The next proposed (and actually already partially operational) system on our list is the Router Public Key Infrastructure (RPKI) system, which is described in RFC7115 (and a host of additional drafts and RFCs). The RPKI systems is focused on solving a single solution: validating that the originating AS is authorized to originate a particular prefix. An example will be helpful; we’ll use the network below.
(this is a graphic pulled from a presentation, rather than one of my usual line drawings)
Assume, for a moment, that AS65002 and AS65003 both advertise the same route, 2001:db8:0:1::/64, towards AS65000. How can the receiver determine if both of these two advertisers can actually reach the destination, or only one can? And, if only one can, how can AS65000 determine which one is the “real thing?” This is where the RPKI system comes into play. A very simplified version of the process looks something like this (assuming AS650002 is the true owner of 2001:db8:0:1::/64):
Jim Metzler recaps Martin Casado's Interop keynote and reflects on the VC's predictions.
How does a network engineer deal with divestiture--that is, getting rid of some part of your company's business? On today's Weekly Show, Jeremy Filliben shares his lessons learned in separating networking one from another is. Jeremy is a network engineer for a Fortune 500 insurance company.
The post Show 287: Handling Business Divestitures appeared first on Packet Pushers.
How does a network engineer deal with divestiture--that is, getting rid of some part of your company's business? On today's Weekly Show, Jeremy Filliben shares his lessons learned in separating networking one from another is. Jeremy is a network engineer for a Fortune 500 insurance company.
The post Show 287: Handling Business Divestitures appeared first on Packet Pushers.
New opportunities for how data centers can manage their IT infrastructures.
The post Worth Reading: How Big Data Creates False Confidence appeared first on 'net work.
One of the most important layers we – as network engineers – hate and avoid in the OSI reference model is the transport layer with its popular and dominant protocol; TCP. Most of network engineers abandoned diving into TCP protocol because they consider it a host-to-host communication protocol that usually works without a problem. End systems …
The post TCP Protocol: The Overview – Part1 appeared first on Networkers-online.com.
Open Source TL:DR – I hosted a keynote panel during Interop Las Vegas 2016 on the topic of Open Source in the Enterprise. Here are the panel notes I prepared. Network Computing wrote up the article here: Open Source: The Enterprise Impact | Network Computing. Premise: In 2016, we are talking about new problems with Open Source […]
The post Open Source in The Enterprise Panel appeared first on EtherealMind.
Network service chaining and service function chaining uses software-defined networking (SDN) capabilities connecting a series of virtualized network services within the same network flow.
Confusing between disabling and deactivating interfaces on JUNOS is a common mistake that leads to all sorts of problems during implementing changes on live network boxes. Let’s look and clarify the differences quickly. Disabling an interface: Disabling an interface in JUNOS is equivlaent to interface shutdown in Cisco, it is going to take the interface …
The post JUNOS Disable vs Deactivate interfaces appeared first on Networkers-online.com.