Archive

Category Archives for "Networking"

Applying Software Agility to Network Design

The paper we are looking at in this post is tangential to the world of network engineering, rather than being directly targeted at network engineering. The thesis of On Understanding Software Agility—A Social Complexity Point of View, is that at least some elements of software development are a wicked problem, and hence need to be managed through complexity. The paper sets the following criteria for complexity—

  • Interaction: made up of a lot of interacting systems
  • Autonomy: subsystems are largely autonomous within specified bounds
  • Emergence: global behavior is unpredictable, but can be explained in subsystem interactions
  • Lack of equilibrium: events prevent the system from reaching a state of equilibrium
  • Nonlinearity: small events cause large output changes
  • Self-organization: self-organizing response to disruptive events
  • Co-evolution: the system and its environment adapt to one another

It’s pretty clear network design and operation would fit into the 7 points made above; the control plane, transport protocols, the physical layer, hardware, and software are all subsystems of an overall system. Between these subsystems, there is clearly interaction, and each subsystem acts autonomously within bounds. The result is a set of systemic behaviors that cannot be predicted from examining the system itself. The network design process is, Continue reading

LDP retention and distribution modes

MPLS protocol uses labels to forward traffic between point A and B. These labels are binded to FECs and distributed on the network by means of different protocols like (LDP, RSVP, BGP-LS, SPRING). LDP (Label Distribution Protocol “RFC5036”) is still by far the widely used protocol among them and was developed to do label distribution […]

The post LDP retention and distribution modes appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

LDP retention and distribution modes

MPLS protocol uses labels to forward traffic between point A and B. These labels are binded to FECs and distributed on the network by means of different protocols like (LDP, RSVP, BGP-LS, SPRING). LDP (Label Distribution Protocol “RFC5036”) is still by far the widely used protocol among them and was developed to do label distribution …

The post LDP retention and distribution modes appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

LDP retention and distribution modes

MPLS protocol uses labels to forward traffic between point A and B. These labels are binded to FECs and distributed on the network by means of different protocols like (LDP, RSVP, BGP-LS, SPRING). LDP (Label Distribution Protocol “RFC5036”) is still by far the widely used protocol among them and was developed to do label distribution …

The post LDP retention and distribution modes appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IPv6 generated with EUI-64 has a strange bit inside

How Does Internet Work - We know what is networking

What is universal/local bit in IPv6 EUI-64 address? One of my readers contacted me with an interesting question in comments of “IPv6 – SLAAC EUI-64 Address Format” article. The question was: “How come that the ipv6 address after the prefix is 21C:C4FF:FECF:4ED0 if the mac address is 00-1C-C4-CF-4E-D0?” Of course, we all know from the previous article that EUI-64 process is taking the interface MAC address (if that is an Ethernet interface) and it creates 64 bits Interface ID with it by shimming additional FFFE (16bits in hex) in between the MAC address bits. The reader was confused with an

IPv6 generated with EUI-64 has a strange bit inside

IDG Contributor Network: Enabling reconfigurable computing with field-programmable gate arrays

In my last column, I wrote about how the standard computing platform is being reimagined by reconfigurable computing and how hyper-scale cloud companies are leading the way with the use of SmartNICs and field-programmable gate arrays (FPGAs). Now, let’s look at why FPGAs are so powerful in this context, the major challenge of working with FPGAs, and how vendors and companies are addressing the challenge.Why FPGAs? What is it about FPGAs that makes them so different and yet so powerful compared to CPUs? One of the main reasons is that they are completely reconfigurable. Unlike ASICs, such as CPUs, the logic in the FPGA is not static but can be rearranged to support whatever workload you want to support. With an ASIC, you need to commit to a certain feature set up front, as this cannot be changed once the chip is produced. With an FPGA, you need to commit to the capabilities that the FPGA will provide with respect to available logic gates and Look-Up Tables (or LUTs), which are the tables that define how logic gates are combined to support a given function. But, what the FPGA does is entirely up to the FPGA solution developer Continue reading

IDG Contributor Network: Enabling reconfigurable computing with field-programmable gate arrays

In my last column, I wrote about how the standard computing platform is being reimagined by reconfigurable computing and how hyper-scale cloud companies are leading the way with the use of SmartNICs and field-programmable gate arrays (FPGAs). Now, let’s look at why FPGAs are so powerful in this context, the major challenge of working with FPGAs, and how vendors and companies are addressing the challenge.Why FPGAs? What is it about FPGAs that makes them so different and yet so powerful compared to CPUs? One of the main reasons is that they are completely reconfigurable. Unlike ASICs, such as CPUs, the logic in the FPGA is not static but can be rearranged to support whatever workload you want to support. With an ASIC, you need to commit to a certain feature set up front, as this cannot be changed once the chip is produced. With an FPGA, you need to commit to the capabilities that the FPGA will provide with respect to available logic gates and Look-Up Tables (or LUTs), which are the tables that define how logic gates are combined to support a given function. But, what the FPGA does is entirely up to the FPGA solution developer Continue reading

Extreme completes Brocade acquisition, finishing a remarkable turnaround story

Extreme Networks today announced that it has completed the acquisition of Brocade’s data center switching, routing and analytics business, completing one of the most remarkable and unlikely turnaround stories in tech history.In the technology industry, rising from the ashes is very rare. Once a vendor, no matter how big, starts to slide, it generally has a bad outcome. Consider all the giants in networking alone that went from 800-pound gorillas to a puff of smoke seemingly overnight. Names including Lucent, Nortel, 3Com, Cabletron, Marconi and Fore Systems, once seemingly mighty powers that could never be toppled, are now all gone. Some vendors have avoided that fate by going private to revamp the company without the pressure of meeting Wall Street expectations every quarter. Recent examples of this are Polycom, Riverbed, Dell and Solar Winds.To read this article in full or to leave a comment, please click here

Extreme completes Brocade acquisition, finishing a remarkable turnaround story

Extreme Networks today announced that it has completed the acquisition of Brocade’s data center switching, routing and analytics business, completing one of the most remarkable and unlikely turnaround stories in tech history.In the technology industry, rising from the ashes is very rare. Once a vendor, no matter how big, starts to slide, it generally has a bad outcome. Consider all the giants in networking alone that went from 800-pound gorillas to a puff of smoke seemingly overnight. Names including Lucent, Nortel, 3Com, Cabletron, Marconi and Fore Systems, once seemingly mighty powers that could never be toppled, are now all gone. Some vendors have avoided that fate by going private to revamp the company without the pressure of meeting Wall Street expectations every quarter. Recent examples of this are Polycom, Riverbed, Dell and Solar Winds.To read this article in full or to leave a comment, please click here

Internet of things definitions: A handy guide to essential IoT terms

There’s an often-impenetrable alphabet soup of protocols, standards and technologies around the Internet of Things. Here’s our attempt to wipe away some of the fog, in the hopes of making the language of IoT just a little bit clearer.6LoWPAN – Possibly the most tortured acronym of even this distinguished group, 6LoWPAN is “IPv6 over low-power personal area networks.” Sheesh. The idea is to placate people that say it’s not really the “Internet” of Things without Internet protocol, so it’s essentially the IPv6 version of Zigbee and Z-wave.AMQP (Advanced Message Queuing Protocol) – AMQP is an open source standard that allows disparate applications to talk to each other across any network and from any device. AMQP is a part of numerous commercial middleware integration offerings, including Microsoft’s Windows Azure Service Bus, VMware’s RabbitMQ, and IBM’s MQlight. It was initially developed by the financial sector for fast M2M communication, but has begun to be used in IoT projects.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Should IT operations be event-driven or data-driven?

An overview of events The essence of IT Operations Management for the last 30 years (ever since the advent of distributed systems in the mid 1980’s) has been to understand what is “normal” and what is “abnormal” and to then alert on the anomalies. Events are anomalies.Now events come from an incredible variety of sources. Every element of the entire stack (disks, storage arrays, network devices, servers, load balancers, firewalls, systems software, middleware and services and applications) are capable of sending events.Events tend to come in two broad forms. Hard faults and alarms related to failures in the environment (this disk drive has failed, this port on this switch has failed, this database server is down), and alerts that come from violations of thresholds set by humans on various monitoring systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Should IT operations be event-driven or data-driven?

An overview of events The essence of IT Operations Management for the last 30 years (ever since the advent of distributed systems in the mid 1980’s) has been to understand what is “normal” and what is “abnormal” and to then alert on the anomalies. Events are anomalies.Now events come from an incredible variety of sources. Every element of the entire stack (disks, storage arrays, network devices, servers, load balancers, firewalls, systems software, middleware and services and applications) are capable of sending events.Events tend to come in two broad forms. Hard faults and alarms related to failures in the environment (this disk drive has failed, this port on this switch has failed, this database server is down), and alerts that come from violations of thresholds set by humans on various monitoring systems.To read this article in full or to leave a comment, please click here

53% off InnoGear LED Solar Motion Sensor Outdoor Security Light, 4-Pack – Deal Alert

InnoGear's 24 LED solar light can automatically light up your home, yard, garage, driveway, patio, deck, or any other area that gets sun during the day. The motion sensor will be triggered when someone or something enters its 16 feet range with a 90 degree angle, for an increased sense of security around your home. These lights are waterproof and made of a durable ABS material. Right now a pack of 4 lights is discounted 53% down to just $27.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here