Over the past 12 months, VMware NSX momentum has continued to grow, as we’ve added new platform capabilities, expanded our partner ecosystem, and of course, had more than 250+ customers purchase NSX for deployment. And as interest in VMware NSX has grown with both customers and IT professionals looking to evolve their careers by adding certification in network virtualization, one of the most common questions that we get is “How can I get started with NSX?.”
We understand that there is a strong demand for individuals and organizations to get their hands on the NSX technology. Many of you are working towards your initial VCP-NV certification. Others of you are exploring NSX as a way to improve your organization’s agility and security while reducing overall costs.
Here are three ways individuals and companies can get started with NSX.
Complete NSX: Install, Configure, Manage Training – for individuals on the NSX career path, we offer “NSX: Install, Configure, Manage” training. We are offering ICM training as part of our On-Demand Curriculum, or you can take a 5-day instructor led course. Here is the detailed course description and class schedule. ICM training is a pre-requisite for VMware NSX certification. Once Continue reading
Looking back at 2014, it feels like a lot of progress was achieved in the past year in both the cloud infrastructure and NFV infrastructure markets. Some of that progress is technical, some is in terms of increased understanding of the key business and technical aspects. This post is my attempt to capture some changes I’ve observed from my particular vantage point.
This December marks the second anniversary of the acquisition of Contrail Systems by Juniper Networks. In the last year the Contrail team managed to deploy the Contrail network virtualization solution in several marquee customers; to solidify the image of the OpenContrail project as a production-ready implementation of the AWS VPC functionality; but, probably, more importantly to help transform attitudes at Juniper (and in the industry) regarding NFV.
In the late 90s and early naughts, the carrier wireline business went through a significant change with the deployment of provider managed virtual networks (using BGP L3VPN). From a business perspective, this was essentially outsourcing the network connectivity for distributed enterprises. Instead of a mesh of frame relay circuits managed by the enterprise; carriers provide a managed service that includes the circuit but also the IP connectivity. This is a service Continue reading
Dan wrote in with a question:
Hey, I like your site as well… are you going to be doing any more posts? It just seems odd that your last blog post was the analyzation of the site and how it portends to your future work. anyway, good luck
I know it’s tacky to write a blog post about how you’re not writing enough blog posts… but here goes.
Yes, I will be blogging again. And I have lots of content ideas. And I’m actually itching to get back to writing. I’ve been working on something else for the past few months and I decided I couldn’t take that on and blog at the same time. So for now my writing is on hold, however I do see and respond to all comments in the articles and am reachable via email as well.
Thanks to everyone who reads and posts comments. I look forward to writing more posts in the new year!
The Internet of Everything (IoE) is essentially about connections, bringing people, processes, data and things together in unprecedented ways. IoE delivers the right information to the right person (or machine) at the right time, and converts data into intelligence to make better decisions.
Organizations will use the connections made by IoE to transform our work and private lives, creating smarter products and services, more convenience for consumers and new forms of work-life integration. However, in order to capitalize on these connections, organizations will need well-trained staff. Cisco predicts that approximately 220,000 new engineers will be needed globally every year for the next 10 years to keep up with the technological surge of IoE. This is a gap that must be filled if the potential of IoE is to be realized.
To read this article in full or to leave a comment, please click here
The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.
The iWARP protocol is the open Internet Engineering Task Force (IETF) standard for RDMA over Ethernet, and offers an interchangeable, RDMA verbs-compliant alternative to specialized fabrics such as InfiniBand. iWARP adapters are fully supported within the Open Fabrics Alliance Enterprise software distribution (OFED), with typically no changes needed for applications to migrate from InfiniBand to Ethernet.
To read this article in full or to leave a comment, please click here
Neil Moore is the first and only 8 x CCIE in the world. Neil shares his CCIE preparation tricks, study methodology and many other important points.
The post Community Podcast: 8xCCIE Neil Moore and Orhan Ergun – CCIE Preparation appeared first on Packet Pushers Podcast and was written by Orhan Ergun.
Neil Moore is the first and only 8 x CCIE in the world. Neil shares his CCIE preparation tricks, study methodology and many other important points.
The post Community Podcast: 8xCCIE Neil Moore and Orhan Ergun – CCIE Preparation appeared first on Packet Pushers.
Leon Adato, Technical Product Marketing Manager with SolarWinds is our guest blogger today, with a sponsored post — the third in a four-part series on the topic of alerting. In the last two posts in this series, I described two of the four (ok, really five) questions that monitoring professionals are frequently asked: Why did […]
The post 4 Inevitable Questions When Joining a Monitoring Group, Pt.3 appeared first on Packet Pushers Podcast and was written by Sponsored Blog Posts.
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is either drunk or lying, and possibly both”.
Networks are of course inherently distributed systems. Most everyone that has managed a good sized network before knows that like the example in the article, minor changes in traffic or connectivity can have huge implications on the overall performance of a network. In my time supporting some very large networks I have seen huge chain reactions of events based on what appear to be some minor issues.
Very few networks are extensively modeled before they are implemented. Manufacturers of machines, cars and many other things go through extensive modeling to understand the behaviors of what they created and their design choices. Using modeling they will look at all possible inputs and outputs, conditions, failure scenarios and anything else we can think of to see how their product behaves.
There are few if any true modeling tools for networks. We build networks with extensive distributed protocols to control connectivity Continue reading
Simonp made a perfectly valid point in a comment to my latest OVS blog post:
Obviously the page you're referring to is a quick-and-dirty benchmark. If you wanted the optimal numbers, you would have to tune quite a few parameters just like for hardware benchmarks (sysctl kernel parameters, Jumbo frames, ...).
While he’s absolutely right, this is not the performance data a typical user should be looking for.
Read more ...It is possible to simply convert the raw sFlow metrics into InfluxDB metrics. The sflow2graphite.pl script provides an example that can be modified to support InfluxDB's native format, or used unmodified with the InfluxDB Graphite input plugin. However, there are scaleability advantages to placing the sFlow-RT analytics engine in front of the time series database. For example, in large scale cloud environments the metrics for each member of a dynamic pool isn't necessarily worth trending since virtual machines are frequently added and removed. Instead, sFlow-RT tracks all the Continue reading
Resource Public Key Infrastructure (RPKI) is a relatively new standard for establishing BGP route origination. I wrote a brief introductory article here. Apologies for the self-promotion, but rather than rehash the basics here, I raise another issue that needs community attention: ARIN’s Relying Party Agreement (RPA: PDF link). Having said that, some basics are needed. […]
The innovation of hundreds of startup companies created the Internet, and the Internet has changed the world. Innovation continues to have a dramatic impact on networking in recent years. These new developments have changed the way applications, workloads and networks interact. Having been involved in this industry for more than three decades, I have witnessed and been part of these transformations from the 1980s to the 2015 era. Each phase of innovation has been characterized by new companies and entrants, as depicted below:
PHASES OF NETWORK INNOVATION | Epoch | Vendors | Network Technologies | Trends |
---|---|---|---|
First 1980–1995 |
AT&T, Sun, 3Com, NET, Proteon, UB, BBN, DEC, IBM |
ARPANET, Circuits, Hubs, SNA, Ethernet, Token Ring, Routers |
Terminal-Mainframes and Minis, Channel Attach |
Second 1995–2010 |
Cisco, Juniper, Nortel/Bay, Alcatel, Lucent, Avaya |
Switching, Multiprotocol Routing, LAN-WAN, TCP/IP |
PC, Client-Server, Web, North-South traffic |
Third 2010–present |
Arista, VMware, Facebook, Microsoft, Splunk, Red Hat, Palo Alto, Aruba, many others |
The SDN Era of Open, Programmable Networking, DevOps meets NetOps, Universal Cloud Networks |
Mobile Virtual Workloads and Workflows, Big Data, Hyperscale Web, Virtual Machines / Containers |
Dominant companies often fall by the wayside when they do not anticipate and react to clear market trends as Continue reading
The Syrian national Telecommunications Establishment (STE) has been in the news numerous times over the last few years, mostly because of the long lasting large scale Internet outages in Syria. This morning however we observed a new incident involving the two Autonomous systems for STE (AS29386 and AS29256). Starting at 08:33 UTC we detected that hundreds of new prefixes were being announced by primarily AS 29386. The new BGP announcements by STE (AS29386) were for prefixes that are not owned or operates by the Syrian Telco and as a result triggered ‘hijack / origin AS’ alerts for numerous BGPmon users. The announcements lasted for a few minutes only and we saw paths changing back to the original origin AS at about 08:37 UTC.
RIPE stat has some great tools that visualize the event, this example shows what happened to the youtube prefix 208.117.232.0/24
Propagation
STE buys upstream connectivity to the rest of the Internet via three providers, AS3491 (PCCW Global), AS3320 (Deutsche Telekom AG) and AS6762 (Telecom Italia Sparkle). The ‘bad’ BGP updates from this morning were only seen via Telecom Italia. This is either because STE only announced it to Telecom Italia, or because the other two providers filtered Continue reading
Whitebox switching has moved past the realm of original device manufacturers and has been taken up by traditional networking vendors. Andre Kindness (@AndreKindness) of Forrester recently posted that he fields several calls from his customers every day asking about a particular vendor’s approach to whitebox switching. But what do these vendor offerings look like? And can we predict how a given vendor will address the whitebox market?
Chocolate In My Peanut Butter
Dell was one of the first traditional networking vendors to announce a whitebox switch offering that decoupled the operating system from the switching hardware. Dell offered packages from Cumulus Linux and Big Switch Networks alongside their PowerConnect lineup. This makes sense when you consider that the operating system on the switch has never been the strong suit of Dell. The PowerConnect OS is not very popular with network engineers, being very dissimilar from more popular CLIs such as Cisco IOS and its look-alikes. Their attempts to capitalize on the popularity of Force Ten OS (FTOS) and adapt it or use on PowerConnect switches has been difficult at best, due to the divide been hardware architecture of the two platforms.
What Dell is very good at is Continue reading