Archive

Category Archives for "How does the internet work"

ACI MultiPod and how to build MultiDatacenter with Cisco ACI

What is MultiPod? ACI MultiPod was first designed to enable the spread of ACI Fabric inside a building (into two or more Pods), let’s say in two rooms at different floors, without the need to connect all the Leafs from one room to all the Spines in the other room. It was a way of simplifying the cabling and all that comes with building spread CLOS topology fabric stuff. MultiPod also saves some Leaf ports giving the fact that Pod to Pod connection through Multicast enabled IPN network connects directly to Spines. People soon realized that MultiPod will be a great solution

The post ACI MultiPod and how to build MultiDatacenter with Cisco ACI appeared first on How Does Internet Work.

What is Cisco ACI?

Hello World This is an overview of what I think Cisco ACI actually is. It uses some examples from the lab environment to show you how the things look like when you start to work with ACI. There are other articles in the works which will be online soon and which will go in details through the real configuration of ACI and best practices while doing it. What is this Cisco ACI Fabric? Cisco ACI is a datacenter network Fabric. It actually means that it is a networking system of more networking L3 switches that have a modified, next-generation OS

The post What is Cisco ACI? appeared first on How Does Internet Work.

CLOS Topology

Edson Erwin invented this highly scalable and optimized way of connecting network nodes in the 1930s and Charles Clos made the telephone nodes interconnection design using that solution. It was even before we had IP networks. He invented it in order to optimize the architecture of telephony network systems back then. It was not used in IP based network for last few decades but it experienced a big comeback with new datacenter design in the last few years. It was first invented only for scalability requirements that it solved beautifully. In new datacenter design, CLOS topology of interconnecting network devices scalability

The post CLOS Topology appeared first on How Does Internet Work.

Cisco Champion for 2019

Again I made it to the list of Cisco Champions, making this the second year in a row! I am so glad that my effort to give back to the community and to all my networking fellows out there paid off again in the shape of this recognition from Cisco. This badge is only a small thing, relating to all the community connections and sharing that my involvement with networking community via social media and this blog, made possible. It only pushes me to get even more done in the future. In 2018 I was involved in a few very challenging new

The post Cisco Champion for 2019 appeared first on How Does Internet Work.

BFD – Sub-second Failure Detection

If there’s no BFD If you have two routers directly connected, like here: In this case, it is normal that one of them will remove the routes learned from the other if the other one goes down completely. It is because the link will go to down state and the routing protocol adjacency will disappear. If two routers are connected through an L2 device (switch) like down here: In this case, when one of them goes down, it will not take down the interface of the L3 neighbour (other router) because the switch will still work fine and it will

The post BFD – Sub-second Failure Detection appeared first on How Does Internet Work.

MTU and TCP MSS

The largest chunk of bytes that a transport protocol can forward across specific medium is called MTU – Maximum Transmission Unit. If we speak about Ethernet, which is today the most common, he has by default 1522 bytes MTU. The story about MTU is that the MTU of specific protocol basically defines how much payload (or highest protocols headers + their payload) it can carry in its biggest packet, not counting his own headers. Putting more payload into single packet than the MTU allows will result in fragmentation, the process of slicing the frame into more smaller frames so that

The post MTU and TCP MSS appeared first on How Does Internet Work.

The New Way of Generating IPv6 – SLAAC EUI-64 Address Format

There was an old way of generating Interface IPv6 address using SLAAC process (Stateless autoconfiguration). You simply configured that you want SLAAC autoconfiguration and the interface IPv6 was generated by squeezing “FFFE” in hex (11111111 11111110 bits) between two parts of physical MAC address of that interface. Then, after a while, several comments came to IETF about the use of predictable Interface Identifiers in IPv6 addresses. They were pointing to the ease of correlation of host activities within the same network and across multiple networks. If Interface Identifiers are constant across networks this is negatively affecting the privacy and security of

The post The New Way of Generating IPv6 – SLAAC EUI-64 Address Format appeared first on How Does Internet Work.

Create or Edit a File on Cisco IOS Flash

How Does Internet Work - We know what is networking

There is always the option to edit a file locally on your computer in notepad++ and then upload it to Cisco device. With this trick, you can write or edit a file from Flash memory directly from Cisco IOS console. If you need it for whatever reason, maybe to change something in the config file or something else, this is the way to do it. I was using if for my next article lab where I needed a file on the flash with at least 1600 bytes so I can pull it from neighbouring router with HTTP and check some

Create or Edit a File on Cisco IOS Flash

I Became Cisco Champion for 2018

How Does Internet Work - We know what is networking

I just received an e-mail from Cisco with the notice that I was elected Cisco Champion for 2018. As Cisco says: “Cisco Champions are a group of highly influential technical experts who generously enjoy sharing their knowledge, expertise, and thoughts on the social web and with Cisco. The Cisco Champion program encompasses a diverse set of areas such as Data Center, Internet of Things, Enterprise Networks, Collaboration, and Security. Cisco Champions are located all over the world.” I must say that last 7 years of writing this blog was the primary reason why one should pick me for this flattering

I Became Cisco Champion for 2018

Link Aggregation – LACP Protocol

How Does Internet Work - We know what is networking

EtherChannel enables bundling multiple physical links connecting same devices into a single logical link. I will try to show you how it is configured and how it works. The issue with one uplink I made an example with 8 clients connected to two Cisco 3850 switches. For start, those two switches are connected together with 1G copper on Interface Ge1/23. The clients are also connected to 1G ports. In this case, when all of those four clients on the left side start simultaneously sending traffic at full speed to different computers on the right side, they will congest the uplink

Link Aggregation – LACP Protocol

Check Point Firewall VM Disk Resize

How Does Internet Work - We know what is networking

It is related to Check Point MGMT VM with R80.10 in my story, but you would as well want to resize Check Point gateway firewall hardware box or VM. I was searching for a simple solution and found different ones that didn’t work for me, so here are the steps that you need to go through when you resize your CheckPoint VM disk in vCenter and then need to expand the partition inside Check Point VM in order to use the additional space. Of course, you did choose too small HDD for your VM when you created it and now

Check Point Firewall VM Disk Resize

Celebrating 6 Years

How Does Internet Work - We know what is networking

Last month I celebrated 6 years of writing my blog. This project reached yesterday his most visited day in history with more than 1500 visitors and more than 31K all together in November. Nice to finally see someone actually reading my rumblings. It was and still is hard work of editing old posts making them better and finding new interesting stuff to write about. Blog is about computer network technologies, you know, the stuff that makes thing get to you and appear on your device’s screens so you can stare at it all the time ? Some other interesting trivia:

Celebrating 6 Years

IPv6 generated with EUI-64 has a strange bit inside

How Does Internet Work - We know what is networking

What is universal/local bit in IPv6 EUI-64 address? One of my readers contacted me with an interesting question in comments of “IPv6 – SLAAC EUI-64 Address Format” article. The question was: “How come that the ipv6 address after the prefix is 21C:C4FF:FECF:4ED0 if the mac address is 00-1C-C4-CF-4E-D0?” Of course, we all know from the previous article that EUI-64 process is taking the interface MAC address (if that is an Ethernet interface) and it creates 64 bits Interface ID with it by shimming additional FFFE (16bits in hex) in between the MAC address bits. The reader was confused with an

IPv6 generated with EUI-64 has a strange bit inside

MACSec – Media Access Control Security

How Does Internet Work - We know what is networking

Media Access Control Security or MACSec is the Layer 2 hop to hop network traffic protection. Just like IPsec protects network layer, and SSL protects application data, MACSec protects traffic at data link layer (Layer 2). MACSec is standardized IEEE 802.1AE hop-by-hop encryption that enables confidentiality and integrity of data at layer 2. It encrypts entire Ethernet packet except Source and Destination MAC addresses on any device-to-device, switch-to-switch, router-to-switch, host-to-switch directly connected wired L2 connection. If we compare MACSec with, for example IPsec, MACsec provides same security but on layer 2 for each hop separately. On each hop, packets are

MACSec – Media Access Control Security

Reflexive Access List

How Does Internet Work - We know what is networking

Some of my readers commented on my old article about reflexive access-list with issues in the configuration. I tried it in the lab again to be sure I didn’t make any mistake in the configuration example and here I’m sharing the lab and the config used. About Reflexive Access Lists Extended ACLs are a special kind of extended access-lists that have limited stateful behaviour technique implemented for TCP sessions. It is better to say that reflexive access-list is simulating stateful behaviour because it, by use of ‘established’ command, is allowing TCP packets that have the ‘ACK’ bit set but not

Reflexive Access List

Books that I like

How Does Internet Work - We know what is networking

I was planning for some time now to make a list of books I read recently, here’s the list It should be something like a book reading suggestion list in order to maybe help you pick the right materials in your networking technology learning journey. On the top are the books I used most while studying for my certs but also some of them are the books that I usually carry with me on my Kindle or PDF wherever I go. It is always a good idea to have those books on you so you can have a look at

Books that I like

Juniper Control Plane Protection

How Does Internet Work - We know what is networking

I already wrote about Control Plane Protection in one of my previous posts focused on Cisco device configuration. Here we will make the same thing on Juniper device, I was using Juniper SRX300 and Juniper SRX1500 devices in my lab. CoPP ?? Control Plane Protection (CoPP) is a method of protecting processor unit, running services on your network device, against excessive flooding. Excessive flooding of traffic aimed towards your router/firewall processor, being that valid or malicious, is always undesirable and can also be dangerous. A network device, which starts the receive more control traffic that his processor can process, will

Juniper Control Plane Protection

How to Clear Entire Configuration of your Juniper Device

How Does Internet Work - We know what is networking

If you have a Juniper device that needs to be sent to RMA or you are just putting it to some other use on your network, you will probably want to completely clear the configuration on it. There are different ways to do it for different purpose. If you want to securely wipe all data from this device and make it completely like when you received it from the store then next command is the right one to use: root@RSRX> request system zeroize This one will completely wipe your Juniper device and clear configuration together with all data from flash.

How to Clear Entire Configuration of your Juniper Device

You Know How Networks Work, Want To Know How Everything Else Works? Here’s Some Books

How Does Internet Work - We know what is networking

I know, this is not about networking but I received few great feedbacks to my posts about the matter so I decided to share with you the materials I used to write it. It’s not about networking, but it is about everything. QUANTA?! I was writing about quantum cryptography and quantum key distribution process few months ago (which are network related). When I started to write those articles I was not aware that it will take me more that two months to write something close to understandable about quantum world. As it came out, like many times before, I was in

You Know How Networks Work, Want To Know How Everything Else Works? Here’s Some Books

The Use of Graph Database in Network Complexity Analysis

How Does Internet Work - We know what is networking

Computer networks are probably the best example of graphs these days. I started therefore to consider graph database as an excellent tool for storing experimental results of my networking complexity analysis method. It’s a project that I’m doing (starting to do) in which I will try to create a better method of computer network complexity audit by combining few of already existing methods and by additionally enhancing some of their algorithms to get more precise results out of the whole thing. The idea is that most of network complexity measurement mechanism rely strongly on graph theory in which most metrics

The Use of Graph Database in Network Complexity Analysis