Archive

Category Archives for "Networking"

BGP : iBGP fully meshed solution : Confederations

Today I am going to talk about the one of the BGP article named as BGP Confederations. Now question is why we are using the BGP Confederations. If you guys ever configured the iBGP protocol you need to configure full meshed scenario in iBGP as per the rule of the policy.

With the full meshed network you will have to maintain all the links from all the routers to each other in the internal BGP network. So let us suppose you have 10 routers in your network and you want to configure iBGP network between them, so how many links you required to maintain the fully meshed network here. Well you need to have the 45 links between these 10 routers to establish the iBGP links between all of them.

You ever think that this may be of higher cost and ever router needs to have the information of the other routers in the network. Well to sort out iBGP full meshed network scenario we have two methods and these methods are Confederations and Route Reflectors.

In this article I am going to take the first method and the name is Confederations. In which I will explain how Confederations work and what are the basic Continue reading

Jinja2 For Network Engineers

Jinja2 is a templating language built in python and loosely based on the Django templating language. Jinja2 is used in many projects as a templating engine with some notable examples: Ansible, Salt and Flask. Jinja2 aims to implement some of the most common features of python right into...

5 host network configurations for MLAG

Host network configurations for MultiChassis Link Aggregation (MLAG, also referred to as dual-attach or ‘high availability’) can vary from host OS to host OS, even amongst Linux distributions. The most recommended and robust method is to use Link Aggregation Control Protocol (LACP), which is supported on most host operating systems natively. Host bonds or bonding refers to a variety of bonding methods, but for the purpose of this article it will refer to LACP bonds. The terms etherchannel, link aggregation group (LAG), NIC teaming, port-channel and bond can be used interchangeably to refer to LACP depending on the vendor’s nomenclature. For the sake of simplicity, we will just call it bonds or bonding. This post will take your through the steps for host network configurations for MLAG across five different operating systems.

Why LACP? LACP is a IEEE standard that has been available since 2000 known as 802.3ad. This makes a highly interoperable standards approach to bonding that can work across many network vendors and host operating systems. LACP is superior to static configuration (also referred to bond-mode ON) because there is a control protocol keeping the bond active. This means failover is predictable and automatic. This is also Continue reading

Data center provider Equinix bets big on fuel cells

Data center provider Equinix is making a big bet on fuel cells to power its facilities by installing natural gas-powered fuel cells at 12 of its U.S. data centers. It’s part of a push for the firm to be 100% reliant on renewable fuels, and it could set an example for other data centers in power management.Equinix uses fuel cells developed by Bloom Energy, a leader in the data center energy market that has been profiled by 60 Minutes and whose giant “batteries” are installed at data centers run by eBay, Apple, NTT, CenturyLink and Verizon.To read this article in full or to leave a comment, please click here

Data center provider Equinix bets big on fuel cells

Data center provider Equinix is making a big bet on fuel cells to power its facilities by installing natural gas-powered fuel cells at 12 of its U.S. data centers. It’s part of a push for the firm to be 100% reliant on renewable fuels, and it could set an example for other data centers in power management.Equinix uses fuel cells developed by Bloom Energy, a leader in the data center energy market that has been profiled by 60 Minutes and whose giant “batteries” are installed at data centers run by eBay, Apple, NTT, CenturyLink and Verizon.To read this article in full or to leave a comment, please click here

Data center provider Equinix bets big on fuel cells

Data center provider Equinix is making a big bet on fuel cells to power its facilities by installing natural gas-powered fuel cells at 12 of its U.S. data centers. It’s part of a push for the firm to be 100% reliant on renewable fuels, and it could set an example for other data centers in power management.Equinix uses fuel cells developed by Bloom Energy, a leader in the data center energy market that has been profiled by 60 Minutes and whose giant “batteries” are installed at data centers run by eBay, Apple, NTT, CenturyLink and Verizon.To read this article in full or to leave a comment, please click here

Data center provider Equinix bets big on fuel cells

Data center provider Equinix is making a big bet on fuel cells to power its facilities by installing natural gas-powered fuel cells at 12 of its U.S. data centers. It’s part of a push for the firm to be 100% reliant on renewable fuels, and it could set an example for other data centers in power management.Equinix uses fuel cells developed by Bloom Energy, a leader in the data center energy market that has been profiled by 60 Minutes and whose giant “batteries” are installed at data centers run by eBay, Apple, NTT, CenturyLink and Verizon.To read this article in full or to leave a comment, please click here

BrandPost: Service Providers Drive New Managed SD-WAN Services

When SD-WAN first began capturing the media spotlight in 2015, many carriers initially viewed SD-WAN as a potential threat to their business.Fast forward two years and it’s become clear that SD-WAN provides a new way for service providers to address the changing connectivity needs of the enterprise. As enterprise applications migrate to the cloud, a new set of opportunities has emerged for advanced managed service offerings.Recognizing SD-WAN’s Many BenefitsWhile some of the initial messaging around SD-WAN focused on the potential cost savings of using broadband connectivity, there are in fact many other and more important drivers for SD-WAN that include:To read this article in full or to leave a comment, please click here

BrandPost: Service Providers Drive New Managed SD-WAN Services

When SD-WAN first began capturing the media spotlight in 2015, many carriers initially viewed SD-WAN as a potential threat to their business.Fast forward two years and it’s become clear that SD-WAN provides a new way for service providers to address the changing connectivity needs of the enterprise. As enterprise applications migrate to the cloud, a new set of opportunities has emerged for advanced managed service offerings.Recognizing SD-WAN’s Many BenefitsWhile some of the initial messaging around SD-WAN focused on the potential cost savings of using broadband connectivity, there are in fact many other and more important drivers for SD-WAN that include:To read this article in full or to leave a comment, please click here

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)