Archive

Category Archives for "Networking"

Single-Image Systems or Automated Fabrics

In the Network Automation 101 webinar and Building Network Automation Solutions online course I described one of the biggest challenges the networking engineers are facing today: moving from thinking about boxes and configuring individual devices to thinking about infrastructure and services, and changing data models which result in changed device configurations.

The $1B question is obviously: and how do we get from here to there?

Read more ...

CI/CD For Networking Part 5

Ansible AWX is the upstream open source project to Ansible Tower. For this part of the series AWX will be installed on a Centos 7 minimal host with the firewall service disabled and SELinux set to permissive. Nginx will be utilized as a reverse proxy for HTTP/S traffic to the AWX...

The Future of Cognitive Cloud Networking

Artificial Intelligence, machine and deep learning have to be among the most popular tech-words of the past few years, and I was hoping that I wouldn’t get swept away by it. But when I heard a panel on this topic at our customer event this month on the state of AI networks, I found it incredibly fascinating and it piqued my curiosity! Let me start with a note of disclaimer for readers who are expecting a deep tutorial from me. There is a vast amount of research behind models and algorithms on this topic that I will not even attempt to cover. Instead I will try to share some thoughts on the practical relevance of this promising field.

The Future of Cognitive Cloud Networking

Artificial Intelligence, machine and deep learning have to be among the most popular tech-words of the past few years, and I was hoping that I wouldn’t get swept away by it. But when I heard a panel on this topic at our customer event this month on the state of AI networks, I found it incredibly fascinating and it piqued my curiosity! Let me start with a note of disclaimer for readers who are expecting a deep tutorial from me. There is a vast amount of research behind models and algorithms on this topic that I will not even attempt to cover. Instead I will try to share some thoughts on the practical relevance of this promising field.

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

EVPN’s 4 critical benefits for digital transformation

Digital transformation demands more of everything: speed, throughput, agility and scalability. That’s why organizations are rethinking traditional layer 2 switched data center architectures and moving towards intelligent layer 3 routed network designs. With a layer 3 architecture, your data center can use proven routing protocols to simplify troubleshooting, facilitate upgrades, scale efficiently and converge traffic.

But what about the applications, storage appliances and multi-tenant environments that still require traditional layer 2 connectivity? Legacy protocols that enable layer 2 traffic to run over a layer 3 routed infrastructure have significant limitations that become serious obstacles when the data center must scale, accommodate multiple vendors’ systems or support multi-tenancy. Fortunately, there’s a scalable, simple, non-proprietary solution. Enter EVPN.

Cumulus’ unique Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN) solution offers unmatched interoperability and efficiency. By adding VXLAN distributed routing, Cumulus EVPN undoes all of the complications of layer 2 connectivity and frees you from reliance on proprietary controllers. Looking for proof that EVPN delivers on that promise? We’ve got plenty of evidence, so here’s four major advantages of utilizing EVPN to meet the demands of digital transformation.

1) Accommodate growth without disruption

With Cumulus EVPN, you can quickly and Continue reading

memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations

ASERT Threat Summary: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations Date/Time: 27022018 1645UTC Title/Number: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations – February 2018 – v1.3. Severity: Critical Distribution: TLP WHITE (see <https://www.us-cert.gov/tlp>) Categories: Availability Authors: Roland Dobbins & Steinthor Bjarnason Contributors: Luan Nguyen, […]

memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations

ASERT Threat Summary: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations Date/Time: 27022018 2325UTC Title/Number: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations – February 2018 – v1.4. Severity: Critical Distribution: TLP WHITE (see <https://www.us-cert.gov/tlp>) Categories: Availability Authors: Roland Dobbins & Steinthor Bjarnason Contributors: Keshav […]

BrandPost: Delivering “Always-On” Technology to Meet the Demands of Today’s Business

Virtually every small and medium-sized business is now driven by digital technologies. From our phones and PCs to the critical business applications that form the basis of business operations, our workday has become dependent on devices and the systems they are connected to. In addition to supporting employees, our customers and partners are constantly interacting with our systems. Outages are unacceptable. If our systems go down, business stops. This impacts employees, partners, and customers. And it’s not just an inconvenience; it costs the business money.Unfortunately, many businesses with 100-1,000 employees are using legacy server rooms or data centers that were built in the days before “always-on” became the requirement. A decade ago, downtime was hidden from customers and partners, and employees could work around a problem, staying somewhat productive. That’s no longer the case. Downtime is a disaster. And in many cases, downtime can result in lost data and corrupt systems, making the cost of recovery even greater. In some industries, data lost during an outage also creates a “compliance event,” which is never “career enhancing” for an IT professional.To read this article in full, please click here