Archive

Category Archives for "Networking"

The real challenge to achieving 5G: the networks

Everyone seems focused on whether major device makers can ship 5G-ready phones. And indeed they are coming forward with devices (e.g., Samsung, Huawei) based on chip designs from major manufacturers (e.g., Qualcomm, Huawei, Intel).But while many are focused on the device challenges (such as will Apple’s iPhones use Qualcomm or Intel modems, or design their own?) and the potentially billions of connected “things” expected in the next few years, the devices are just the tip of the iceberg when it comes to 5G. The real “below the water line” challenges, the more than 80% of the challenges in making 5G real, are in updating and creating networks that can truly provide all of the variety of services and capabilities that we expect.To read this article in full, please click here

Heavy Networking 440: A Wireless Deployment Crash Course

Today's Heavy Networking is a crash course in executing a new wireless deployment for engineers who are wired, not wireless, experts. We explore how and why to gather user and technical requirements, understanding the RF environment, channel management, and more. Our guest is Robert Boardman.

The post Heavy Networking 440: A Wireless Deployment Crash Course appeared first on Packet Pushers.

Juniper opens SD-WAN service for the cloud

Juniper has taken the wraps off a cloud-based SD-WAN service it says will ease the management and bolster the security of wired and wireless-connected branch office networks.The Contrail SD-WAN cloud offering expands on the company’s existing on-premise (SRX-based) and virtual (NFX-based) SD-WAN offerings to include greater expansion possibilities – up to 10,000 spoke-attached sites and support for more variants of passive redundant hybrid WAN links – and topologies such as hub and spoke, partial, and dynamic full mesh, Juniper stated. To read this article in full, please click here

Working with variables on Linux

A lot of important values are stored on Linux systems in what we call “variables,” but there are actually several types of variables and some interesting commands that can help you work with them. In a previous post, we looked at environment variables and where they are defined. In this post, we're going to look at variables that are used on the command line and within scripts.User variables While it's quite easy to set up a variable on the command line, there are a few interesting tricks. To set up a variable, all you need to do is something like this:To read this article in full, please click here

BrandPost: AI Ops: Let the data talk

Marie Fiala, Director of Portfolio Marketing for Blue Planet at Ciena The catalysts and ROI of AI-powered network analytics for automated operations were the focus of discussion for service providers at the recent FutureNet conference in London. Blue Planet’s Marie Fiala details the conversation.Do we need perfect data? Or is ‘good enough’ data good enough? Certainly, there is a need to find a pragmatic approach or else one could get stalled in analysis-paralysis. Is closed-loop automation the end goal? Or is human-guided open loop automation desired? If the quality of data defines the quality of the process, then for closed-loop automation of critical business processes, one needs near-perfect data. Is that achievable?To read this article in full, please click here

The Microsoft/BMW IoT Open Manufacturing Platform might not be so open

Last week at Hannover Messe, Microsoft and German carmaker BMW announced a partnership to build a hardware and software technology framework and reference architecture for the industrial internet of things (IoT), and foster a community to spread these smart-factory solutions across the automotive and manufacturing industries.The stated goal of the Open Manufacturing Platform (OMP)? According to the press release, it's “to drive open industrial IoT development and help grow a community to build future Industry 4.0 solutions.” To make that a reality, the companies said that by the end of 2019, they plan to attract four to six partners — including manufacturers and suppliers from both inside and outside the automotive industry — and to have rolled out at least 15 use cases operating in actual production environments.To read this article in full, please click here

Guest Introspection Re-introduction for NSX-T 2.4

(Re-)Introduction to Guest Introspection

The Guest Introspection platform has been included in NSX Data Center for vSphere for several years, mostly as a replacement for the VMware vShield Endpoint product and providing customers the ability to plug in their VMware certified partner solutions to allow agent-less anti-virus and anti-malware protections for a variety of data center workloads.

 

The Benefit of the Guest Introspection Platform

The Guest Introspection platform provides customers several outcomes.

Simplified AV management – Manual installation of agents into the guest operating system requires massive operational overhead just getting the agents deployed out on every virtual workload, managing the agent life-cycle post deployment, and for troubleshooting issues with the in-guest agents in day 2 operations.

Guest Introspection provides a centralized management interface for deploying the agentless components to the vSphere hosts, including the security policies, all while using vSphere objects and grouping of those objects to associate the endpoint policy.  This provides granular policy creation and association in the workload environments.

Improved endpoint performance – When several or all of the virtual workloads kick off a scheduled AV scan, this can produce a massive resource drain from host resources where workloads might suffer performance concerns during Continue reading

Recovering from Network Automation Failures

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

One of my readers sent me this question:

Would you write about methods for reverting from expected new state to old state in the case automation went wrong due to (un)predictable events that left a node or network in a limbo state betwixt and between.

Like always, there’s the easy and the really hard part.

Read more ...

BrandPost: SD-WAN and Multi-Cloud Digital Transformation, Part 1: Enterprise Reality Check

This is the first in a 3-part blog series that will detail how deploying a business-driven SD-WAN edge platform can help enterprises successfully accelerate multi-cloud digital transformation initiatives.For a growing number of enterprises, a migration to the cloud is not a simple matter of deploying an application or two onto Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure or some other hosted service. It’s now a multi-cloud strategy that’s a key part of a digital transformation initiative aimed at modernizing business processes. Using multiple cloud computing services such as infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) in a single unified cloud strategy offers the ability to reduce dependence on any single vendor.To read this article in full, please click here

The Week in Internet News: Facebook Calls for New Internet Regulations

More regulation, please: Facebook CEO Mark Zuckerberg, in an op-ed in the Washington Post, called on governments to get more involved in Internet regulation, including defining harmful content and making rules on how sites should handle it. Governments should also look at new laws to protect elections, to improve consumer privacy, and to guarantee data portability, Zuckerberg said. His ideas weren’t universally embraced, however. The Electronic Frontier Foundation, in a blog post, said there were “fundamental problems” with governments policing harmful content, particularly in defining what’s harmful.

Hold my beer: Australia’s parliament didn’t take long to look at new regulations, with lawmakers passing legislation that would create three-year jail terms for social media executives and operators of other websites that do not remove violent content in an “expeditious” manner, NPR reports. Web-based services could also be fined up to 10 percent of their annual revenue for not complying with the law.

Even more laws: Singapore is the latest country to consider legislation attacking fake news. A proposed law there would require online news sites to publish corrections or warnings about stories the government decides are fake news and remove articles in extreme cases, the Straits Times reports. The Continue reading

BIER Basics

Multicast is, at best, difficult to deploy in large scale networks—PIM sparse and BIDIR are both complex, adding large amounts of state to intermediate devices. In the worst case, there is no apparent way to deploy any existing version of PIM, such as large-scale spine and leaf networks (variations on the venerable Clos fabric). BEIR, described in RFC8279, aims to solve the per-device state of traditional multicast.

In this network, assume A has some packet that needs to be delivered to T, V, and X. A could generate three packets, each one addressed to one of the destinations—but replicating the packet at A is wastes network resources on the A->B link, at least. Using PIM, these three destinations could be placed in a multicast group (a multicast address can be created that describes T, V, and X as a single destination). After this, a reverse shortest path tree can be calculated from each of the destinations in the group towards the source, A, and the correct forwarding state (the outgoing interface list) be installed at each of the routers in the network (or at least along the correct paths). This, however, adds a lot of state to the network.
Continue reading