Many network engineers find the entire world of telecom to be confusing—especially as papers are peppered with a lot of acronyms. If any part of the networking world is more obsessed with acronyms than any other, the telecom world, where the traditional phone line, subscriber access, and network engineering collide, reigns as the “king of the hill.”
Recently, while looking at some documentation for the CORD project, which stands for Central Office Rearchitected as a Data Center, I ran across an acronym I had not seen before—vOLT-HA. An acronym with a dash in the middle—impressive! But what is, exactly? To get there, we must begin in the beginning, with a PON.
There are two kinds of optical networks in the world, Active Optical Networks (AONs), and Passive Optical Networks (PONs). The primary difference between the two is whether the optical gear used to build the network amplifies (or even electronically rebuilds, or repeats) the optical signal as it passes through. In AONs, optical signals are amplified, while ins PONs, optical signals are not amplified. This means that in a PON, the optical equipment can be said to be passive, in that it does not modify the optical signal in Continue reading
AI Hits the Right Notes: Artificial intelligence-generated music is reshaping the industry, but that’s not such a bad thing, notes Billboard.com. AI won’t replace the artists we love or end creativity, but it could empower creators with new songwriting and other tools, the story suggests.
Drilling for AI: Oil producers are also turning to AI to help them with several tasks, according to an interview with oil executive Philippe Herve of SparkCongnition, published in Houston’s Chron.com. AI can assist oil producers with predictive maintenance of their expensive field equipment and help them make sense of all the data they collect, he said.
Collateral damage for app ban: Russia has attempted to shut down messaging app Telegram, after the service refused to provide authorities encryption keys to its software. It’s not going so well, however. Russian’s attempts to block the app have inadvertently knocked out a bunch of small business websites in the country, reports the New York Times. Telegram attempted to get around the ban by shifting its service to U.S. Web hosts Google Cloud and Amazon Web Services, while repeatedly changing its IP address. In response, Russia shut down huge blocks of subnets instead of trying Continue reading

Because iptables was never meant to do what it does
Take a Network Break! The US and British governments have accused Russian state actors of compromising routers and other network infrastructure, the United States forbids American companies from selling components to Chinese telecom firm ZTE, and Huawei rethinks its US strategy.
Cisco releases notes on its 9500 switches and UADP silicon, IBM releases a mainframe that takes the same space as a traditional 19-inch server rack, and VMware shares rise on rumors that Dell won’t reverse-merge with it.
Arista’s share price stumbles, and then recovers; Cisco ditches the Spark brand name; a Cisco security exec says we’re all screwed; and the United States is the leading source of botnet attacks in the world.
Find links to all these stories just after our sponsor message.
InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.
Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices – US-CERT
Huawei, Failing to Crack U.S. Market, Signals a Change in Tactics – The New York Times
ZTE might look to judicial remedies after the U.S. ban; Huawei lays off its Washington, D.C. liason; and Twitter bans ads from Kaspersky Labs.
As AI and ML begin to reach their full potential, the race is on between network administrators and attackers to implement the technologies into their procedures, for better or for worse.
Earlier Cisco dropped the band information, and now we have the bag information too! The bag this year is a …
The post Cisco Live 2018 – The BAG! appeared first on Fryguy's Blog.
Link – https://www.safaribooksonline.com/library/view/how-sre-relates/9781492030645
Quick Read – Few Pages
Other Books which are related to SRE
-> Site Reliability Engineering: How Google Runs Production Systems
Few Points that I liked
– Quick read , hardly an hour
– Intro on how Devops got introduced
– what needs to be improved – Key Idea “No More Silos”
– stress on non-localization of knowledge, lack of collaboration
– New Job Role called SRE – Site Reliability Engineering
– Operations is a Software problem and Work to minimize Toil are some best examples of productivity and how we should view
– Key Idea – “Automate This Year’s Job Away” and “It’s Better to fix-it over-selves than blame someone else”
Good Read to understand the over picture of SRE Role and some of the
work Discipline Ideas.
-Rakesh
I am sure you are asking yourself what is up with that title? Well, as you can tell from the …
The post Up for a House Party? ready to go The Distance? are you Coming home? like Refugee? Wanted Dead or Alive? appeared first on Fryguy's Blog.
Evaluator Group study provides insight into how companies are deploying solid-state storage systems.
The widespread attacks exploiting a Cisco flaw illustrate how tools to streamline management of large networks can be targeted by hackers to launch large-scale assaults.
When I started this blog, I embraced some free services, like Disqus or Google Analytics. These services are quite invasive for users’ privacy. Over the years, I have tried to correct this to reach a point where I do not rely on any “privacy-hostile” services.
Google Analytics is an ubiquitous solution to get a powerful analytics solution for free. It’s also a great way to provide data about your visitors to Google—also for free. There are self-hosted solutions like Matomo—previously Piwik.
I opted for a simpler solution: no analytics. It also enables me to think that my blog attracts thousands of visitors every day.
Google Fonts is a very popular font library and hosting service,
which relies on the generic Google Privacy Policy. The
google-webfonts-helper service makes it easy to self-host any font
from Google Fonts. Moreover, with help from
pyftsubset, I include only the characters used in this
blog. The font files are lighter and more complete: no problem
spelling “Antonín Dvořák”.
Another month has swooshed by and it’s time for a refreshed list of upcoming webinars:
All you need to have to attend all these live sessions is a current ipSpace.net webinar subscription.
Virtual Private LAN Service or VPLS is a Layer 2 overlay or tunnel that allows for the encapsulation of ethernet frames (with or without VLAN tags) over an MPLS network.
https://tools.ietf.org/html/rfc4762
VPLS is often found in Telco networks that rely on PPPoE to create centralized BRAS deployments by bringing all of the end users to a common point via L2.
MikroTik VPLS example (https://wiki.mikrotik.com/wiki/Transparently_Bridge_two_Networks_using_MPLS)
The idea for this post came out of a working session (at the bar of course) at WISPAmerica 2018 in Birmingham, Alabama.
There was a discussion about how to create redundancy for VPLS tunnels on multiple routers. I started working on this in EVE-NG as we were talking about it.
The goal is creating highly available endpoints for VPLS when using them to deploy a public subnet that can be delivered to any tower in the WISP. The same idea works for wireline networks as well.
As IPv4 becomes harder to get, ISPs like WISPs, without large blocks of public space find it difficult to deploy them in smaller subnets. The idea behind breaking up a /23 or /24 for example, is that every Continue reading