Archive

Category Archives for "Networking"

IDG Contributor Network: Addressing the Great IoT Analytics Skills Gap

Expect to see a huge uptick in demand for people who have technology and business skills related to the Internet of Things (IoT), as organizations continue to ramp up their IoT projects in a big way.A new report by 451 Research notes that finding IoT-skilled workers is a big challenge. Nearly half of the 575 IT and IoT decision makers the firm surveyed, primarily in North America and Europe, said they face a skills shortage for IoT-related tasks.The skills companies need to acquire include expertise in areas such as cyber security, networking, device hardware, applications, and overall management of IoT strategy. But perhaps nowhere will demand be greater in the coming years than in areas related to data analytics. As companies seek to use IoT data to predict outcomes,  prevent failures, optimize operations and develop new products, advanced analytics competency—including artificial intelligence (AI) and machine learning (ML)—will be critical to their success.To read this article in full or to leave a comment, please click here

How Should We Handle Failure?

I had an interesting conversation this week with Greg Ferro about the network and how we’re constantly proving whether a problem is or is not the fault of the network. I postulated that the network gets blamed when old software has a hiccup. Greg’s response was:

Which led me to think about why we have such a hard time proving the innocence of the network. And I think it’s because we have a problem with applications.

Snappy Apps

Writing applications is hard. I base this on the fact that I am a smart person and I can’t do it. Therefore it must be hard, like quantum mechanics and figuring out how to load the dishwasher. The few people I know that do write applications are very good at turning gibberish into usable radio buttons. But they have a world of issues they have to deal with.

Error handling in applications is a mess at best. When I took C Programming in college, my professor was an actual coder during the day. She told us during the error handling Continue reading

Weird IP networks: Internet via birds and ham radios

If you're reading this, you have internet access.You probably have it either through a local cable or fibre ISP or through your cell phone provider. We all have one (usually both) of these.Speedy. Reliable (mostly). Boring.What happens when that infrastructure goes down? Maybe the power goes out somewhere along the network. Maybe a cell tower gets attacked by Godzilla. Who knows? Dangers lurk around every corner. + Also on Network World: When disasters strike, edge computing must kick in + In those cases, when your traditional network connection fails you, you're going to need a backup. Something to get you back up, online and moving data around. And, what the heck, we might as well do it all with as much flair and pizzazz as possible.To read this article in full or to leave a comment, please click here

Weird IP networks: Internet via birds and ham radios

If you're reading this, you have internet access.You probably have it either through a local cable or fibre ISP or through your cell phone provider. We all have one (usually both) of these.Speedy. Reliable (mostly). Boring.What happens when that infrastructure goes down? Maybe the power goes out somewhere along the network. Maybe a cell tower gets attacked by Godzilla. Who knows? Dangers lurk around every corner. + Also on Network World: When disasters strike, edge computing must kick in + In those cases, when your traditional network connection fails you, you're going to need a backup. Something to get you back up, online and moving data around. And, what the heck, we might as well do it all with as much flair and pizzazz as possible.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 5 myths surrounding rugged IoT testing

Today’s tech-hungry consumers and innovative producers wouldn’t be able to enjoy the IoT without all the rugged testing necessary to ensure products can handle the stress they’ll endure daily. Yet while many companies and consumers alike pride themselves on the vitality of their equipment, however, many egregious myths about rugged IoT testing still endure.So, what are the five common myths that most-often surround rugged IoT testing, and who’s responsible for creating and proliferating these rumors? A quick review below shows some of the nastiest of these myths, and why they should be avoided.1. Going beyond specification limits if a waste of time In many test labs, the mainstream logic is that IoT products don’t need to be tested past their specification limits. Consumers won’t really care, the faux-logic insist, and it would be a waste of time and resources to try and push devices past their commercial limits.To read this article in full or to leave a comment, please click here

my.ipSpace.net outage: fixing broken libraries

An update of PERL libraries broke a number of my scripts (don't ask). Here's the current status:

  • Fixed: credit card processing. It was impossible to buy products from ipSpace.net with credit cards (the credit card form didn't appear at all)
  • Fixed: Google+ login
  • Unrelated and fixed: blog search

Anything else not working? Please write a comment or send me an email. Thank you!

Your Network: The Glue Holding the Business Together (Thwack)

TCP congestion control, buffer bloat and micro bursting are just a few of the things that can ruin your network and, as a consequence, your business.

On the Solarwinds Thwack Geek Speak blog I looked at these issues and more, examining the elements that make up network performance. Please do take a trip to Thwack and check out my post, “Your Network: The Glue Holding the Business Together“.

Your Network: The Glue Holding the Business Together

 

Please see my Disclosures page for more information about my role as a Solarwinds Ambassador.

If you liked this post, please do click through to the source at Your Network: The Glue Holding the Business Together (Thwack) and give me a share/like. Thank you!

Viptela SD-WAN Solution – Cisco Systems Company

Before starting with the SD-WAN solution. I would like to talk about Fabric a little bit, So Fabric is a cloud delivered network that is secure, scalable, open and simple to deploy and if we talk about the Viptela Fabric solution, it enables an Enterprise to extend its network footprint to all infrastructure elements using a single platform. This includes branches, campus, remote sites, Cloud and data center.

What is the basic feature of the Fabric enabled SD solution ?
So SD-WAN so called Software Defined WAN solution, where control plane or management plane is separated from the physical devices, while in the Viptela solution we have following architecture, where we have data-plane on the physical devices (obviously), Control Plane by VSmart or VBond Management tool, Management Plane via VManage and Orchestration plane.

So below is the high level architecture view of the Viptela Managed SD-WAN solution

Fig 1.1- Viptela SD-WAN Solution
The traditional WAN challenge is to connect various sites, branches, stores, remote-locations, campuses and DCs. This network to be sophisticated with routing, path selection, security, segmentation etc.

Connectivity to the cloud

In the today's era everyone wants to connect to the cloud and want to access the application on the Continue reading

What is Deadlock situation in MPLS Traffic Engineering ?

What is deadlock situation in MPLS Traffic Engineering ? What happens when deadlock occurs ? Is there any mechanism to prevent deadlock ? I will explain all the details in this post.     Deadlock occurs when LSP needs to move to the other link but due to lack of available bandwidth cannot move to […]

The post What is Deadlock situation in MPLS Traffic Engineering ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Code Everywhere: Why We Built Cloudflare Workers

It all comes down to the speed of light. It always does. The speed of light limits the latency possible between someone using the Internet and the application they are accessing. It doesn’t matter if they are walking down the street hailing a car using a ride-sharing app, sitting in an office accessing a SaaS application on the web, or if their wearable device is reporting health information over WiFi. The speed of light is everywhere.

When you can’t fight the speed of light you only have one possible solution: move closer to where the end users are. In simplistic terms, that’s what Cloudflare has done by building its network of 117 data centers around the world. We’ve cut the latency between users and servers by moving closer.

But to date all we’ve moved closer are things like SSL handshakes, WAF processing of requests and caching of content. All those things help make Internet applications faster and safer, but there’s a huge missing component... code.

The code that makes Internet applications work is still sequestered in servers and cloud services around the world. And there are only a limited number of such locations even for large cloud Continue reading

Introducing Cloudflare Workers: Run Javascript Service Workers at the Edge

TL;DR: You'll soon be able to deploy Javascript to Cloudflare's edge, written against an API similar to Service Workers.

Try writing a Worker in the playground »

Introduction

Every technology, when sufficiently complicated, becomes programmable.

You see this everywhere, but as a lifelong gamer, my personal favorite example is probably graphics cards. In the '90s, graphics hardware generally provided a fixed set of functionality. The OpenGL standard specified that the geometry pipeline would project points from 3D space onto your viewport, then the raster pipeline would draw triangles between them, with gradient shading and perhaps a texture applied. You could only use one texture at a time. There was only one lighting algorithm, which more or less made every surface look like plastic. If you wanted to do anything else, you often had to give up the hardware entirely and drop back to software.

Of course, new algorithms and techniques were being developed all the time. So, hardware vendors would add the best ideas to their hardware as "extensions". OpenGL ended up with hundreds of vendor-specific extensions to support things like multi-texturing, bump maps, reflections, dynamic shadows, and more.

Then, in 2001, everything changed. The first GPU with a programmable Continue reading

WAN Optimization ( Silver Peak Vs Riverbed)

In today's world WAN optimisation is one of the critical pillar of the enterprise network and there are so many vendors working on the WAN optimization products. Cisco came with WAAS solution but not able to convince customers in the market. Riverbed and SilverPeak are the major leaders in the WAN optimization market.

Silver top’s WAN acceleration solution facilitates firms achieve the rewards of virtualization by means of overcoming network challenges that impact the overall performance of these packages throughout the WAN. extra especially, Silver height addresses latency, packet loss, and bandwidth demanding situations that cause digital packages (e.g. Citrix Xen App) and digital desktop Infrastructures (e.g. Citrix Xen computer, Microsoft computer Virtualization, and VMware VDI) to be unresponsive and/or unreliable across the WAN. 

Fig 1.1- WAN Optimization

How does Silver height fluctuate from other WAN acceleration carriers with regards to optimising digital applications and computer systems?

Many WAN acceleration vendors, including Silver Peak, offer “basic” optimization techniques that can improve the performance of Citrix and VDI. These include standard compression algorithms (e.g. LZ) and well-established TCP acceleration techniques (e.g. adjustable window sizes and selective acknowledgements). 

However, that is where the similarities end. In addition Continue reading

Datacenter Switching : Nexus ( FEX: Fabric Extenders )

Today I am going to talk about the FEX that you generally heard when you are going to connect your datacenter servers in the Nexus Switching environment. It is called as Bridge Port Extension. It means there is a Parent Switch and the port of that parent switch get connected to FEX( that is another Switch) but act as the Interface card for the Parent switch.
  • Parent Switch :Nexus 5K or Nexus 7K
  • FEX:Nexus 2K ( Another Switch but interconnected with Parent Switch and controlled)

Nexus 7K or 5k is act as Parent Switch but Nexus 2K act as FEX for Parent Switch. So all the function of the Nexus 2K is controlled by the Parent Switch and that is Nexus 7K or 5K. Simply says that Nexus 2000 Series FEX behaves logically like Remote line cards for parent Nexus 5K  or 7K Nexus Switch.

Lets talk how we can connect the FEX with the parent switch in the datacenter environment.

Fig 1.1- FEX Connectivity


Let's talk about the basic Configurations to configure the FEX.

Step-1 :
Enable the FEX feature

N5K-1(config)# feature fex

Step-2 :Create a FEX instance (Note: Its up to you to choose Continue reading

NMAP Quick Reference

NMAP is a tool for network discovery and auditing. This is not a comprehensive tutorial, only a quick reference source. Consult the man pages and/or documentation for indepth explanation of commands. Port Scan Top Ports Scan the top N number of ports cmd nmap --top-ports 10 www.google.com UDP...