in a happy chat about the coming world of networking automation. We discuss the following high-level topics. Automation, orchestration and devops in the network is becoming an ever-bigger deal. We apply this in a Cisco […]
The post Show 154 – A Bit of Swamp Ass to Lift Your Day – CLUS 2013 Community Show appeared first on Packet Pushers Podcast and was written by Ethan Banks.
At Cisco Live US 2013 in Orlando, Packet Pushers co-host Ethan Banks was joined by CCDE program manager Elaine Lopes, CiscoPress author Russ White who was closely involved with the CCDE program creation, quad-CCIE & CCDE Scott Morris, and CCIE & CCDE Jeremy Filliben who instructs a CCDE bootcamp. We discuss (what else) how to […]
Of all the tools within the QoS toolset, congestion management tools, also known as queuing tools, provide the biggest impact on application service levels. Whenever packets enter a device faster than can exit it, congestion exists and this is where queuing tools come into play. Queuing tools are only engaged when congestion exists, otherwise packets are sent as soon as they arrive. When congestion does exist, packets must be buffered, or queued, to mitigate dropping.
Packet markings, or lack thereof, affect queuing policies, so queuing policies are complementary and have a dependence on classification and marking policies.
These two terms are often incorrectly used interchangeably – they are two different things. Scheduling determines how a frame or packet exits a device. Whenever packets enter a device faster than they can exit it, as is the case with speed mismatches (ex. Gigabit Ethernet traffic heading to a WAN interface), congestion can occur. Devices have buffers that allow the temporary storing and subsequent scheduling of these backed-up packets, and this process is called queuing.
Inbound traffic > Queuing (During congestion) > Scheduling > Outbound traffic
The first part of building a QoS policy is to identify the traffic that you need to treat preferentially (give better priority), or differentially. This is accomplished via classification and marking.
These tools can examine a number of criteria within layers 1, 2, 3, 4, and 7.
Occasionally I have to install software that is no longer available for download via the official channels. This is due to us having pretty strict standards on which IOS versions are stable and suitable for use via a bug scrub process that Cisco are party to.
I could speak to our Cisco SE and ask for the image to be provided, but it’s simpler and quicker to find a similar piece of kit on the network and FTP/SCP the image across.
I did this today, and then realised that I couldn’t rely on CCO to give me the MD5 sum for the image. A quick google tells me that I can perform a checksum on the switch using this command:
verify /md5 <file-location>:<file-name>
Location choices are:
bs: File to be verified
cns: File to be verified
flash: File to be verified
ftp: File to be verified
http: File to be verified
https: File to be verified
null: File to be verified
nvram: File to be verified
rcp: File to be verified
scp: File to be verified
system: File to be verified
tar: File to be verified
tftp: File to be verified
tmpsys: File to be verified
xmodem: File to be Continue reading
When people look at their careers, the focus pretty naturally falls to skills acquisition. Almost everyone believes that their future hinges on learning some skill or mastering some talent. Maybe you want to know more about business or strategy. Perhaps you think you need to read leadership books or find Harvard Business Review articles on […]
Can you remember your last newly hired engineer, all shiny and happy and new? Can you also remember the look on their face when they received their corporate craptop? Or maybe they received a decent laptop, but it came in a ten dollar laptop bag. The tech industry spends a lot of time and effort […]
We geeks love our tech. Really love it. I mean…really, really get down deep into a technology, decide it’s the best thing ever, and then wave the flag around high. Make the wallpaper. Wear the t-shirt. Evangelize the ignorant. Shout down the naysayers. Mock the competitors. Fan the flames of rivalry. Linux vs. Microsoft. Mac […]
One of the more useful ways to find out what is happening in the real world of network monitoring and troubleshooting is to have a look through some of the many on line forums that exist. Spiceworks Community and SolarWinds Thwack are examples but there are many more. Here you can spot trends as to […]
[This post was written by Martin Casado and Amar Padmanahban, with helpful input from Scott Lowe, Bruce Davie, and T. Sridhar]
This is the first in a multi-part discussion on visibility and debugging in networks that provide network virtualization, and specifically in the case where virtualization is implemented using edge overlays.
In this post, we’re primarily going to cover some background, including current challenges to visibility and debugging in virtual data centers, and how the abstractions provided by virtual networking provide a foundation for addressing them.
The macro point is that much of the difficulty in visibility and troubleshooting in today’s environments is due to the lack of consistent abstractions that both provide an aggregate view of distributed state and hide unnecessary complexity. And that network virtualization not only provides virtual abstractions that can be used to directly address many of the most pressing issues, but also provides a global view that can greatly aid in troubleshooting and debugging the physical network as well.
A Messy State of Affairs
While it’s common to blame server virtualization for complicating network visibility and troubleshooting, this isn’t entirely accurate. It is quite possible to build a static virtual datacenter and, assuming the vSwitch Continue reading
I hope to clear the air on what a vendor certificate (or any certificate, such as a degree/diploma/etc) is, and is not. Too many times have I heard/seen people place too little or too much stock in the single piece of paper. What a certificate is A certificate, simply put, is proof that on a […]
I had an opportunity recently to sit in a Cisco onePK lab and it opened my eyes to exactly what Cisco is doing with onePK, why it’s going to be so important as Software Defined Networking (SDN) continues to gain traction, and why onePK is different than what anyone else is doing in the industry.
onePK is a key element within Cisco’s announced Open Network Environment SDN strategy. onePK is an easy-to-use toolkit for development, automation, rapid service creation and more. It enables you to access the valuable data inside your network via easy-to-use APIs.
Since having my own eyes opened, I’ve been pondering how to explain my new found understanding in a way that others will grasp. In particular to business decision makers (BDMs) and technical decision makers (TDMs). I’m really, really, struggling to come up with a good analogy for BDMs. I’m still working on that one. Surprisingly, I’m also struggling to come up with a sound analogy that will work with the majority of TDMs that I know. Maybe I shouldn’t be so surprised at that since all the TDMs I deal with are on the infrastructure side of things (networks, storage, Continue reading