Author Archives: Russ
Author Archives: Russ
The post Worth Reading: Creating an IXP in Denver appeared first on 'net work.
The paper in question is from 2008, and the remedies have already been implemented in every BGP implementation I know of (in fact, getting rid of the scanner is something that just went into FR Routing). The paper can be found here, and a presentation based on the paper can be found here. They use a different example than mine in the paper—it’s a bit more subtle.
In this case, the abstraction is treating an AS as a single “thing” to provide stability in the larger routing system. But any time you have an abstraction, including summarization and aggregation, there is always some possibility the abstraction will leak. Here the leak is an internal route metric change “leaking” into an actual change in the path through the network, although both paths still exist. There are more subtle changes, such as a route metric change causing an update to be sent even though the path itself hasn’t even changed, but I chose this example to make it easier to understand.
The post Leaky Abstraction: An Example appeared first on 'net work.
The post Worth Reading: The rise of the conversational interface appeared first on 'net work.
The post Worth Reading: Cisco’s identity crisis appeared first on 'net work.
The post Worth Reading: Ransomware for Dummies appeared first on 'net work.
The post Worth Reading: Five jobs robots will take first appeared first on 'net work.
Buffering packets in a network is both good and bad. It is good because a buffer can hold packets from one stream while another stream’s packets are being processed, to take up and release short bursts of traffic, to hold and then release packets when there is a very short interruption on the wire (or during a route change), and in many other situations. However, queues are bad when there is a standing queue, which means a particular flow always has some number of packets in a particular queue along the path between the source and the destination. This normally occurs at the narrowest point along the path, or rather the link with the lowest bandwidth. In a previous post, I looked at BBR, a change to the way TCP computes its window sizes, that attempts to reduce the amount of traffic “in flight” between a sender and receiver to reduce the number of packets being held in a particular buffer along the way.
This post will consider another solution: CoDel. CoDel is essentially an improved tail drop mechanism that provides the correct signals to TCP to slow down its send rate, or rather to reduce the window size (and Continue reading
The post Worth Reading: Redliner appeared first on 'net work.
Just a few notes on the blog site in general. I’ve rebuilt the sixty books pages without tables. I don’t know if this is better, but it does load a bit faster. I’ve also added links to my GoodReads and Feedly profiles just in case you’re interested in what I’m currently reading/read on a regular basis. I didn’t include all the RSS feeds I read in the shared Feedly profile, just general, culture, and technology.
The post Administravia 030417 appeared first on 'net work.
The post Worth Reading: The digital age produces binary outcomes appeared first on 'net work.
The post Worth Reading: Current trends in machine learning appeared first on 'net work.
The post Worth Reading: The data deletion landscape appeared first on 'net work.
The post On the ‘net: LinkedIn’s DC Design Principles appeared first on 'net work.
The post Worth Reading: The rise of SSL based threats appeared first on 'net work.
I was at Cisco Live in Berlin last week, and I came away with a question: why no YANG?
Here is a YANG model represented in YIN—this one describes an interface in Quagga, and is easy to read:
YANG can be expressed in many ways, such as YIN, or in a model format (which is still easy to read), or in json format. This is an example of HTML, taken from the Vimeo site:
The YIN representation of YANG is XML, and XML is also a superset of HTML.
The post Why no YANG?? appeared first on 'net work.
The post Worth Reading: How to bury a breach notification appeared first on 'net work.