
The post Worth Reading: IoT Hub Throttling appeared first on 'net work.
Juniper’s Contrail does the orchestration.
The latest episode of Network Break debates the merits of Bimodal IT and drills into OpenStack news from Walmart (yes, Walmart) and Dell. We also cover stories from Intel, Mesosphere, Cisco, Mellanox and F5.
The post Network Break 84: Is Bimodal IT BS?; OpenStack Advances appeared first on Packet Pushers.
The latest episode of Network Break debates the merits of Bimodal IT and drills into OpenStack news from Walmart (yes, Walmart) and Dell. We also cover stories from Intel, Mesosphere, Cisco, Mellanox and F5.
The post Network Break 84: Is Bimodal IT BS?; OpenStack Advances appeared first on Packet Pushers.

Throughout the last several months, I’ve been building a set of posts examining securing BGP as a sort of case study around protocol and/or system design. The point of this series of posts isn’t to find a way to secure BGP specifically, but rather to look at the kinds of problems we need to think about when building such a system. The interplay between technical and business requirements are wide and deep. In this post, I’m going to summarize the requirements drawn from the last seven posts in the series.
Don’t try to prove things you can’t. This might feel like a bit of an “anti-requirement,” but the point is still important. In this case, we can’t prove which path along which traffic will flow. We also can’t enforce policies, specifically “don’t transit this AS;” the best we can do is to provide information and letting other operators make a local decision about what to follow and what not to follow. In the larger sense, it’s important to understand what can, and what can’t, be solved, or rather what the practical limits of any solution might be, as close to the beginning of the design phase as possible.
In the Continue reading