Archive

Category Archives for "Networking"

Cloud Not Just Someone Else’s Computer

Cloud computing is a lot more than “someone else’s computer” and it annoys the hell out of me when people keep trotting out this tired old excuse. There is much more to service delivery than compute power. You do yourself and your customers a disservice if you don’t do your research.

A few years ago it was fashionable to dismiss cloud as “just someone else’s computer”, e.g.:

There’s T-shirts:

Someone else's Computer T-Shirt

You can even buy coffee mugs.

In a time when most cloud computing was Infrastructure as a Service, there was an element of truth to it. But…

Times Change

The problem is that there’s still people thinking this. Check these recent tweets.

These people don’t realize that the world has moved on a long way. There is much more to cloud computing than just “someone else’s computer.”

Consider a simple example, like email. To provide email services from “my computer” I also need power, cooling, rack space, servers, storage, networking, operating system, software, application configuration and maintenance, etc…not to mention the operational expertise to keep it all going.

If Continue reading

What’s behind Cisco’s comeback?

Cisco Systems Inc. (NASDAQ: CSCO) in just the last week or so has taken over the top spot for year-to-date performance among the 30 equities comprising the Dow Jones industrial average, with its shares having risen nearly 20 percent in 2018. That’s a big deal. How did it happen? What pushed Cisco beyond its best-known-router reputation to being a top performer on the DOW?A little history about Cisco Cisco has been around for nearly as long as I've been working on Unix and Linux systems. Founded in December 1984 by two Stanford University computer scientists and clearly named after San Francisco, its logo clearly depicts the two towers of the Golden Gate Bridge and its line of products have kept it a major player in routers and switches. In fact, Cisco was on top of the tech world before the dot.com meltdown. Then it plunged with the rest of the tech sector.To read this article in full, please click here

What’s behind Cisco’s comeback?

Cisco Systems Inc. (NASDAQ: CSCO) in just the last week or so has taken over the top spot for year-to-date performance among the 30 equities comprising the Dow Jones industrial average, with its shares having risen nearly 20 percent in 2018. That’s a big deal. How did it happen? What pushed Cisco beyond its best-known-router reputation to being a top performer on the DOW?A little history Cisco has been around for nearly as long as I've been working on Unix and Linux systems. Founded in December 1984 by two Stanford University computer scientists and clearly named after San Francisco, its logo clearly depicts the two towers of the Golden Gate Bridge and its line of products have kept it a major player in routers and switches. In fact, Cisco was on top of the tech world before the dot.com meltdown. Then it plunged with the rest of the tech sector.To read this article in full, please click here

Getting started with Terraform and Cloudflare (Part 1 of 2)

Getting started with Terraform and Cloudflare (Part 1 of 2)

As a Product Manager at Cloudflare, I spend quite a bit of my time talking to customers. One of the most common topics I'm asked about is configuration management. Developers want to know how they can write code to manage their Cloudflare config, without interacting with our APIs or UI directly.

Following best practices in software development, they want to store configuration in their own source code repository (be it GitHub or otherwise), institute a change management process that includes code review, and be able to track their configuration versions and history over time. Additionally, they want the ability to quickly and easily roll back changes when required.

When I first spoke with our engineering teams about these requirements, they gave me the best answer a Product Manager could hope to hear: there's already an open source tool out there that does all of that (and more), with a strong community and plugin system to boot—it's called Terraform.

This blog post is about getting started using Terraform with Cloudflare and the new version 1.0 of our Terraform provider. A "provider" is simply a plugin that knows how to talk to a specific set of APIs—in this case, Cloudflare, but Continue reading

Link Propagation 116

Welcome to Link Propagation, a Packet Pushers newsletter. Link Propagation is included in your free membership. Each week we scour the InterWebs to find the most relevant practitioner blog posts, tech news, and product announcements. We drink from the fire hose so you can sip from a coffee cup. Blogs WISP Design – Building Highly […]

A Review of RSA Conference

So, I recently went to my first RSA Conference. It’s something I’ve had on my radar for a while but never had the opportunity to do. However, with Security Field Day coming up later this year I thought it was high time I went to see what everything was about. Here are some ideas that I came up with during my pilgrimage to the big security conference.

  • It’s Huge. Like, really big. I’ve never seen a bigger conference before. I haven’t gone to Oracle OpenWorld or Dreamforce, but the size of the RSA show floor alone dwarfs anything I’ve seen. Three whole areas, including one dedicated to emerging vendors. That’s big. Almost too big in fact.
  • I Still Hate Moscone. It’s official. No conference should ever use this place again. It’s been 4 years since I railed against it and every word still applies. Doubly so this year, as RSA was being held during construction! Seriously. At this point, Moscone must be paying people to hold a convention there. RSA is too big. I don’t care if it’s cheap to ferry people up from Silicon Valley. Stop doing this to yourself and tarnishing your brand. Just go to Vegas if Continue reading

We’ve Launched Our New Bootcamps Site!

The INE Bootcamps site is finally here! We constantly strive to make our products and buying experience better, which is why we decided to give our bootcamps their very own website. As INE continues to grow, we plan on rolling out even more bootcamp dates, locations and types, all of which can now be found at bootcamps.ine.com.

What You’ll Find On Our Bootcamps Site:

  • Full description and details about CCIE Routing and Switching, Data Center, Collaboration, Service Provider and Security certifications and exams
  • Full description and details about CCNP and CCNA Routing & Switching certifications and exams
  • Full description and details about GCP Cloud Architect certification and exam
  • Detailed description of prerequisites for all tracks and vendors
  • Recommended path, outlining exactly what products you’ll need for each track and in what order to use them to ensure you pass your exams the first time
  • All of our bootcamp offerings for all tracks and vendors, including details about pricing, dates, and what to expect from each bootcamp
  • Detailed descriptions of each of our bootcamp locations


Ready to get started on your certification journey? Check out our Bootcamps Site for yourself.

Celebrating ECMP in Linux — part two

In part one of our series on ECMP, we discussed the basics of ECMP, the recent changes that have been made and Cumulus’ part in moving the ball forward for Linux networking. Now, it’s time to get a little more technical and review how advancements in ECMP development for IPv4 and IPv6 have made ECMP what it is today — and what it can be in the near future.

Setting the stage: defining our terminologies

Hashing algorithms

Hashing algorithms are the biggest component of ECMP behavior, so it makes sense for us to talk for a moment about what we specifically mean when we refer to each one.

1.) Per-packet hash
This hash was the original hashing algorithm used in the kernel’s ECMP behavior. It is trivially simple to understand as it basically uses a pseudo random number in the kernel at the time packet is being processed (jiffies) to determine which link in an ECMP bundle the traffic will use for egress. With this algorithm in place, each packet for a single flow could use a different link to get to the destination. This leads to all kinds of bad behaviors in TCP and higher level applications/protocols Continue reading

Show 387: AWS Networking – A View From The Inside

In this episode of Packet Pushers, it’s AWS networking. You use AWS and think you know what you need to know? Maybe, but our guest today can probably share a thing or two you didn t even know were things when it comes to networking in the Amazon public cloud.

Our guest is Nick Matthews, Principal Solutions Architect at Amazon Web Services. Nick focuses on networking and security.

Nick pinged us, hoping to share  his perspective on cloud networking from the inside. Come and have a look.

We talk about how networking basics do–and don’t–map to the cloud, and how the architecture of cloud applications influence network design and operations.

We also explore AWS networking elements under the hood, such as Hyperplane, and how trends such as SD-WAN and SDN influence Amazon networking.

Show Links:

AWS re:Invent 2015 | (NET403) Another Day, Another Billion Packets – Amazon (via YouTube): Eric Brandwine talks about how Amazon’s overlay network works in detail.

AWS re:Invent 2017: Another Day, Another Billion Flows (NET405) – Amazon (via YouTube): Colm MacCarthaigh talks about how AWS Hyperplane works.

Introducing the AWS Networking Competency – AWS

Firewall Deployment Continue reading

Why intent-based networking is important to the Internet of Things

Last week, Cisco made a number of product announcements that deliver the benefits of its intent-based networking (IBN) solution to Internet of Things (IoT) deployments.  Network World's Michael Cooney did a great job summarizing all the product announcements, so I won’t rehash that information, but I did want to discuss the importance of IBN to IoT.The importance of IBN to IoT IBN is something that has been theorized for almost a decade, but solutions only became available recently. The reason why there has been a lag between vision and product is that network engineers didn’t really need IBN to run their networks until recently. Environments were closed, applications were on premises, and everything was under the tight control of the IT organization.To read this article in full, please click here