Archive

Category Archives for "Networking"

Lock-In and SD-WAN: a Match Made in Heaven

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

I made a statement along these lines in an SD-WAN blog post and related email sent to our SDN and Network Automation mailing list:

The architecture of most SD-WAN products is thus much cleaner and easier to configure than traditional hybrid networks. However, do keep in mind that most of them use proprietary protocols, resulting in a perfect lock-in.

While reading that one of my readers sent me a nice email with an interesting question:

Read more ...

Understanding lifecycle management complexity of datacenter topologies

Understanding lifecycle management complexity of datacenter topologies Zhang et al., NSDI’19

There has been plenty of interesting research on network topologies for datacenters, with Clos-like tree topologies and Expander based graph topologies both shown to scale using widely deployed hardware. This research tends to focus on performance properties such as throughput and latency, together with resilience to failures. Important as these are, note that they’re also what’s right in front of you as a designer, and relatively easy to measure. The great thing about today’s paper is that the authors look beneath the surface to consider the less visible but still very important “lifecycle management” implications of topology design. In networking, this translates into how easy it is to physically deploy the network, and how easy it to subsequently expand. They find a way to quantify the associated lifecycle management costs, and then use this to help drive the design of a new class of topologies, called FatClique.

… we show that existing topology classes have low lifecycle management complexity by some measures, but not by others. Motivated by this, we design a new class of topologies, FatClique, that, while being performance-equivalent to existing topologies, is comparable to, or Continue reading

Join a Local IETF Viewing Hub in Africa

The Internet Engineering Task Force (IETF) is the premier Internet standards body, developing open standards through processes to make the Internet work better. It gathers a large, international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. Core Internet technologies such as DNS, routing and traffic encryption use protocols standardized at IETF.

The IETF holds three meetings yearly which are livestreamed and can be followed individually, or with others sharing similar interest at a common venue. The next IETF meeting will be held from 25-29 March 2019 in Prague. The usual audience for an IETF meeting is network engineers, system engineers, developers, and university students or lecturers in information technology fields.

The Internet Society Africa Regional Bureau is running an initiative to encourage remote participation in IETF meetings that aims to promote the work of the IETF. IETF Remote Hubs aim to raise awareness about the IETF and allow those who cannot travel to a meeting to participate in the meeting remotely. The meetings are streamed in English only.

Join one of the following IETF Remote Hubs in your area, raise your awareness about the IETF and engage in the various topics of Continue reading

Heavy Networking 436: Will QUIC Collapse The Internet?

Will the new QUIC protocol cause the Internet to collapse? Today's Heavy Networking episode tackles this question with guest Christian Huitema. QUIC is an emerging transport protocol that promises advances over TCP and the ability to innovate quickly, but could--possibly--set off an arms race as developers try to game congestion algorithms to their own benefit.

The post Heavy Networking 436: Will QUIC Collapse The Internet? appeared first on Packet Pushers.

The Multicloud We Need, But Not the One We Deserve

Large organizations are married to the VMware suite of products. We can quibble about numbers for adoption of Hyper-V and KVM, but VMware dominates the enterprise virtualization market, just as Kubernetes is the unquestioned champion of containers.

Virtual Machines (VMs) are a mature technology, created and refined before large-scale adoption of public cloud services. Cloud-native workloads are often designed for containers, and containerized workloads are designed to fail. You can tear one down on one cloud, and reinstantiate it on another. Near-instant reinastantiation is the defense against downtime.

VMs take a different approach. A VM is meant to keep existing for long periods of time, despite migrations and outages. Failure is to be avoided as much as possible. This presents a problem as more organizations pursue a multi-cloud IT strategy.

The key technology for highly available VMs is vMotion: the ability to move a VM from one node in a cluster to another with no downtime. However, as data centers themselves become increasingly virtualized, using cloud computing services such as Microsoft Azure, Google Compute Engine, and Amazon EC2, there’s a growing requirement to be able to move VMs between cloud infrastructures. This is not a supported feature of vMotion.

Routed Continue reading

Interview with Joe Onisick

With this blog, I try to inspire and mentor. One person I have a lot of respect for is Joe Onisick. I had the pleasure of interviewing Joe. Joe has really transformed himself and everything about him lately and I thought it would be nice to give you readers some more insight to his journey. Here is Joe’s story:

Q: Hi Joe, welcome to the blog! Please give the readers a short introduction of yourself.

A: I’m a technology executive who’s been in the field for 23 years, with the exception of a five-year break to serve as a US Marine. I started in network/email administration and have spent most of my career in the data center space on all aspects of delivering data center resources, up to IaaS and private-cloud.

Q: Many people probably know you best from your time at Cisco, working for the Insieme BU, responsible for coming up with ACI. What was your time at Cisco like? How were you as a person at that time?

A: I joined a startup called Insieme Networks that was in the early stages of developing what became Cisco ACI and Nexus 9000. When the product was ready to launch, Continue reading

Cisco spreads AI across Webex meetings

Cisco Webex has rolled out a package of AI-based features that brings together recently acquired technologies it says will make business meetings more efficient and intuitive.The Webex conferencing tool enhancements, which include faster meeting startup, a better way to know the people attending a meeting and facial-recognition improvements will help customers more effectively collaborate from any location, the company said. Read about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? Cisco bought Webex in 2007 for about $3.2 billion with an eye toward competing more effectively with Microsoft and other collaboration software vendors. Today Webex conferencing tools are used by over 130 million customers a month, Cisco says.To read this article in full, please click here

Cisco spreads AI across Webex meetings

Cisco Webex has rolled out a package of AI-based features that brings together recently acquired technologies it says will make business meetings more efficient and intuitive.The Webex conferencing tool enhancements, which include faster meeting startup, a better way to know the people attending a meeting and facial-recognition improvements will help customers more effectively collaborate from any location, the company said. Read about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? Cisco bought Webex in 2007 for about $3.2 billion with an eye toward competing more effectively with Microsoft and other collaboration software vendors. Today Webex conferencing tools are used by over 130 million customers a month, Cisco says.To read this article in full, please click here

IDG Contributor Network: Software-defined perimeter: Identity-centric enforced network perimeter

With the introduction of cloud, BYOD, IoT and virtual offices scattered around the globe, the traditional architectures not only hold us back in terms of productivity but also create security flaws that leave gaps for compromise.The network and security architectures that are commonly deployed today are not fit for today's digital world. They were designed for another time, a time of the past. This could sound daunting...and it indeed is.What we had in the past? Traditionally, we have had a static network and security perimeter with clear network and security demarcation points. In terms of security, the perimeter-based approach never worked. It did, however, create a multi-billion-dollar industry. But the fact is, it neither did, not will it provide competent security.To read this article in full, please click here

BrandPost: Deploying highly secure, easy to deploy and cost-effective Micro Data Centers

Industry trends such as the Internet of Things (IoT) and content distribution networks (CDNs) are driving the need for edge computing. That’s because these solutions often require low latency, high bandwidth, greater reliability, and strong security.It’s a tall order meant for Micro Data Centers (MDCs) to fulfill. An MDC is a self-contained data center architecture that offers complete IT infrastructure within a stand-alone, secure enclosure.MDCs offer a number of key advantages beyond today’s server rooms and traditional data centers. First, because they’re distributed closer to bandwidth-intensive content, MDCs can significantly reduce latency and lower costs. Secondly, it’s easy and cost-effective to add data center capacity to them anywhere and anytime it is needed – in both IT room and non-climate-controlled environments. And because MDC IT equipment is pre-installed before shipment in a self-contained and secure enclosure, it can provide physical security and protection of critical business applications.To read this article in full, please click here