The internet of things will move more processing to telecom suppliers' facilities.
I love reading well-argued contrarian views, and Geoff Huston’s Opinion in Defense of NAT is definitely worth the time it will take you to read it.
TL&DR: Geoff argues that with all the wastage going on in IPv6 land (most bizarre: let’s give a /48 to every residential subscriber) the number of bits available for IPv6 endpoint addressing gets close to what we can squeeze out of IPv4 NAT.
![]() |
Fig 1.1- Basic Firewall deployment in the Network |
![]() |
Fig 1.1- Cisco Aironet Network Topology |
![]() |
Fig 1.2- Cisco Aironet Models |
The 4th edition of Romanian NOG (RONOG) is being held today, 31 October 2017, in Bucharest, Romania, and as the largest meeting of Internet technology professionals in Romania it is expecting to hit over 170 attendees.
As specified in the meeting agenda, I’ll deliver my talk about NAT64 experiments in the go6lab and also one very useful tool that came out of this testing – NAT64Check. I also have the honour of chairing the IPv6/IOT session.
I’m looking forward to being back in Bucharest and if you happen to be at RONOG4, please come and find me in the hallways as I’m always happy to chat about technology, IPv6, DNSSEC, DANE and everything else that makes our Internet a bit of a better place!
The post RONOG4 meeting in Bucharest, Romania appeared first on Internet Society.
It's using gray box hardware with SD-WAN in the form of a VNF.
We've launched a new monthly newsletter devoted to the SD-WAN market.
The series of Network Automation Engineer (NAE) Persona blog posts have churned some comments in the community around learning. Part of the feedback appears to be the hero syndrome fighting back and also the odd misunderstanding, which might be a result of fear. Change often results in fear, so this is natural.
Network Heroes
Some people love networking because it makes them feel special. Some people have got used to that special feeling and hang on to the fact that they’re
important. These network engineers feel like a “Packet Lord”.
Automation is designed to remove from humans deterministic and testable tasks. One result is fewer self-titled “Prime minister of Packets” and fewer bottlenecks. Taking IaC (Infrastructure as Code), it becomes so much simpler to define tasks, implement them and test for success or failure. Dealing with sources of truth is part of the natural flow of the process instead of an afterthought on a Friday afternoon.
The hero very much becomes the norm at this point.
Articles
At a high level, the articles discuss the evolving NAE persona and not what you should or shouldn’t learn. The articles do not discourage learning, they recognise and promote learning. After all, you Continue reading
No. 1 server vendor HPE earned $3.298 billion in server revenue during the second quarter of 2017.
Extreme closes on Brocade data center assets.
The technology makes it possible to aggregate signals from different vendors to different operators.
Media companies have a lot to gain from SDS in terms of security, storage, and flexibility.
Learn more about selecting and deploying SD-WAN, check out this new eBrief, "Hot Topics in SD-WAN," from SDxCentral.
The paper we are looking at in this post is tangential to the world of network engineering, rather than being directly targeted at network engineering. The thesis of On Understanding Software Agility—A Social Complexity Point of View, is that at least some elements of software development are a wicked problem, and hence need to be managed through complexity. The paper sets the following criteria for complexity—
It’s pretty clear network design and operation would fit into the 7 points made above; the control plane, transport protocols, the physical layer, hardware, and software are all subsystems of an overall system. Between these subsystems, there is clearly interaction, and each subsystem acts autonomously within bounds. The result is a set of systemic behaviors that cannot be predicted from examining the system itself. The network design process is, Continue reading
Analysts note surprise as the software security firms inconsistent financial performance.