The BGP specification suggests implementations should have three tables: the adj-rib-in, the loc-rib, and the adj-rib-out. The first of these three tables should contain the routes (NLRIs and attributes) transmitted by each of the speaker’s peers. The second table should contain the calculated best paths; these are the routes that will be (or are) installed in the local routing table and used to build a forwarding table. The third table contains the routes which have been sent to each peering speaker. Why three tables? Routing protocols standards are (sometimes—not always) written to provide the maximum clarity to how the protocol works to someone who is writing an implementation. Not every table or process described in the specification is implemented, or implemented the way it is described.
What happens when you implement things in a different way than the specification describes? In the case of BGP and the three RIBs, you can get duplicated BGP updates. What do parrots and BGP have in common describes two situations where the lack of a adj-rib-out can cause duplicate BGP updates to be sent.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Bill Yeager – Routing Software appeared first on Network Collective.
Barefoot Networks has announced the newest version of its Tofino programmable ASIC. Tofino 2 offers 12.8Tbps total throughput and promises greater efficiency thanks to its 7nm design.
The post BiB 065: Barefoot Networks Announces A New 12.8Tbps Tofino ASIC appeared first on Packet Pushers.
Digital replicas interact with real systems and mimic changes that occur - as they occur. Digital twin adoption is growing due to the low cost, high storage and compute capacity of IoT and cloud.
In the market overview section of the introductory part of data center fabric architectures webinar I made a recommendation to use larger number of fixed-configuration spine switches instead of two chassis-based spines when building a medium-sized leaf-and-spine fabric, and explained the reasoning behind it (increased availability, reduced impact of spine failure).
One of the attendees wondered about the “right” number of spine switches – does it has to be four, or could you have three or five spines. In his words:
Read more ...
It affects all Kubernetes-based products and services, and it gives hackers full administrative privileges on any compute node being run in a Kubernetes cluster.
In 2019 the company will deploy these routers at several thousand towers to support its mobile 5G network.
IT professionals list Microsoft Azure as the best cloud provider in terms of cost effectiveness, having the most advanced tools, reliability, and having the best support for container environments.
Almost 900 vendors competed for the 10-year award. The Navy selected six.

The winner of this year’s Chapterthon was announced this Tuesday, 4 December during InterCommunity 2018.
Chapterthon is a global Internet Society (ISOC) Chapters and Special Interest Groups (SIGs) marathon, where all the Internet Society members can participate by developing a project within a timeline and budget to achieve a common goal. The project winner is selected by the community through online vote.
This year our community worked on the Internet of Things (IoT) – The future is ours to shape.
Every year, the Chapterthon brings enthusiasm and excitement amongst our community. During two and half months, 43 Chapters and Special Interest Groups (SIGs) from across the globe worked alongside to bring awareness on the Internet of Things (IoT) to their communities. They ran over 200 training sessions and workshops, engaging students, entrepreneurs, and local governments. They organized national campaigns, their projects were mentioned in local newspapers, and their message was brought to the most remote places. The Chapters also developed IoT applications that may in the future improve the lives of people in their communities, and amongst some of the projects are improved transport systems, agriculture, energy management, home protection, and healthcare.
The projects that received the highest number Continue reading
Cisco’s SON technology works in multi-vendor deployments based on any combination of cellular technologies. It supports RAN nodes from any major vendor as well as multiple data-source vendors.
This is Barefoot’s second generation release of its P4-programmable Tofino Ethernet switch ASIC family.
A bunch of service providers from around the world are starting to implement ONAP code into their networks.

In September, the European Commission presented a legislative proposal to address the removal of terrorist content online. There has been significant political pressure, particularly as the EU elections of 2019 approach, towards internet companies taking on increased responsibility in the area of terrorist propaganda online. This proposal would be a marked move from various voluntary initiatives taken up by some social media companies in recent times towards a legal responsibility framework for many.
While appreciating the concerns around terrorism, Cloudflare is not only troubled by the late presentation of this proposal – which leaves inadequate time for a thorough review before this EU legislative term expires – but also much of the substance. Along with others such as CDT, GSMA/ETNO and Mozilla, we have significant concerns around the legal implications, practical application and possible unintended consequences of the proposal, some of which we outline below. Furthermore, we believe that little evidence has been presented as to the necessity of the proposed measures.
The Commission’s proposal does not account for the complexity and range of information society services having a storage component - not all services have the same Continue reading