Software defined networking (SDN) solutions have been in the labs for a while, primarily to explore functionality and understand what possible benefit they could bring to current infrastructure and operations. Over the past couple years, SDN has emerged as a strong alternative for IT operations in the areas of WAN, data center and the overlay solutions. The primary benefit realized, besides open networking, is the ability to accelerate service deployments. SDN solutions using OpenFlow tackled complex problems including dynamic provisioning, interconnection and fault management. While the functionality of SDN evolved and matured, the scale of SDNs was still tied to ternary content-addressable memory (TCAM). OpenFlow by design was implemented in the TCAM.
A brief on Ternary Content Addressable Memory (TCAM)
TCAMs are special memory devices that enable most of today’s intelligent networks. They enable match on a masked bit value rather than a binary match. This greatly enhances the usability of TCAM for network applications. There are many articles one can find on the Internet to get more details on TCAMs, but primarily they were responsible for the ideation of SDN. The possibilities in creating a policy-based forwarding model with a wild-card match introduced a multitude of network applications Continue reading

Recently, I was fortunate enough to be invited by Brian Horn with WISPA.org to teach a session at WISP America 2016 in Lousiville, KY. We had the class on Tuesday, March 15th 2016 and the turnout and response were great. Many different people have asked for the presentation, so I decided to go ahead and post it here. Hope this helps some of you who are trying to get into MPLS and although it does have a bit of a WISP focus, almost all of the concepts in the presentation apply to wireline networks as well.
About the presentation
Scope: This session was 30 minutes long with a Q&A afterwards, so the material is really a deep dive on MPLS. The goal was to introduce WISP engineers and owners to MPLS and how it improves the network as well as revenue.
When should I put MPLS in my WISP or Service Provider network? The answer is ASAP! I was asked this question by a small WISP earlier in the week and he said i’m just too small to be thinking about MPLS. My response to him was simply – “Do you want to get MPLS in and working Continue reading

Recently, I was fortunate enough to be invited by Brian Horn with WISPA.org to teach a session at WISP America 2016 in Lousiville, KY. We had the class on Tuesday, March 15th 2016 and the turnout and response were great. Many different people have asked for the presentation, so I decided to go ahead and post it here. Hope this helps some of you who are trying to get into MPLS and although it does have a bit of a WISP focus, almost all of the concepts in the presentation apply to wireline networks as well.
About the presentation
Scope: This session was 30 minutes long with a Q&A afterwards, so the material is really a deep dive on MPLS. The goal was to introduce WISP engineers and owners to MPLS and how it improves the network as well as revenue.
When should I put MPLS in my WISP or Service Provider network? The answer is ASAP! I was asked this question by a small WISP earlier in the week and he said i’m just too small to be thinking about MPLS. My response to him was simply – “Do you want to get MPLS in and working Continue reading
This could bring in a lot of Chinese developer talent.
Lots of people dream of starting their own business. If you want to make it a reality, be prepared to grapple with these hard facts.
The post So You Want To Start Your Own Business appeared first on Packet Pushers.
Lots of people dream of starting their own business. If you want to make it a reality, be prepared to grapple with these hard facts.
The post So You Want To Start Your Own Business appeared first on Packet Pushers.
Analysts disagree on whether Arista should be worried.

The post Worth Reading: SSL, TLS, and difficult privacy appeared first on 'net work.
Companies have struggled for years on how to allow third parties access to specific systems
that they manage or support? These systems and access requirements range from HVAC and phones systems to full IT outsourcing or development.
The problem has always been twofold; one, how to provide secure access into the datacenter, and two, how do you secure the third party access to only the systems they require access to. Basically, how do you limit the hop to hop once they are inside your datacenter.
In the paper, I show you how leveraging VMware’s NSX and VMware Horizon products, you now have two different deployment modules that will allow you to control third party access and restrict that user’s inter-datacenter hopping abilities.
Here you will find the full paper: https://communities.vmware.com/docs/DOC-31415
Hadar
The post Securing Access to and from your Jump Box and VDI with VMware NSX appeared first on The Network Virtualization Blog.
Can’t figure out how to pay for that IT training? Here are six steps for getting your company to foot the bill.
I have been talking about the value of well designed interfaces in network monitoring tools for a few years because the current generation is badly designed. I'm wasting a lot of time getting through the pain barrier before the software becomes useful.
The post Repsonse: Design in Tech Report 2016 appeared first on EtherealMind.
I had a sweet problem with ipSpace.net webinars for quite a while: there are way more ideas than available time. However, a few days ago I stumbled upon a great tip on Trello blog and immediately decided to use it.
Result: list of future ipSpace.net webinars as a Trello board.
Read more ...A growing number of vendors offer affordable alternatives for cloud-managed wireless networking.