Archive

Category Archives for "Networking"

New to the INE Course Library – Implementing Inter-VLAN Routing

This course covers the basics of implementing inter-VLAN routing by explaining the theory behind two common methodologies, as well as their implementation on Cisco routers and switches. By the end of this course students will be able to explain the differences between “Router-On-A-Stick” and “Switched Virtual Interfaces,” as well as how to implement inter-VLAN routing using either of these techniques.


Why You Should Watch:

Virtually all organizations that implement VLANs into their switched networking topologies also need to know how to route IP traffic between those VLANs. Knowing the techniques available to accomplish this kind of routing is essential whether you are managing a network, or simply pursuing a networking certification (like the Cisco CCNA).

Many learners are confused about the differences between VLANs and SVIs (Switched Virtual Interfaces) as well as their inter-relationship. This course is meant to clarify any confusion you may have between those differences, and teach you both the theory and implementation (utilizing Cisco IOS software) of Inter-VLAN Routing.


Who Should Watch:

This course is intended for anyone wanting to learn about inter-VLAN routing with an emphasis on the techniques to do so using Cisco routers and switches. A basic familiarity with the Cisco IOS command Continue reading

IXP Graphs are an Eyesore

Too many IXPs (and networkers in general) are using horrible outdated methods of graphing data. These are an ugly eyesore, and should be updated to something from this century. Big IXPs in particular have no excuse: they have the resources to do better.

IXPs: Invest, Spend, Drop Prices?

Two years ago Dave Temkin from Netflix presented at NANOG 67, talking about The Real Cost of Public IXPs (warning: PDF).

This caused a bit of a stir. As El Reg put it:

[According to Dave Temkin] The internet exchange industry is ripping customers off, charging too much for features people don’t need, and spending millions on staff salaries, unnecessary marketing and social events.

You can argue amongst yourselves as to how much IXPs should invest, how closely their port prices should track transit costs, etc. Or maybe you just like all the free drinks, dammit.

I think that if they’re going to spend money rather than reduce prices, they should spend it on something I care about: Data visualization. Most IXPs traffic graphs are an eyesore, they’re outdated, and it’s time they were fixed.

Ugly Eyesores

Here’s some typical traffic graphs from some of the biggest IXPs in the world:

DE-CIX

Continue reading

IXP Graphs are an Eyesore

Too many IXPs (and networkers in general) are using horrible outdated methods of graphing data. These are an ugly eyesore, and should be updated to something from this century. Big IXPs in particular have no excuse: they have the resources to do better.

IXPs: Invest, Spend, Drop Prices?

Two years ago Dave Temkin from Netflix presented at NANOG 67, talking about The Real Cost of Public IXPs (warning: PDF).

This caused a bit of a stir. As El Reg put it:

[According to Dave Temkin] The internet exchange industry is ripping customers off, charging too much for features people don’t need, and spending millions on staff salaries, unnecessary marketing and social events.

You can argue amongst yourselves as to how much IXPs should invest, how closely their port prices should track transit costs, etc. Or maybe you just like all the free drinks, dammit.

I think that if they’re going to spend money rather than reduce prices, they should spend it on something I care about: Data visualization. Most IXPs traffic graphs are an eyesore, they’re outdated, and it’s time they were fixed.

Ugly Eyesores

Here’s some typical traffic graphs from some of the biggest IXPs in the world:

DE-CIX

Continue reading

Kernel of Truth episode 5.5 — Greg Farro talks Voyager

Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Castbox and Stitcher!

Click here for our previous episode.

If you enjoyed our previous episode about hyper-converged infrastructure, then you’re in for a real treat — the infamous Greg Ferro of Packet Pushers is back for a special BONUS episode of Kernel of Truth! We learned that once you get Greg and JR talking, it’s nearly impossible to get them to stop. So, we let them keep going and recorded an extra episode all about Voyager. Greg’s got questions about our open packet optical platform, and JR’s got answers. You’ll be impressed with how much awesome info and discussion they can fit into a mini episode!

Like what you’re hearing and want to talk about it with fellow Kernel of Truth fans? Good news! We’ve got a new Cumulus community forum for the podcast where you can chat with other podcast and networking aficionados. Be sure to check it out!

As always, you can tweet any questions, feedback or topics you want us to discuss at @cumulusnetworks and use the hashtag #KernelOfTruth — we want to hear from you, and give you content that you want to Continue reading

Businesses need better automation to regain control of their data centers

The cloud continues to grow in popularity as businesses look to take advantage of digital trends. However, the term “cloud” is multi-definitional and means different things to different types of organizations. In the small-business segment, cloud likely means software as a service (SaaS), as those organizations want turnkey applications offered on a pay-as-you-go model. For larger companies, cloud means public infrastructure as a service, such as Amazon Web Services or Microsoft Azure.  [ Related: How to plan a software-defined data-center network ] Private clouds are alive and kicking For large businesses, the cloud likely means hybrid where private data centers make up most or even all of the cloud infrastructure. The ZK Research 2018 Global Cloud Forecast projected that by 2020, there would be more workloads in private clouds than in public clouds or available as legacy on-premises workloads. (Note: I am an employee of ZK Research.)To read this article in full, please click here

Businesses need better automation to regain control of their data centers

The cloud continues to grow in popularity as businesses look to take advantage of digital trends. However, the term “cloud” is multi-definitional and means different things to different types of organizations. In the small business segment, cloud likely means software as a service (SaaS), as those organizations want turnkey applications offered on a pay-as-you-go model. For larger companies, cloud means public infrastructure as a service, such as Amazon Web Services or Microsoft Azure. Private clouds are alive and kicking For large businesses, the cloud likely means hybrid where private data centers make up most or even all of the cloud infrastructure. The ZK Research 2018 Global Cloud Forecast projected that by 2020, there would be more workloads in private clouds than in public clouds or available as legacy on-premises workloads. (Note: I am an employee of ZK Research.)To read this article in full, please click here

[Sponsored] Short Take – Forward Networks

In this sponsored Network Collective Short Take, Brandon Heller, Co-Founder and CTO of Forward Networks, joins Network Collective to talk about how network verification and modeling are empowering network operators to increase efficiency, reduce mistakes, and shorten the mean-time-to-resolution when troubleshooting network issues.

Forward Networks does this through a complete and accurate mathematical model of the way your network operates, allowing you to quickly assess traffic flows and operational issues in your network without needing to query multiple devices manually.

Having an accurate model of your network also empowers you to validate changes before ever touching your production environment, giving you confidence that the change you are implementing will achieve the desired outcome.

For more technical details, short demo videos, and a chance to try Forward on your network to gain greater insight, head on over to http://forwardnetworks.com/collective.

 

Brandon Heller
Guest
Jordan Martin
Host
Eyvonne Sharp
Host

The post [Sponsored] Short Take – Forward Networks appeared first on Network Collective.

Safe Online, Safe On Land: Promoting Safe Internet Use to Children in Kenya

On February 16th this year, MediaNet Works and the Internet Society Kenya Chapter launched “Safe Online, Safe On Land” a 12-month project that seeks to promote safe Internet usage and practices among children in Kenya. With funding from the Internet Society’s Beyond the Net Grants Program the project anticipates to reach 700 children, targeting Koinonia Community, four children’s homes, one secondary school, and three other schools in Ngong, Kajiado County.

In addition, 12 teachers, 15 child protection and social workers, 10 journalists from both the community and mainstream media, including the Bloggers Association of Kenya (BAKE), will benefit from this project.

Justification of the Project

The launch of this project coincided with media coverage of Internet and social media safety issues in the country. Cases of online child abuse and human trafficking have recently featured in local media. Consequently, the National Assembly on 26 April, 2018, passed the Computer Misuse and Cybercrimes Bill which is set to be presented to the president for assent. The Bill’s offenses relevant to this project include publication of fake news, pornography, cyberterrorism, cybersquatting, and child pornography.

To set the ball rolling consultative meetings between representatives of MediaNet Works and Koinonia Community were held Continue reading

The Cargo Cult of Google Tools

You should definitely watch this amazing video from Ben Sigelman of LightStep that was recorded at Cloud Field Day 4. The good stuff comes right up front.

In less than five minutes, he takes apart crazy notions that we have in the world today. I like the observation that you can’t build a system more than three or four orders of magnitude. Yes, you really shouldn’t be using Hadoop for simple things. And Machine Learning is not a magic wand that fixes every problem.

However, my favorite thing was the quick mention of how emulating Google for the sake of using their tools for every solution is folly. Ben should know, because he is an ex-Googler. I think I can sum up this entire discussion in less than a minute of his talk here:

Google’s solutions were built for scale that basically doesn’t exist outside of a maybe a handful of companies with a trillion dollar valuation. It’s foolish to assume that their solutions are better. They’re just more scalable. But they are actually very feature-poor. There’s a tradeoff there. We should not be imitating what Google did without thinking about why they did it. Sometimes the “whys” will apply Continue reading

What is Nmap? Why you need this network mapper

Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within. While there is a wealth of monitoring utilities available for network mapping and security auditing, nothing beats Nmap's combination of versatility and usability, making it the widely acknowledged de facto standard.What is Nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.To read this article in full, please click here

What is Nmap? Why you need this network mapper

Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within. While there is a wealth of monitoring utilities available for network mapping and security auditing, nothing beats Nmap's combination of versatility and usability, making it the widely acknowledged de facto standard.What is Nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.To read this article in full, please click here

What is Nmap? Why you need this network mapper

Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within. While there is a wealth of monitoring utilities available for network mapping and security auditing, nothing beats Nmap's combination of versatility and usability, making it the widely acknowledged de facto standard.What is Nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.To read this article in full, please click here