Archive

Category Archives for "Networking"

BGP ADD-PATH – Summary

Hi,

First things first, I have been getting a lot of requests to upload the lab’s which i illustrate as is, so i shall be uploading them to a Github page with initial and final-configs and Instead of vagrant i shall be using EVE-NG as a tool so that you guys can import them easily.

https://github.com/r2079/JDC

Going through Fabric-Path and CLOS concepts, got myself started with 3 Stage Clos and as a part of understanding it, discovered something.

Why –  To make sure Servers at one end have equal cost path to the servers-at other end, at scale the spine accordingly optimizing the CAPEX.

Simple words, in the below topology, we need to make sure that R6 has equal cost to R7 and vice-versa.

 

Protocols and setup

-> OSPF for the entire domain and Ibgp to peer between RR (R2) and all other loopbacks, we use OSPF so that Ibgp peering will be over Loopback and also for load-balancing protocol Next-hops

-> Default routes on R6 and R7, load-balance (per-packet) on all-routers (where technically required)

-> R3 AND R4,R5 has static back to loopbacks of R6 and R7 respectively, advertising them into OSPF will defeat the purpose obviously Continue reading

Introduction to DHCP (Dynamic host configuration protocol)

 Today I am going to talk about the most interesting topic named as DHCP. I knew lot of you guys already knew about the DHCP and how it works in the real network environment but some of you are the beginners in the field of networking and this is why it is one of the most important topic for them.

Why we use the DHCP server and what is the purpose of the DHCP ?

Well Routers, servers, other key nodes require specific or static IP address and Clients can use an IP from a pool of available addresses. Minimum host configuration for Internet:
  • IP address
  • Subnet mask
  • Default gateway
  • DNS server IP

DHCP allows network administrator to assign a pool of available IP addresses for clients with additional configuration information such as default gateway, DNS IP, WINS IP, domain names
Addresses are leased, Cisco default is 24 hours

Fig 1.1- DHCP Server


DHCP process
·      Client boots up, sends a DHCPDISCOVER broadcast
·      All available DHCP servers respond with DHCPOFFER containing proposed IP address, lease time, DNS IP; server checks that IP offered is not in use before making the offer by issuing a default 2 pings

“Keep those eyebrows up!” – Cybersecurity at the Global Women’s Forum

News of cyberattacks is slowly becoming a new normal. We are still at a stage where high-profile cases, like the recent attack against the American credit reporting company Equifax, in which 145.5 million users had their personal information compromised, raise eyebrows. But we need those eyebrows to stay up because we should never accept cyber threats as the new normal.

This week in Paris, hundreds of leaders met at the Women’s Forum to discuss some of the key issues that will shape the future of a world in transition, including cybersecurity. But this topic is not just a concern for the experts – it’s a concern to all men and women leading any business today.

New risks on the horizon

A recent report by the Internet Society, “Paths to Our Digital Future”, points out that now is a big moment for the Internet. The revolution we already see could accelerate in the coming years, not only due to the increasing digitalization of services and businesses, but also through the expansion of objects being connected to the Internet – the Internet of Things (IoT). By 2020 more than 20 billion “things” could be connected.

Suddenly it’s not only Continue reading

IDG Contributor Network: Data or metadata? For the IoT they’re both important

Think about the most successful, widely scaled networks that let us function in today's world. No I’m not talking about internet service providers, I mean the Really, Really Big Networks. The ones that without which modern civilization would be very different. The telephone system. Intermodal containerized shipping. Air traffic control. And they all have one vitally important enabling element that made them all scalable: a Control Layer that is not intrinsic to the electronic or physical streams that make up the network traffic. For phones, it’s Signalling System 7, which has managed to run the world of voice calls for decades. For intermodal shipping, it’s container manifests. For aviation, it’s ATC. And they truly do, run the globe.To read this article in full or to leave a comment, please click here

Traceroute Lies! A Typical Misinterpretation Of Output

Sometimes a user with performance issues will proudly present me with a traceroute and point to a particular hop in the network and accuse it of being the problem because of high latency on the link. About 1 time in 1000 they are correct and the link is totally saturated. The other 999 times, well, let me explain.

Traceroute

Traceroute Output

Here’s a typical traceroute I might be sent by a user (IPs and hostnames are altered to protect the innocent):

$ traceroute www-europe
traceroute to www-europe (18.9.4.17), 64 hops max, 52 byte packets
 1  gateway (57.239.196.133)          11.447 ms   18.371ms    25.057 ms
 2  us-atl-edge (137.16.151.202)      13.338 ms   20.070 ms   19.119 ms
 3  us-ga-core (57.239.129.37)       103.789 ms  105.998 ms  103.696 ms
 4  us-nyc-core (57.239.128.189)     107.601 ms  103.116 ms  103.934 ms
 5  us-east-core (57.239.13.42)     103.099 ms  104.215 ms  109.042 ms
 6  us-east-bb1 (57.239.111.58)      107.824 ms  104.463 ms  103.482 ms
 7  uk-south-bb1 (57.240.117.81)     106.439 ms  111.156 ms  104.761 ms
  Continue reading

Back In The Saddle Of A Horse Of A Different Color

I’ve been asked a few times in the past year if I missed being behind a CLI screen or I ever got a hankering to configure some networking gear. The answer is a guarded “yes”, but not for the reason that you think.

Type Casting

CCIEs are keyboard jockeys. Well, the R&S folks are for sure. Every exam has quirks, but the R&S folks have quirky QWERTY keyboard madness. We spend a lot of time not just learning commands but learning how to input them quickly without typos. So we spend a lot of time with keys and a lot less time with the mouse poking around in a GUI.

However, the trend in networking has been to move away from these kinds of input methods. Take the new Aruba 8400, for instance. The ArubaOS-CX platform that runs it seems to have been built to require the least amount of keyboard input possible. The whole system runs with an API backend and presents a GUI that is a series of API calls. There is a CLI, but anything that you can do there can easily be replicated elsewhere by some other function.

Why would a company do this? To Continue reading

A Fast, Secure Migration to Google Cloud Platform using Cloudflare

OnAir Video Presentation

Abstract

A Fast, Secure Migration to Google Cloud Platform using Cloudflare

Looking to host your website, application, or API in the cloud, or migrate to a new cloud provider while keeping your data secure? In this webinar, Trey Guinn, Head of Solutions Engineering at Cloudflare, will discuss how companies should approach security, during and after migration. We'll highlight the migration story of LUSH, one of the largest global e-Commerce cosmetic retailers, and how they took the right steps to migrate from their previous cloud provider to Google Cloud Platform, in less than 3 weeks. Trey will be performing a live demo on setting up Cloudflare load balancing across cloud providers, as well as

Speakers

Asad Baheri
Security & Networking Partner Manager
Google Cloud Platform

Trey Guinn
Head of Solutions Engineering
Cloudflare

Webinar Transcription and Load Balancing Demo

Asad Baheri
A Fast, Secure Migration to Google Cloud Platform using Cloudflare Today we're going to talk about LUSH's migration to Google Cloud and how Cloudflare, one of our top security and performance partners, can help you with your own cloud migration. Throughout our presentation, we'll be talking about security best practices, how CDNs and the CDN Interconnect program works, and we're also going to also give you a demo of Cloudflare's load balancing to start your migration.

A Fast, Secure Migration to Google Cloud Platform using Cloudflare

One of Continue reading

IPv6, DNSSEC, Security and More at ION Malta

The Deploy360 team is back from ION Malta, which took place on 18 September alongside an ICANN DNSSEC Training Workshop. We again thank our sponsor Afilias for making this possible, and are now working toward our final ION Conference of the year, ION Belgrade in November. All the presentations from ION Malta are available online.

I opened the event with an introduction to Deploy360 and an invitation for everyone to get involved with the Internet Society’s 25th anniversary the next day. We also heard from Jasper Schellekens, the president of the ISOC Malta Chapter about their activities and how to get more involved. They have a small but mighty presence in Malta and are looking forward to getting more members and increasing their activity.

Next, Nathalie Trenaman from RIPE NCC gave a fascinating presentation on the status of IPv6 in Malta. Unfortunately, IPv6 penetration in Malta is extremely low, but ISPs are transferring IPv4 address space around and, interestingly, have purchased over 30,000 IPv4 addresses from Romania. She encouraged ISPs to begin moving to IPv6 now, as RIPE NCC estimates that full transition takes about 2.5 years to complete.

Next up, Klaus Nieminen from the Finnish Communications Continue reading

IDG Contributor Network: How to shrink your data-migration schedule

If there’s one problem just about every IT professional can relate to, it is the pain of a storage migration. Aging is part of life not only for us IT veterans, but also the storage systems we manage. Despite the fact that we’ve been having to move data off old storage for decades, the challenge of moving data from one storage resource to another, without disrupting business, remains one of the most time consuming and stressful projects for an IT team.Many of the IT professionals I speak with tell me that their migrations are scheduled over months, and can even take a year to plan and execute. It’s no surprise then that IT professionals named migrations as the number two issue facing their departments in a recent survey. Only performance presents a bigger challenge for today’s IT professionals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Shrink your data migration schedule

If there’s one problem just about every IT professional can relate to, it is the pain of a storage migration. Aging is part of life not only for us IT veterans, but also the storage systems we manage. Despite the fact that we’ve been having to move data off old storage for decades, the challenge of moving data from one storage resource to another, without disrupting business, remains one of the most time consuming and stressful projects for an IT team.Many of the IT professionals I speak with tell me that their migrations are scheduled over months, and can even take a year to plan and execute. It’s no surprise then that IT professionals named migrations as the number two issue facing their departments in a recent survey. Only performance presents a bigger challenge for today’s IT professionals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Moving fast and making friends: the power of a tight-knit industry community

The internet is a smaller place than it seems. Despite the gigantic weight of the industries built on it, the near ubiquity of the internet in our lives, and the complexity and scale of modern online applications, at its core the internet operates atop a relatively small set of systems.Pockets of deep knowledge and operational expertise around these key systems have developed over the years. There are tight-knit and cooperative communities focused on network operations, infosec, email and HTTP, to name just a few.DNS—the entry point to nearly every online application and a key anchor of the internet —is no different. A relatively small community of deep experts and operators drives the protocol and its key operational aspects. Homes for this community include DNS-OARC, IETF/ICANN, email lists and regular small meetings of key operators.To read this article in full or to leave a comment, please click here