Author Archives: Network Collective
Author Archives: Network Collective
In this episode of History of Networking, Jeff Tantsura (Chair of the IETF Routing Area Working Group and Consulting VP of Network Architecture at Futurewei) joins Network Collective to discuss the origins and history of Segment Routing.
Episode Links:
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Jeff Tantsura – Segment Routing appeared first on Network Collective.
In this Community Roundtable episode, returning guests Russ White and Nick Russo start our three part deep dive into the Border Gateway Protocol, or BGP, with a look at terminology, how peer relationships form, the differences between internal and external BGP, and scaling techniques.
Show Links
https://tools.ietf.org/html/rfc4271
https://www.ietf.org/rfc/rfc1771.txt
Show Notes
Overview
Terminology
In this episode of History of Networking, Alistair Woodman joins us to discuss the beginnings of commercial VoIP including a look at early protocols, CTI and the early days of ATM versus Frame-Relay versus IP.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Alistair Woodman – VoIP appeared first on Network Collective.
In this episode of History of Networking, Alistair Woodman joins us to discuss the beginnings of commercial VoIP including a look at early protocols, CTI and the early days of ATM versus Frame-Relay versus IP.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Alistair Woodman – VoIP appeared first on Network Collective.
Whether it’s a single GRE tunnel or a full Datacenter fabric, network overlays have played significant role in empowering network engineers to implement policy beyond simple IP reachability. In episode 16 of Network Collective we take a broad look at the types of overlays available to use in our networks, why you might want to implement an overlay, and some of the things to watch out for when employing overlay networking. Joining the NC hosts are two excellent guests: Ron Fuller, currently an SE at VMware on the NSX product team, and Warren Jackson, Technical Architect at WWT with a focus on SD-WAN technology.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 16 – Overview of Overlays appeared first on Network Collective.
Whether it’s a single GRE tunnel or a full Datacenter fabric, network overlays have played significant role in empowering network engineers to implement policy beyond simple IP reachability. In episode 16 of Network Collective we take a broad look at the types of overlays available to use in our networks, why you might want to implement an overlay, and some of the things to watch out for when employing overlay networking. Joining the NC hosts are two excellent guests: Ron Fuller, currently an SE at VMware on the NSX product team, and Warren Jackson, Technical Architect at WWT with a focus on SD-WAN technology.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 16 – Overview of Overlays appeared first on Network Collective.
In this episode of History of Networking on Network Collective, Roland Dobbins from Arbor Networks joins us to talk about his role in mitigating distributed denial of service (DDoS) attacks on the internet.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Roland Dobbins – DDoS appeared first on Network Collective.
In this episode of History of Networking on Network Collective, Roland Dobbins from Arbor Networks joins us to talk about his role in mitigating distributed denial of service (DDoS) attacks on the internet.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Roland Dobbins – DDoS appeared first on Network Collective.
In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Off the Cuff – Disaggregation appeared first on Network Collective.
In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Off the Cuff – Disaggregation appeared first on Network Collective.
Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.
Show Notes
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.
Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking.
Show Notes
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Fred Baker – RAVEN and Internet Surveillance appeared first on Network Collective.
In episode 15, Pete Welcher and Chris Kane join us to talk about what exactly characterizes a well run network. Is it great documentation? Is it consistent application of best practices? Maybe it’s process and procedure? Join our guests, and the decades of experience they bring, as they sit around the virtual roundtable to share their thoughts on the topic.
Show Notes
Design
Operations
In episode 15, Pete Welcher and Chris Kane join us to talk about what exactly characterizes a well run network. Is it great documentation? Is it consistent application of best practices? Maybe it’s process and procedure? Join our guests, and the decades of experience they bring, as they sit around the virtual roundtable to share their thoughts on the topic.
Show Notes
Design
Operations
Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.
Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.
Donnie Savage joins Network Collective to talk about his role in the history of EIGRP. From its early implementations to moving this formerly fully proprietary protocol through the IETF, Donnie has played a significant role in guiding EIGRP to where it is today.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Donnie Savage – EIGRP appeared first on Network Collective.
In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 14 – Digging Deep into the IS-IS Routing Protocol appeared first on Network Collective.
In a return to our routing protocol series, Russ White and Nick Russo join Network Collective to talk about some of the intricacies of the IS-IS routing protocol. While not usually found in enterprises, Service Providers have used IS-IS as the underlay to their MPLS networks and it is starting to make an appearance as the underlay to several newer enterprise technologies. If you’ve been curious about how it works, and how it is different than what you use today, this show is for you.
Show Links
https://www.iso.org/standard/30932.html
https://tools.ietf.org/html/rfc1142
https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm
Show Notes
Radia Perlman joins Network Collective to talk about the history of the Spanning Tree Protocol. Love it or hate it, it’s been a fundamental part of every Ethernet network for the past 30 years and isn’t likely to fade away any time soon.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Radia Perlman – Spanning Tree appeared first on Network Collective.