Archive

Category Archives for "Networking"

Docker image – Python for network engineers

Lately I’m looking more and more into Python, with respect to automation implementations useful for network engineers. In the learning process I’ve used different materials, like the excellent video trainings Python Programming for Network Engineers from David Bombal which are available free on Youtube.

This training in particular relies on a Ubuntu Docker image in order to support Python learning following interaction with Cisco devices in GNS3. Everything is great, just that the image doesn’t contain all necessary tools (like Paramiko, Netmiko, Ansible…). As you can guess, whenever you close / open the Project in GNS3, all the installed packages installed in the Ubuntu Docker image are gone.

Since we’re talking automation, I got bored to install the necessary tools everytime I wanted to start a new project or I had to close GNS3 for some reason. I’ve tried to find a Docker image that suits my needs, but I couldn’t (please point me to one if you know it).

So, I’ve build a Docker image, based on Ubuntu 16.04, which contains the necessary tools to start learning Python programming oriented for network engineers:

  • Openssl
  • Net-tools (ifconfig..)
  • IPutils (ping, arping, traceroute…)
  • IProute
  • IPerf
  • TCPDump
  • NMAP
  • Python 2. Continue reading

VPLS basic configurations in MPLS environment: Cisco Routers

Today I am going to tell you about the basic configurations of VPLS on the Cisco routers. Let's take an scenario where i can say that there is a MPLS network where we have PE1, PE2 and PE3 connected at the edges of the MPLS network and beyond that there are customer edge routers.

Let me explain little bit how Layer 2 split horizon enabled in the VPLS scenario. So on the edge of the MPLS PE routers VLAN packets received from the customer network can be forwarded to one or more local interfaces and or emulated VCs in the VPLS domain. To avoid broadcasted packets looping around in the network, no packet received from an emulated VC can be forwarded to any emulated VC of the VPLS domain on a PE router. That is, the Layer 2 split horizon should always be enabled as the default in a full-mesh network. 

Below is the topology showing the VPLS connectivity across the three Service Provider Edge routers that i mentioned above. We have three PE routers and named as PE1, PE2 and PE3 routers. Below the topology we have the configurations on all these PE routers step by step. All Continue reading

Cisco Catalyst 9400 Switches – A new Launch

As in my earlier article i talked about the new launch of the Cisco catalyst 9300 and explain the features of that catalyst switch. Now I am going to talk about the other 2 series which Cisco launches. Cisco understand the requirement of the market and also competing with the other vendors for Next generation networks like SDN where open APIs can be used to stitch third party applications.

Cisco come up with the solution for the campus where they are going to deploy the fabric network on the top of traditional IP network. I will come up with another article where I can explain the architecture of the SD-Access network for the campus network designed by Cisco Systems.

With the launch of Cisco 9300, 9400 and 9500 cisco is running ahead in the field of enterprise network architecture. For Cisco catalyst 9300 please check the below mentioned link

Cisco Catalyst 9300 Switches for Campus

Now let me talk about the other two series of switches launched by Cisco Systems for campus or enterprise network named Cisco catalyst 9400 and 9500 switches.

Cisco Catalyst 9400 Switch:
With the help of Cisco catalyst 9400 switch you will achieve Advanced persistent security threats, Continue reading

Converge your network with priority flow control (PFC)

Back in April, we talked about a feature called Explicit Congestion Notification (ECN). We discussed how ECN is an end-to-end method used to converge networks and save money. Priority flow control (PFC) is a different way to accomplish the same goal. Since PFC supports lossless or near lossless Ethernet, you can run applications, like RDMA, over Converged Ethernet (RoCE or RoCEv2) over your current data center infrastructure. Since RoCE runs directly over Ethernet, a different method than ECN must be used to control congestion. In this post, we’ll concentrate on the Layer 2 solution for RoCE — PFC, and how it can help you optimize your network.

What is priority flow control?

Certain data center applications can tolerate only little or no loss. However, traditional Ethernet is connectionless and allows traffic loss; it relies on the upper layer protocols to re-send or provide flow control when necessary. To allow flow control for Ethernet frames, 802.3X was developed to provide flow control on the Ethernet layer. 802.3X defines a standard to send an Ethernet PAUSE frame upstream when congestion is experienced, telling the sender to “stop sending” for a few moments. The PAUSE frame stops traffic BEFORE the buffer Continue reading

IDG Contributor Network: How to handle risks of hypervisor hacking

Global cloud computing and digital systems today would not exist without virtualization and hypervisors. Virtualization and hypervisors are basic tools for implementing digital systems that respond from moment to moment to varying demands without slow and expensive physical reconfiguration of hardware and rebuilding of software execution stacks and heavy investment in hardware that is only used during peak loads.Last blog, I described the dangers of a hypervisor attack. How can such an attack occur? There are a number of ways.Resource simulations A hypervisor provides software simulations of basic computing resources — like CPUs, memory, storage and network connections — that isolate VMs from one another. But the isolation may have soft spots. For example, freed simulated memory for one VM might be the same physical memory the hypervisor allocates to another VM. If the hypervisor does not blank out the reallocated physical memory, the second VM has access to data from the first VM and a data breach ensues. All resource simulations are subject to dangerous implementation errors. Simulated CPU registers, storage buffers and network buffers, all present opportunities for coding mistakes that permit data or control breaches.To read this article in full or to leave Continue reading

IDG Contributor Network: What Amazon’s acquisition of Whole Foods means for enterprise IT operations

Amazon has announced that it is buying Whole Foods for $13.7 billion. The implications of this upon the grocery business have been widely written about in a variety of publications including Forbes, and Business Insider. The point of this post is not to rehash what Amazon will or will not do to the grocery business but rather to focus upon the lessons of this acquisition for Enterprise IT Operations.Every business is a digital business At the recent IT Operations Strategies Summit, Gartner released the results of a survey that it had done with the CEO’s of its clients. The results were that by 2020 these CEO’s expected the following:To read this article in full or to leave a comment, please click here

The inextricable link between IoT and machine learning

I met with a team of Microsoft AI researchers recently to discuss original adaptations of Resnet 50, a version of the convolutional network Microsoft used to win the Imagenet 2015 image recognition competition. The discussion about the scientists work caused me to reconsider the inextricable link between IoT and machine learning.Control loops are a fundamental principal of the internet of things (IoT.) If then, then that (ITTT) has a long history in conditionally controlling things dating to the invention of the electric relay in the 1830s. Over time, single relays were combined into state machines, and later, relays became transistors. During the glamorous growth of computers in IT, consumer and mobile sectors, less glamorous ITTT computers have been applied to many use cases such as controlling machines in factories and performing lab experiments.To read this article in full or to leave a comment, please click here

What is intent-based networking?

Cisco this week jumped head first into the intent-based networking market, saying the technology that uses machine learning and advanced automation to control networks could be a major shift in how networks are managed.But what exactly is intent-based networking?+MORE AT NETWORK WORLD: Why Cisco’s new intent-based networking could be a big deal +To read this article in full or to leave a comment, please click here

What is intent-based networking?

Cisco this week jumped head first into the intent-based networking market, saying the technology that uses machine learning and advanced automation to control networks could be a major shift in how networks are managed.But what exactly is intent-based networking?+MORE AT NETWORK WORLD: Why Cisco’s new intent-based networking could be a big deal +To read this article in full or to leave a comment, please click here

iPad Pro vs. iPad mini 4 vs. iPad: Which one should you buy?

So you’re in the market for a new iPad. Excellent choice—I couldn’t live without mine. It’s my companion when I’m catching up on news and email in the morning over tea, reading a comic book in the evening to unwind, or watching a movie while traveling on a plane. Update 6-22-2017: This article has been updated to include information about the new 2017 iPad, as well as the upgrades to the iPad Pro line.But these days, picking an iPad can be tricky. Apple currently sells four different models of iPad, with prices ranging from $329 to $1229. There are size, storage, color, and connectivity options to consider. All in all, there are 60 different variations of iPad from which to choose. So which iPad is right for you? Read on.To read this article in full or to leave a comment, please click here