I long while ago I stumbled upon an excellent resource describing why distributed systems are hard (what I happened to be claiming years ago when OpenFlow was at the peak of the hype cycle ;)… lost it and found it again a few weeks ago.
If you want to understand why networking is hard (apart from the obvious MacGyver reasons) read it several times; here are just a few points:
Read more ...Hi,
Yesterday I took the AWS Solutions Architect Associate and passed it which means I’m now certified. I started studying for this exam around the August time frame. I had wanted to get some exposure to public cloud to broaden my skill set and AWS was the natural one to go after first considering their dominant position on the market. My goal is to do the networking specialty in order to know all of the networking products inside of AWS. I also have a project I’m working on now in AWS which helps with both motivation, knowledge and hands-on experience.
So, what was the exam like?
I don’t know if it was pure shock at first but I felt very uneasy in the beginning of the exam. The questions I got felt very different to the material and questions I had based my studies on. After a while I felt a bit better but it was still a tough exam for me. I had to really think through all of my answers and only a couple of questions, mostly the ones on networking, I felt confident answering immediately. The exam did feel balanced though covering a broad range of topics Continue reading

The 103rd meeting of the IETF starts tomorrow in Bangkok which is the first time that an IETF meeting has been held in the city.
The Internet Society’s Internet Technology Team is as always highlighting the latest IPv6, DNSSEC, Securing BGP, TLS, and IoT related developments, and we’ll also be covering DNS Privacy and NTP Security from now on. This is discussed in detail in our Rough Guide to IETF 103, but we’ll also be bringing you daily previews of what’s happening each day as the week progresses.
Below are the sessions that we’ll be covering in the coming week. Note this post was written in advance so please check the official IETF 103 agenda for any updates, room changes, or final details.
Monday, 5 November 2018
Tuesday, 6 November 2018
Building virtualised network topologies has been one of the best ways to learn new technologies and to test new designs before implementing them on a production network. There are plenty of tools that can help build arbitrary network topologies, some with an interactive GUI (e.g. GNS3 or EVE-NG/Unetlab) and some “headless”, with text-based configuration files (e.g. vrnetlab or topology-converter). All of these tools work by spinning up multiple instances of virtual devices and interconnecting them according to a user-defined topology.
Most of these tools were primarily designed to work on a single host. This may work well for a relatively small topology but may become a problem as the number of virtual devices grows. Let’s take Juniper vMX as an example. From the official hardware requirements page, the smallest vMX instance will require:
This does not include the resources consumed by the underlying hypervisor, which can easily eat up another vCPU + 2GB of RAM. It’s easy to imagine how quickly Continue reading
Arista also said that due to the tariffs on some Chinese components that have been implemented by the U.S. government, it is adding a universal 3.3 percent add-on charge for worldwide customers.
The software initially supported AWS and Azure, and the company extended this cost-comparison and governance tool to on-premises Nutanix environments.
Cisco developed a four-step model for IT operations maturity showing where organizations are now and where they would like to be in two years.
Whether you’re starting out on a fresh playing field or diving into a mud pool of decades-old complexity, designing and deploying a new or modernized data center is a rewarding endeavor; not just for the engineers and architects, but also for the businesses that reap the benefits of agility, scalability, and performance that come along with it.
And the first step on that road is to talk. The initial conversations with thought leaders, business strategists, and technical architects are the most pivotal in the discovery phase of any large project. It is at this phase that the box is forming, and questions must be asked outside of it to shape its dimensions. To transform the network, you must be prepared to ask challenging questions that drive conversations around open networking, automation, modularity, scalability, segmentation and re-usability. Before vendor selection, it is essential to compile a list of business and technical requirements founded upon a set of guiding principles.
Here are seven to keep in your pocket:
1. The network architecture should use standards-based protocols and services
2. The network should be serviceable without downtime
3. The network architecture should promote automation
4. The network should be consumable
5. Physical boundaries Continue reading
To understand where next-gen communications will be tomorrow, look to the 5G trials of today.
The company offers open source-based software platforms that allow enterprises to manage distributed application infrastructure. It competes against companies like Puppet and Chef.
Verizon outsources IT Department to Infosys; Wikileaks exposes Amazon's data centers; Nokia cuts thousands of jobs.
I recently sat with Kireeti Kompella and Gavin Cato to talk about current and future changes in network architecture over at SDXcentral.
The company also enhanced its Predix edge capabilities to include analytics and device management.
A Dell spokesperson said the company will file a legal response later today and called Icahn’s lawsuit “unfounded.”
Gartner's recent 2018 Magic Quadrant report for WAN Edge Infrastructure provides a good overview of the SD-WAN market but its viewpoints may be a bit old-fashioned.

The amount of freedom on the global Internet has declined for the eighth straight year, with a group of countries moving toward “digital authoritarianism,” according to a new report from Freedom House.
A number of factors, including the spread of false rumors and hateful propaganda online, have contributed to an Internet that “can push citizens into polarized echo chambers that pull at the social fabric of the country,” said the report, released Thursday. These rifts often give aid to antidemocratic forces, including government efforts to censor the Internet, Freedom House said.
During 2018, authoritarians used claims of fake news and of data breaches and other scandals as an excuse to move closer to a Chinese model of Internet censorship, said the report, cosponsored by the Internet Society.
“China is exporting its model of digital authoritarianism throughout the world, posing a serious threat to the future of free and open Internet,” said Sanja Kelly, director for Internet Freedom at Freedom House. “In order to counter it, democratic governments need to showcase that there is a better way to manage the Internet, and that cybersecurity and disinformation can be successfully addressed without infringing on human rights.”
Thirty-six countries sent representatives Continue reading
Service provider are driving IPv6 deployments in the US and globally. On today's IPv6 Buzz podcast we talk about why with guest Jeff Doyle. We discuss address depletion, the problems with Carrier-Grade NAT as a workaround, and more.
The post IPv6 Buzz 012: Why Service Providers Are Driving IPv6 Deployments appeared first on Packet Pushers.