Archive

Category Archives for "Networking"

How the Lenca are Restoring the Past to Build their Future

The Internet has the potential to enable Indigenous communities to continue living on remote traditional lands without diminishing their access to services and information. The potential can go a long way towards closing the digital divide and offers new opportunities while preserving Indigenous culture.

In the ongoing debate about what difference the digital makes to the concept of Indigeneity itself, the voices of Indigenous people are what has been missing. It should be left up to community members to be caught up in this age of information and build the future on their own terms.

This is the story of Lenca people of Azacualpa, an Indigenous community of Yamaranguila in Intibucá, Honduras. In June 2017 they decided to start their relationship with technology by creating Radio Azacualpa, a radio station run by women, with the support of Cultural Survival’s Community Media Grants Project. It was a dream come true.

The radio tagline “La voz de las Mujeres” – the voice of women –  says it all. “One of our goals as a radio station is to achieve recognition of our rights as women and to achieve equality,” explains Maria Santos, leader of the Azacualpa community.

In 2018, the Lenca decided Continue reading

VMware Cloud on AWS with Direct Connect: NSX Networking and vMotion to the Cloud with Demo

Check out my prior below blogs here on VMware Network Virtualization blog on how NSX is leveraged in VMware Cloud on AWS to provide all the networking and security features. These prior blogs provide a foundation that this blog post builds on. In this blog post I discuss how AWS Direct Connect can be leveraged with VMware Cloud on AWS to provide high bandwidth, low latency connectivity to a SDDC deployed in VMware Cloud on AWS. This is one of my favorite features as it provides high bandwidth, low latency connectivity from on-prem directly into the customer’s VMware Cloud on AWS VPC enabling better and consistent connectivity/performance while also enabling live migration/vMotion from on-prem to cloud! I want to to thank my colleague, Venky Deshpande, who helped with some of the details in this post. Continue reading

Where Is My Feature Request?

Getting a feature request implemented by your vendor can be a long and painful process. In this post we will take a look at some of the reasons feature request processes take so long and what a customer can do to avoid some of the pain and suffering.

Where will Microsoft spend $5B on IoT?

Microsoft’s announcement of $5 billion in new IoT investment is a public demonstration of the company’s commitment to the internet of things, but it's not immediatly clear what it will spend all that money on.In a statement announcing the new spending – to be spread out over the next four years – Microsoft cited research from A.T. Kearney that said IoT will bring a nearly $2 trillion productivity increase to the global economy and a $177 billion reduction in business costs by the end of the decade.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] There are a lot of use cases for IoT in the enterprise, and Microsoft listed several customer wins in its announcement, including Johnson Controls, Kohler and  the Alaska Department of Transportation. Gartner research vice president for AI and IoT Mark Hung said that it’s possible to divide those cases into internal and external uses.To read this article in full, please click here

IDG Contributor Network: Intent-based networking can turn your data center into a digital crime scene

An important side effect of digital transformation is that your network is likely to become a digital crime scene. As such, it needs a systematic approach to identify the culprit. In this analogy, a crime can be equivalent to a network outage or gray failure. And this is where intent-based networking (IBN) can help.The general approach in solving a crime like this is to collect as much information as possible, as soon as possible, and to narrow down the pool of suspects. So, let’s see via an example what role IBN plays in all this.Digital crime scene profiling Without “intent” you don’t even know that a crime has been committed. Finding traces of blood in a room in a blood bank or hospital are expected. Finding traces of blood in a room of a home of a missing person is a different matter. But without intent it’s hard to distinguish a blood bank from a home. In a similar manner, dropping a packet of an intruder or forbidden traffic source is a good thing. Dropping a packet of a customer because of a misconfigured ACL is a bad thing. Intent helps you differentiate the two.To Continue reading

IDG Contributor Network: Intent-based networking can turn your data center into a digital crime scene

An important side effect of digital transformation is that your network is likely to become a digital crime scene. As such, it needs a systematic approach to identify the culprit. In this analogy, a crime can be equivalent to a network outage or gray failure. And this is where intent-based networking (IBN) can help.The general approach in solving a crime like this is to collect as much information as possible, as soon as possible, and to narrow down the pool of suspects. So, let’s see via an example what role IBN plays in all this.Digital crime scene profiling Without “intent” you don’t even know that a crime has been committed. Finding traces of blood in a room in a blood bank or hospital are expected. Finding traces of blood in a room of a home of a missing person is a different matter. But without intent it’s hard to distinguish a blood bank from a home. In a similar manner, dropping a packet of an intruder or forbidden traffic source is a good thing. Dropping a packet of a customer because of a misconfigured ACL is a bad thing. Intent helps you differentiate the two.To Continue reading

Why and how to deploy Voyager

In Part I of this blog series, “What is the open packet optical switch, Voyager?”, we discussed the challenges and remedies for providing additional bandwidth for intra and inter data center connections. DWDM is a powerful technology that provides hundreds of gigabits of bandwidth over hundreds or thousands of kilometers using just a fiber pair. We also reviewed some information about DWDM networks and transponder functionality. Voyager provides all the functionality of Cumulus Linux running on a Broadcom Tomahawk based switch and integrates the transponders into the switch itself, all in 1RU. This makes it the first open and fully integrated box operating at DWDM, Layer 2 and Layer 3 in 1RU, making it extremely flexible.

Incorporating routing, switching and DWDM in one node could mean fewer boxes needed for the network, since DWDM functionality could be incorporated directly into border leafs. Because it runs Cumulus Linux (CL), all CL data center functionality, such as VXLAN Routing with EVPN, is also supported. For example, a pair of Voyager nodes can be used as VXLAN routing centralized routers with EVPN, hosting VXLAN VTEPs, running MLAG, and provide the long distance DWDM connectivity all in one box!

Voyager also Continue reading

ONOS traffic analytics

Open Network Operating System (ONOS) is "a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance, and abstractions to make it easy to create applications and services." The open source project is hosted by the Linux Foundation.

Mininet and onos.py workflow describes how to run ONOS using the Mininet network emulator. Mininet allows virtual networks to be quickly constructed and is a simple way to experiment with ONOS. In addition, Mininet flow analytics describes how to enable industry standard sFlow streaming telemetry in Mininet, proving a simple way monitor traffic in the ONOS controlled network.

For example, the following command creates a Mininet network, controlled by ONOS, and monitored using sFlow:
sudo mn --custom ~/onos/tools/dev/mininet/onos.py,sflow-rt/extras/sflow.py \
--link tc,bw=10 --controller onos,1 --topo tree,2,2
The screen capture above shows the network topology in the ONOS web user interface.
Install Mininet dashboard to visualize the network traffic. The screen capture above shows a large flow over the same topology being displayed by ONOS, see Mininet weathermap for more examples.

In this case, the traffic was created by the following Mininet command:
mininet-onos> iperf h1 h3
The screen capture above shows top flows, busiest Continue reading