Myths about the drawbacks and limits of hyperconvergence software have spread due to the fact that many of these “appliance solutions in software clothing” don’t have the flexibility of a true software solution.
The annual Hackathon@AIS, in its second year, is aimed at exposing engineers from the Africa region to open Internet Standards Development. This year, the event was held 9-10 May 2018 in Dakar Senegal at the Radisson Blu Hotel during the Africa Internet Summit (AIS-2018).
The event was attended by more than 75 engineers from 15 countries including 11 fellows who were supported to attend the event. The event featured participants with English and or French-speaking backgrounds encouraging collaboration to work. Organized into 3 tracks, the event allowed participants to choose which track they were interested in participating in. The tracks were as follows:
1. Network Time Protocol Track
Objectives:
Facilitators:
Participants were introduced to NTP and asked to test out an IETF draft and implement it in open source NTP clients.
Outcome:
Participants were able to successfully implement draft and made presentations demonstrating their work and accomplishments.
2. Network Programmability
Objectives:
Employees are using many other means than email to communicate including text and Skype, presenting challenges for IT teams.
A while ago I found an interesting analysis of HTTP/2 behavior under adverse network conditions. Not surprisingly:
When there is packet loss on the network, congestion controls at the TCP layer will throttle the HTTP/2 streams that are multiplexed within fewer TCP connections. Additionally, because of TCP retry logic, packet loss affecting a single TCP connection will simultaneously impact several HTTP/2 streams while retries occur. In other words, head-of-line blocking has effectively moved from layer 7 of the network stack down to layer 4.
What exactly did anyone expect? We discovered the same problems running TCP/IP over SSH a long while ago, but then too many people insist on ignoring history and learning from their own experience.
Cohesity’s technology helped Schneider Electric eliminate its reliance on legacy backup and shift to a hybrid cloud approach.
CNCF Executive Director Dan Kohn said the group is focused during the second-half of this year on seeing if Kubernetes can take on a greater role in shaping the future of cloud architecture.
IPv6 Buzz is back with a new episode on how SDN could change how we think about the role IPv6 plays in the enterprise. Our guest is Tim Martin.
The post IPv6 Buzz 002: SDN And IPv6 With Tim Martin appeared first on Packet Pushers.
Virtual Routing and Forwarding (VRF) is a ubiquitous concept in networking, first introduced in the late 1990s as the control and data plane mechanism to provide traffic isolation at layer 3 over a shared network infrastructure. VRF for Linux is an excellent blog that describes the technology behind VRFs, especially as it pertains to the Linux kernel. With the introduction of support for leaking of routes, VRFs get to enjoy their isolation while also having the nous to mix and mingle.
You have a valid question there. That was certainly the initial use case for VRFs. Each VRF was intended to represent a customer of a service provider and isolation was a fundamental tenet. Each VRF had its own routing protocol sessions and IPv4 and IPv6 routing tables and route computation as well as packet forwarding was independent from other VRFs. All communication stayed within the VRF other than specific scenarios such as reaching the Internet. Hershey’s wouldn’t want to get too chatty with Lindt, right? No, VRFs weren’t meant to be gregarious.
As VRFs moved outside the realm of the service provider and started finding application elsewhere, such as in the Continue reading
Course Duration: 1hr 45min
About the Course
The modern accessibility of public, private and hybrid cloud environments has led rise to a bastion of cloud-centric practices. One of the most notable is the idea of QA and Testing in the cloud. This course will describe the concepts, methodologies and implementations of testing in a cloud environment. We will go through the full software QA lifecycle and describe where and how each component of that lifecycle can be offloaded into the cloud and further describe methods and mechanisms on how to do so effectively.
InfoVista’s VNF will be added to Huawei’s open SD-WAN service to support application monitoring and delivery capabilities, WAN optimization, and analytics.
Similar to the earlier Spectre and Meltdown bugs the new security flaw could allow access to sensitive data through a side channel. Intel ranks it as a “moderate” vulnerability.
In this interview, Karl Brown, senior director of product management for the Citrix NetScaler SD-WAN platform, talks about Citrix’s approach to SD-WAN.
In this episode of the History of Networking, we sit with Steve Crocker to discuss the history of email. This was a long session, so we split it up into two episodes; the next episode should be published next week.
This latest specification means that operators can deploy 5G without being dependent upon an underlying 4G LTE network.
Virtuosys' software relies on containers to support and secure applications. That use is similar to a cloud deployment using VMs for greater efficiency, but uses containers because VMs were considered too "heavy" to work at the edge.