Archive

Category Archives for "Networking"

BrandPost: Celebrating the Rise of 400G

Ciena Helen XenosSenior Director, Portfolio Marketing The era of 400G was in full force at OFC (The Optical Fiber Communication Conference and Exhibition), and we took some time to celebrate this milestone. Here are what our customers have to say about their 400G success – and what it means for the industry.If you needed another leading indicator that 400G is the next big thing in optical networks, look no further than the OFC ’18 conference recently held in San Diego.  The show was abuzz with vendor plans for new technologies that squeeze more bandwidth than ever down an optical channel.  These 400G-capable coherent solutions offer better system performance and tunable capacity from 100G to 400G per wavelength. To read this article in full, please click here

T-25 days until Chrome starts flagging HTTP sites as “Not Secure”

T-25 days until Chrome starts flagging HTTP sites as

Less than one month from today, on July 23, Google will start prominently labeling any site loaded in Chrome without HTTPS as "Not Secure".

Checking
Domain already redirects to HTTPS
Domain will be labeled "Not Secure"
Error
Current (Chrome 67)
http:// 
Current (Chrome 67)
https:// 
July 2018 (Chrome 68)
https:// 
July 2018 (Chrome 68)
http:// 

When we wrote about Google’s plans back in February, the percent of sites loaded over HTTPS clocked in at 69.7%. Just one year prior to that only 52.5% of sites were loaded using SSL/TLS—the encryption protocol behind HTTPS—so tremendous progress has been made.

Unfortunately, quite a few Continue reading

IDG Contributor Network: The ‘made up’ jargon of networking

Like any industry, networking has a proprietary slew of acronyms and jargon that only insiders understand. Look no further than Network World’s searchable glossary of wireless terms.Turns out, multiplexing has nothing to do with going to the movies at a place with more than one theater.I also like to think that each networker has their own favorite list of terms, ready to share at a moment’s notice during family dinners, holidays and networking events … or maybe that’s just me?To read this article in full, please click here

IDG Contributor Network: The ‘made up’ jargon of networking

Like any industry, networking has a proprietary slew of acronyms and jargon that only insiders understand. Look no further than Network World’s searchable glossary of wireless terms.Turns out, multiplexing has nothing to do with going to the movies at a place with more than one theater.I also like to think that each networker has their own favorite list of terms, ready to share at a moment’s notice during family dinners, holidays and networking events … or maybe that’s just me?To read this article in full, please click here

Techniques of a Network Detective: A New Series

Put your detective hat on your head and your Network Detective badge on your lapel.  Introducing a new blog series – Techniques of a Network Detective.  This series will focus on the detective work (troubleshooting side) of our jobs as network engineers.

For over 30 years I’ve been playing in the “world of IT”. During those years there have been a lot of changes in our world. But through all that change, there has been a thread, for me, that has always remained constant. A thread and a passion that always seemed to be with me in every job over all these years.

Troubleshooting!

Being a “Network Detective” is much the same as being a regular detective in many ways.  As a Network Detective we get put on a “case” – the “Case of the Missing Packets” maybe.  We go to the crime scene and try to find answers so we can solve the “who done it”

nd1

When a “crime” happens you need to be right there interviewing the suspects, surveying the crime scene, asking the right questions.  Trying to quickly figure out what is happening, where it is happening, and why it Continue reading

How to plan a software-defined data-center network

The data-center network is a critical component of enterprise IT’s strategy to create private and hybrid-cloud architectures. It is software that must deliver improved automation, agility, security and analytics to the data center network. It should allow for the seamless integration of enterprise-owned applications with public cloud services. Over time, leading edge software will enable the migration to intent-based data-center networks with full automation and rapid remediation of application-performance issues.To read this article in full, please click here(Insider Story)

How to plan a software-defined data-center network

The data-center network is a critical component of enterprise IT’s strategy to create private and hybrid-cloud architectures. It is software that must deliver improved automation, agility, security and analytics to the data center network. It should allow for the seamless integration of enterprise-owned applications with public cloud services. Over time, leading edge software will enable the migration to intent-based data-center networks with full automation and rapid remediation of application-performance issues.To read this article in full, please click here(Insider Story)

How to plan a software-defined data-center network

The data-center network is a critical component of enterprise IT’s strategy to create private and hybrid-cloud architectures. It is software that must deliver improved automation, agility, security and analytics to the data center network. It should allow for the seamless integration of enterprise-owned applications with public cloud services. Over time, leading edge software will enable the migration to intent-based data-center networks with full automation and rapid remediation of application-performance issues.To read this article in full, please click here(Insider Story)

Packet Size, It Matters

As I mentioned in a previous post, I have been studying the materials for the Cisco CCDE. One thing that has come up only a time or two is that of MTU. MTU, or maximum transmission unit, is the maximum size a chunk of data can be for a given interface. In this article, we are speaking specifically of IP MTU and this is an important distinction that I will clarify later. Network design should incorporate a clear understanding of MTU challenges and operators need to understand what to look for when it is not properly built and configured.

A simplistic example of a problematic design is when there is a link with a smaller MTU somewhere between two endpoints capable of creating larger packets (see the image below). While this environment may work fine, understanding the interaction required between the hosts and the network devices is very important to network design.

A few years ago I wrote an article that outlined some of the behavior that can be witnessed when there are MTU discovery issues. Let’s quickly recount what path MTU discovery (PMTU-D) is, how it works, how it fails and some logic around appropriate design.

General Facts Around Continue reading