Archive

Category Archives for "Networking"

Mist’s wireless network lets companies personalize the user experience

The Wi-Fi networks of today were architected more than a decade ago. That even predates the iPhone, which ushered in the era of mobility. These old Wi-Fi architectures aren’t ready to handle the vast number of mobile devices that want to connect to wireless networks today.What’s more, these networks aren’t able to put any focus on what users experience when they are connected.The old generation of Wi-Fi networks are a hindrance to businesses that want to increase customer engagement over ubiquitous mobile devices. For example, restaurants and retail stores would like to capture customers’ attention by offering real-time discounts or coupons when customers enter or walk by the establishment. Doing so requires the use of several technologies that old wireless networks just can’t support at scale.To read this article in full or to leave a comment, please click here

Mist’s wireless network lets companies personalize the user experience

The Wi-Fi networks of today were architected more than a decade ago. That even predates the iPhone, which ushered in the era of mobility. These old Wi-Fi architectures aren’t ready to handle the vast number of mobile devices that want to connect to wireless networks today.What’s more, these networks aren’t able to put any focus on what users experience when they are connected.The old generation of Wi-Fi networks are a hindrance to businesses that want to increase customer engagement over ubiquitous mobile devices. For example, restaurants and retail stores would like to capture customers’ attention by offering real-time discounts or coupons when customers enter or walk by the establishment. Doing so requires the use of several technologies that old wireless networks just can’t support at scale.To read this article in full or to leave a comment, please click here

NVM Express spec updated for data-intensive operations

This is another one of those geeky stories that actually has some significance. The Non-Volatile Memory (NVM) Express group has issued version 1.3 of its SSD spec, with emphasis on performance around analytics and virtualization. NVMe is a communications interface/protocol designed specifically for solid-state drives (SSDs) because the old standard, SATA, was a relic of the hard disk days and nowhere near fast enough to provide proper throughput for flash memory. The NVM Express organization consists of storage and flash vendors such as Intel, Samsung, Sandisk, Dell EM, and Seagate. NVMe works with the M.2 and PCI Express buses, which are considerably faster than SATA. For example, it can handle 65,000 queues instead of one like in SATA, which is idea for a server environment where there is a lot of I/O. To read this article in full or to leave a comment, please click here

Off The Cuff – Conferences And Social Media For Engineers

What is the value of conferences and social media for network engineering types? Come hear out panel talk about how these tools have enhanced and changed their careers. This episode was recorded at Cisco Live in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Tom Hollingsworth
Guest
Aaron Conaway
Guest
Jonathan Davis
Guest
Marena Karasevich
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Conferences And Social Media For Engineers appeared first on Network Collective.

Off The Cuff – Conferences And Social Media For Engineers

What is the value of conferences and social media for network engineering types? Come hear out panel talk about how these tools have enhanced and changed their careers. This episode was recorded at Cisco Live in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Tom Hollingsworth
Guest
Aaron Conaway
Guest
Jonathan Davis
Guest
Marena Karasevich
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Conferences And Social Media For Engineers appeared first on Network Collective.

VTP modes and versions : VTPv1, VTPv2 and VTPv3

This topic is basically on the VLAN trunking Protocol which is called as VTP. I am talking about this topic as i am getting a lot of queries about the VTP protocol. Some of the questions i will summarised with this article. There are some of the questions which often asked at the time of the interview and are the basic questions.

Below are the questions about the VTP.
  • So what actual VTP do ? 
  • How we manage VLANs with the VTP ?
  • What are the various versions of VTP ?
  • How they differ from each other ?
  • what is the range of the VLANs supported ?
  • What is VTP Pruning ?
  • What are VTP modes ?
  • What are the different kinds of VTP advertisements ?

I understand there might be more queries on the VTP but let's start with the general talk about the VTP first. May be with this article most of the queries will be understandable.

Fig 1.1- Sample Switched Network

So VTP is a called as Layer 2 messaging protocol that contains VLAN configuration information  by managing the addition, deletion, and renaming of VLANs within a VTP domain. A VTP domain (also called a VLAN management domain) is made up of one Continue reading

Brocade : Zone‐Based Firewall

Today I am going to talk about the configuration of the Brocade router as Zone-Based Firewall. The first query in your mind will be that what is this zone based firewalls are ?

Well Zone based Firewalls are interfaces that are grouped into security “zones,” where each interface in a zone has the same security level.

In the Zone Based Firewalls, the packet-filtering policies are applied to the traffic flowing between the various zones in the network which is defined by the network administrator . So the concept is simple that the traffic flowing between interfaces that is there in the same zone is not filtered and flows freely because the interfaces share the same security level and the traffic flowing between the different zones will be filtered accordingly as security level can be different for different zones.

I will come up the Zone based Firewalls for Cisco soon in another article where i can share the configurations with the topology. This article is purely of Brocade where it is worked as Zone Based Firewall.

So below is the network where we defined three different zones which is defined by network administrator as per the demand in the network. The Zones are

One Year Ago Today



One year ago today, fourth of July, was my first day at Google Zürich. It’s been a very interesting journey so far, and from the beginning I spent most of my time to focus on three things: switch to Product Management to learn how to build great product, work on scalable Enterprise networking solution from cloud-based SDN to intent-driven automation, and learn data analysis in-depth from data visualization all the way to Machine Learning, to be used in product development.

As you notice, I rarely post new blog since I joined the company last year. And I find it quite difficult to find any active blog from other Googlers too. Just like any tech company, when we joined all of us signed an agreement containing various obligations including the requirement to hold proprietary information and trade secrets in strictest confidence. But I believe there should be some non-confidential things that we can share in our personal blog.

So why can’t we blog?

First, we are very busy here. And not because we have to, but we choose to.

I mean, there are just too many interesting things to do and to learn at Google. If you work for the Continue reading

Call on Your Government To Support Encryption

Eighty-three organizations and individuals from Australia, Canada, New Zealand, the United Kingdom, and the United States are insisting governments support strong encryption.

The letter, which was sent to government representatives in each of the above countries, called for public participation in any future discussions. It comes on the heels of the “Five Eyes” ministerial meeting in Ottawa, Canada earlier this week.

The Internet Society supports the substance of the letter.  

Mr. Olaf Kolkman

What is Urban and Rural area in networking ?

What is urban and rural area ? What is underserved area in networking ?   These definitions are heavily used in networking. And all broadband network designers take always these definitions into an account while they do their design. I think knowing these definitions as a network engineer is valuable for you.    In general, […]

The post What is Urban and Rural area in networking ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Is there a Global Tier 1 Provider in the World ?

Is there a Global Tier 1 Internet Service Provider in the World ? Who are the biggest networks in the World ?    In the Peering article I explained what is peering , different types of peering such as private and public peering , settlement free peering , paid peering and so on.   To […]

The post Is there a Global Tier 1 Provider in the World ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Three little tools: mmsum, mmwatch, mmhistogram

In a recent blog post, my colleague Marek talked about some SSDP-based DDoS activity we'd been seeing recently. In that blog post he used a tool called mmhistogram to output an ASCII histogram.

That tool is part of a small suite of command-line tools that can be handy when messing with data. Since a reader asked for them to be open sourced... here they are.

mmhistogram

Suppose you have the following CSV of the ages of major Star Wars characters at the time of Episode IV:

Anakin Skywalker (Darth Vader),42
Boba Fett,32
C-3PO,32
Chewbacca,200
Count Dooku,102
Darth Maul,54
Han Solo,29
Jabba the Hutt,600
Jango Fett,66
Jar Jar Binks,52
Lando Calrissian,31
Leia Organa (Princess Leia),19
Luke Skywalker,19
Mace Windu,72
Obi-Wan Kenobi,57
Palpatine,82
Qui-Gon Jinn,92
R2-D2,32
Shmi Skywalker,72
Wedge Antilles,21
Yoda,896

You can get an ASCII histogram of the ages as follows using the mmhistogram tool.

$ cut -d, -f2 epiv | mmhistogram -t "Age"
Age min:19.00 avg:123.90 med=54.00 max:896.00 dev:211.28 count:21
Age:
 value |-------------------------------------------------- count
     0 |                                                   0
     1 |                                                   0
     2 |                                                   0
     4 |                                                   0
     8 |                                                   0
    16 |************************************************** 8
    32 |                         ************************* 4
    64 |             ************************************* 6
   128 |                                            ****** 1
   256  Continue reading

OSPF Configurations in Huawei Routers

Today I am going to talk about the basic configuration of OSPF in Huawei Routers. There is already have a article on OSPF configuration on Cisco routers
OSPF Basic configuration Step by step on Cisco Routers

Apart from the above we have another articles on OSPF as shown below
OSPF Basics
OSPF Point to Multipoint Configuration- Cisco and Juniper
OSPF States
Difference between OSPF and RIP

Lets take an Topology here and below is the diagram for the configuration. We have the following topology as :

  • Router A is connected between Area 1 and Area 0
  • Router B is connected between Area 2 and Area 0
  • Router C is a internal Area 1 Router
  • Router D is a internal Area 2 Router
  • Router E is a internal Area 1 Router
  • Router F is a internal Area 2 Router


Fig 1.1-


# Configure Router A 
Below is the basic configuration of OSPF on Router A
[TTLBITS_A] router id 1.1.1.1
[TTLBITS_A] ospf 1
[TTLBITS_A-ospf-1] area 0
[TTLBITS_A-ospf-1-area-0.0.0.0] network 192.168.0.0 0.0.0.255 
[TTLBITS_A-ospf-1-area-0.0.0.0] quit 
[TTLBITS_A-ospf-1] area 1
[TTLBITS_A-ospf-1-area-0.0.0.1] network 192.168.1.0 0. Continue reading

Swimlanes, Read-Write Transactions and Session State

Another question from someone watching my Designing Active-Active and Disaster Recovery Data Centers webinar (you know, the one where I tell people how to avoid the world-spanning-layer-2 madness):

In the video about parallel application stacks (swimlanes) you mentioned that one of the options for using the R/W database in Datacenter A if the user traffic landed in Datacenter B in which the replica of the database is read-only was to redirect the user browser with the purpose that the follow up HTTP POST land in Datacenter A.

Here’s the diagram he’s referring to:

Read more ...

37 – DCI is dead, long live to DCI

Some may find the title a bit strange, but, actually, it’s not 100% wrong. It just depends on what the acronym “DCI” stands for. And, actually, a new definition for DCI may come shortly, disrupting the way we used to interconnect multiple Data Centres together.

For many years, the DCI acronym has conventionally stood for Data Centre Interconnect.

Soon, the “Data Centre Interconnect” naming convention may essentially be used to describe solutions for interconnecting traditional-based DC network solutions, which have been used for many years. I am not denigrating any traditional DCI solutions per se, but the Data Centre networking is evolving very quickly from the traditional hierarchical network architecture to the emerging VXLAN-based fabric model gaining momentum in enterprise adopting it to optimize modern applications, computing resources, save costs and gain operational benefits. Consequently, these independent DCI technologies will continue to be deployed primarily for extending Layer 2 and Layer 3 networks between traditional DC networks. However, for the interconnection of modern VXLAN EVPN standalone (1) Fabrics, a new innovative solution called “VXLAN EVPN Multi-site” – which integrates in a single device the extension of the Layer 2 and Layer 3 services across multiple sites – has been created for a Continue reading