Orchestration is often used interchangeably with automation. The reality is these terms are very different. Understanding the distinction is important. It’s time to set the record straight.
One of my subscribers sent me a nice email describing his struggles to master Ansible:
Some time ago I started to hear about Ansible as the new power tool for network engineer, my first reaction was “What the hell is this?” I searched the web and found many blah blahs about it… until I landed on your pages.
He found Ansible for Networking Engineers material sufficient to start an automation project:
Read more ...There have been some important developments towards improving routing security over the past few weeks, with announcements at NLNOG and AusNOG, as well as from Cloudflare about commitments to validate IP prefixes and reduce route leaks and hijacks. This supports the work we’ve being doing with the MANRS initiative to raise awareness of this issue, and to persuade network operators to take collaborative responsibility for this critical aspect of the Internet.
Cloudflare to deploy RPKI
Cloudflare has been a long-time advocate of routing security, and during their recent Crypto Week, they announced that they’ll be deploying RPKI on their networks. Resource Public Key Infrastructure (RPKI) allows IP address prefixes and AS numbers to be cryptographically verified (using Route Origin Authorization), and therefore provides some assertion that the holders of these have the right to announce them. The use of RPKI is included as one of the four MANRS actions “Global Validation – facilitating validation of routing information on global scale” which includes the creation of ROAs and the maintenance of accurate data in Internet Routing Registries (IRRs).
Cloudflare also announced GoRTR, which is an open-source implementation of the RPKI to Router (RTR) protocol (see RFC 6810). This is Continue reading
DT will use its fiber infrastructure to connect 5,000 Telefónica cell sites in Germany to support 3G, 4G LTE, and planned 5G services.
The company added a network friending service to its analytics platform, allowing its customers to benchmark their network performance against others’.
As the Director of Technology for the Southern California Tribal Chairmen’s Association I’ve been working with Native communities in San Diego County and Southern Riverside County of California in the United States for the past seventeen years. With a long background in Dot Com graphic design exposed to networking and web servers, the transition into technology was an obvious one.
A descendant of the Cree Nation with ancestors hailing from Norway and Finland may partially explain why I’ve been tagged a “cyber warrior for broadband.” I am 6’4” with long hair. Maybe it’s because I sketch in metal to build cyborg arms. But I believe it has more to do with the fact that I have lived in and among Southern California reservations since 2001, working with a team of local people, solving a myriad issues related to connectivity. We’ve come a long way, connecting thousands of homes to the Internet. Several thousand remain, but we are getting closer.
But more needs to happen.
The views, voices and knowledge of Indigenous people need to be included in the policy and tech that help build the Internet. If we’re not part of it, we’re literally written out of it.
So, Continue reading
Counting Up the Benefits that Leaf-Spine Architecture Brings to Enterprise Networks
If your network, like most, is growing in size and complexity, perhaps it’s time to consider whether the traditional three-tier network architecture has run its course. It’s becoming apparent that a flatter, two-tier leaf spine network topology can bring dramatic changes in the way we manage networks – with as good or better performance.
Common enterprise network challenges
For decades we’ve been building networks based on the three-tier model: access, aggregation and core. Typical enterprise environments based on this model can easily comprise hundreds or thousands of individual networking devices, creating numerous challenges for implementation and operations teams to overcome in managing and maintaining the networks.
Sure, the teams have lots of software tools to manage and monitor the infrastructure, but they often have little to no integration with each other. Ongoing configuration management along with upgrades, policy and security changes therefore become exceedingly complex and time-consuming, often requiring administrators to log into each device, one at a time, to make changes.
And all the while, the network is often not efficiently utilizing bandwidth due to the use of Spanning Tree Protocol (STP). While the network is likely built Continue reading
Both groups say they have created end-to-end offerings that will compete with traditional, hardware-centric RAN vendors.
The turnkey model is designed to help service providers get into NFV without spending years to build their own telco clouds.
Radcom restructures; Extreme Networks CFO steps down; TIP shakes up its leadership.
Over the course of a given month, hundreds of Internet-impacting “events” are visible within the Oracle Internet Intelligence Map. Many are extremely short-lived, lasting only minutes, while others last for hours or days; some have a minor impact on a single metric, while others significantly disrupt all three metrics. In addition, for some events, the root cause is publicly available/known, while for other events, digging into the underlying data helps us make an educated guess about what happened. Ultimately, this creates challenges in separating the signal from the noise, triaging and prioritizing that month’s events for review in this blog post.
Having said that, in September we observed Internet disruptions due to exams, power outages, extreme weather, and submarine cable issues, as well as a number of others with unknown causes. Additionally, a third test of nationwide mobile Internet connectivity took place in Cuba.
As noted in our August post, ETECSA (the Cuban state telecommunications company) carried out two tests of nationwide mobile Internet connectivity, which were evident as spikes in the DNS query rates from Cuba. In a Facebook post, they noted, “On August 14th was a first test that measured levels of traffic congestion and Continue reading
Download a copy of our research brief aimed at providing enterprises with multi-clouds challenges the means of assessing how SD-WANs can help with their multi-cloud deployments.
Before deploying a multi-cloud strategy, there are four myths about multi-cloud security that need debunking.
GlobalData predicts that an “insatiable trend” of cloud provider product launches will grow the cloud services market in the Asia-Pacific region to $55.3 billion in 2022.
AI battles the fake news: Can Artificial Intelligence combat all the fake news that’s out there? An article in Forbes looks at several ways fake news fighters are using AI, but the author casts some doubt on these approaches. Ultimately, humans are the problem, the article says: “The willingness to believe sensational information is a real phenomenon and debunking false information does not always change people’s minds.”
Fake tweets: As social networks take steps to fight against fake news, some still have a way to go. Twitter, for example, is still flooded with sham accounts that generate more than 1 million tweets a day, reports CBS News. Twitter disputed the study the story is based on, noting it has suspended more than 70 million suspicious accounts in May and June.
Tiny infiltrations: Chinese hackers have used tiny microchips to gain access to computers at 30 U.S. companies, including Apple and Amazon, Bloomberg reports. Both companies disputed the report, and the U.K.’s National Cyber Security Centre appeared to support the denials later in the week, Reuters says.
Blockchain’s bright future: There were several reports this week focused on the growth projections of the blockchain technology, with the blockchain Continue reading