Archive

Category Archives for "Networking"

2014 End of Year Blog Statistics

Although I wasn’t actively blogging this year, I’ve still been tracking views on the site and keeping an eye on number of visitors. I am looking forward to blogging again in 2015 so I wanted to collect the 2014 viewership statistics so I had something to compare to at the end of 2015.

Despite the lack of new content, I’m pretty happy that people are reading the existing articles and continue to post comments and email me questions. Please keep them coming!

Here are the year-over-year statistics for Jan 1 2014 – Dec 30 2014.

Overall YoY comparison:

2014_overall_stats

Once again these stats are courtesy of Google Analytics. If you compare this chart to the 2013 equivalent, you’ll see that Google has changed some of the metric names. Visits are now called Sessions and Unique Visitors are now Users. And like last year’s chart, the first number in gray is the current year’s number, the second number the previous year.

While the number of Users and Sessions grew at a slower rate than in 2013, they still grew! Very cool.

2014_new_vs_returning_visitor

As was the case in 2013, the users visiting the site are primarily made up of brand new visitors. It Continue reading

A Single Architect for Your Network

I finally got around to reading The Mythical Man Month (MMM), a famous book on large-scale software development projects (think operating systems) written in 1975, revised in 1995, and still strikingly relevant today in the neighboring field of building and managing massive networks.  While multiple points land directly on those of us working on massive […]

Author information

Keith Tokash

Keith Tokash

Keith Tokash, CCIE (R&S) #21236, began his career in 1999, and has spent the last decade running around large content and small ISP networks. He spends his spare time with his newborn son, on the mat at the local Jiu-Jitsu gym, and trying to keep his fat yap shut.

The post A Single Architect for Your Network appeared first on Packet Pushers Podcast and was written by Keith Tokash.

Q And A Should Include The E

The IT world is cyclical for sure. I’ve seen trends and topics repeating themselves over and over again in my relatively short time here. I find it interesting that we keep solving similar problems over and over again. I also find it fascinating that this particular issue leads to the reason why blogs are so important.

Any Questions?

Questions abound in IT. It’s the nature of the industry. However, it’s not just new questions that we create when technology leaps past us. We keep asking the same questions over and over again. This is the field of study that created the FAQ, remember?

In recent memory, I find the same questions being asked over and over again:

  • What is SDN?
  • How can SDN help me?
  • What makes this different from what we’ve done before?

You’ve probably asked those very same questions. Perhaps you found the answers you were looking for. Perhaps you’re still trying to figure it out. The problem is that those questions are still being asked. The industry should have evolved to the point where the simple questions have been answered with simple answers. Complex questions, or those questions that need more in-depth Continue reading

Risky Business #349

There’s nothing like taking a 12 hour road trip to help get caught up on podcasts. Even though I have a few more to go, I am feeling pretty accomplished with my progress.

One podcast episode jumped out at me as particularly interesting. This was the Risky Business 2014 [year] in review episode. This episode has the most interesting excerpts and commentary for breaches throughout this year. Have a listen by following the link below.

Risky Business #349 — 2014 in review | Risky Business

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may not reflect the position of past, present or future employers.

The post Risky Business #349 <– Wow, a LOT Happened in 2014 appeared first on PacketU.

Top 10 Network Management Blog Posts of 2014

Top 10 Network Management Blog Posts of 2014


by Steve Harriman, VP of Marketing - December 30, 2014

As the year winds down, we were interested to discover our most viewed blog posts of 2014, our inaugural year of the Knetwork Knowledge blog. Not surprisingly, the majority of articles concern SDN. From the rise of production deployments among service providers to management concerns to job security worries, SDN continues to alter the network landscape, attempting to assert its place as the disruptive technology it promises to be.

These top 10 articles present a good snapshot of SDN’s evolution this year as well as the network issues in general. Here they are in order of popularity (See also our short summary of each one below):

  1. SDN Deployments/Worries Rise Among Service Providers
  2. No, Software Defined Networking Will Not Doom Engineers
  3. First Impressions of the OpenDaylight Helium Release
  4. Network Management Challenges of 2014
  5. SDN Analytics & Orchestration from the 17th Annual SDN/MPLS Conference
  6. Okay, Maybe It IS the Network (Infographic)
  7. The Best Presentations on SDN Analytics and Wide Area Orchestration at SDN/MPLS 2014
  8. Necessity of Monitoring and Analytics in the SDN Era
  9. Netflix is using obfuscation to not pay their fair share!
  10. Continue reading

2014 End of Year Blog Statistics

Although I wasn't actively blogging this year, I've still been tracking views on the site and keeping an eye on number of visitors. I am looking forward to blogging again in 2015 so I wanted to collect the 2014 viewership statistics so I had something to compare to at the end of 2015.

Despite the lack of new content, I'm pretty happy that people are reading the existing articles and continue to post comments and email me questions. Please keep them coming!

PQ Show 39 – HP Networking – 3 Virtual Network Strategies Compared

HP Networking has three solutions for overlay or virtual networking in the Data Centre. Each solution meets different customer needs Show Notes HP Networking has three products for network virtualization and each product addresses different customers needs. NSX Federation – physical networking integrating with NSX Distributed Cloud Networking (DCN) Virtual Cloud Networking (VCN) NSX Federations […]

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post PQ Show 39 – HP Networking – 3 Virtual Network Strategies Compared appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Private VLAN Trunks :: Pt. 2: The Secondary (isolated) Trunk

Picking up where we left off on the first series, I want to discuss the other trunking option that we have in regards to PVLAN trunks. We might need a quick review on our PVLAN structure before we begin, however:

vlan 100
private-vlan primary
private-vlan association 200-201
vlan 200
private-vlan community
vlan 201
private-vlan isolated

This second trunk type is actually called the secondary, or isolated trunk. Much like the promiscuous trunk, this one has a pretty specific purpose, and that is to flip the VLAN tag when a frame is traversing a trunk. This time however, rather than removing the secondary VLAN tag, and replacing it with the primary tag, we are going to be doing the opposite! Remember how we were doing it with the promiscuous trunk? What happened here is the node with MAC A ingresses and is placed in VLAN 200. However, when it needs to reach the L3 GW (the router), we have to remove the secondary VLAN tag and replace it with the primary VLAN ID of 100 (so that it will hit the proper sub-interface on the router).

20141118_01

The routers return traffic will naturally be in VLAN 100 based on the sub-interface configuration. But Continue reading

Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors

Many old-style marketing people believe that capturing your contact information is the first step in making a sale. But any capture of your personal information is also leaking critical security information about your organisation, technology and personnel that are perfect for reconnaisance.


The post Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors appeared first on EtherealMind.

Why Your Presentation Stinks (Part 2)

Last time, we talked a little about making certain your presentation has a point — or a porpoise, as the case might be. This time I want to talk about a few other common mistakes I see network engineers make when building presentations, and actually presenting them.

First, you put too much text on your slides. I know you’re afraid you’re not going to remember everything you want to say, but that’s no excuse to have a 500 word essay on every slide. The bullet points on a slide are supposed to be just that — bullet points. They’re supposed to remind you of what you mean to say at this point in the presentation, not to be the actual words you’re planning on saying.

Okay, I understand we’re running head in to another problem here — what about folks who print my presentation out and take it home to read it later? That’s what hidden slides are for. Put all the text you really want to put into a slide on a hidden slide just after the slide itself. Then pull out just enough words for you to remember what’s on the hidden slide when you’re doing the presentation. Continue reading

BGPSEC: Replays, Timers, and Performance

Let’s return to our simple four AS network to look at a number of issues with BGPSEC — the bits you won’t often hear discussed in just about any forum. Assume, for a moment, that AS65000 advertises some route, say 192.0.2.0/24, to AS65001, and not to AS65002. For whatever reason, a few days pater, the […]

Author information

Russ White

Principal Engineer at Ericsson

Russ White is a Network Architect who's scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, and his author page on Amazon.

The post BGPSEC: Replays, Timers, and Performance appeared first on Packet Pushers Podcast and was written by Russ White.

Docker for network engineers. Part 1 – What is Docker?

Forget OpenStack, forget VMWare, Docker is the new kid on the block.

TL;DR

Docker and Linux containers result in more dense VMs per physical servers, increasing the network load per physical server and developers use it to run more VMs than ever before.

Also, there is no vSwitch (that is the most important peace of information).

What is Docker?


Docker is an echo system built on top Linux containers. To tell the tale, we need to start with Hypervisors.

Hypervisors



The "regular" virtualization is a hardware virtualization. That means that a hypervisor such as ESX, or even your laptop running vmware/vbox, emulates several virtualized physical servers running side by side on a single physical machine.

Notice that each virtual machine is running it own OS. That is wasteful. Especially because it is very rare to find two applications running inside a single server, so for each application, we run the OS too.

The plus side is that you can run any mix of OSes side by side on the same physical server.You can run Windows, Linux, Solaris, IOSv, ASAv, CSR1000v, vMX, Alteon VA, F5, Vyatta, etc.... concurrently on one physical server.


Linux Continue reading

Docker Overview

Even though Linux container technology has been available for quite some time, Docker has revolutionized the container technology with its simple packaging that allows portability of applications. Docker packages the applications along with the dependencies like related libraries into an simple image. This single image can be then run on different locations like bare-metal, VM, … Continue reading Docker Overview

Show 218 – OSPF Design Part 2

A long time ago, Packet Pushers ran an OSPF Design Part 1 show. That show went after the default design guides that network engineers have been reading for years, making the big point that you can scale a single OSPF area quite large indeed. But…that’s not the entire story about OSPF areas. Areas still have their use cases, […]

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 2M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post Show 218 – OSPF Design Part 2 appeared first on Packet Pushers Podcast and was written by Ethan Banks.