There are many different personality traits found in individuals in our industry. One trait that I’ve found dominant in technical roles is that of introversion. This trait is one that often manifests itself by creating challenges with verbal communications. Depending on an individual’s role, or desired role, this can prevent a technology rockstar from reaching […]
The post The Importance of Effective Communication at Work appeared first on Packet Pushers Podcast and was written by Paul Stewart.
Back in the days of SUN Microsystem, Scott McNealy asked us to build a big F#@!ing Webtone Switch. At that time, the underlying pieces weren’t there but over last few years the possibilities have opened up. We now have the switch chips from Broadcom and Intel that switch at 1.2Tbps in H/W. From a OS view, 1.2 Tbps of switching at 300ns latency is great but the more amazing thing is PCIe as a control plane which allows 20-40Gbps of control plane B/W where you can change switch registers, L2/L3-tables, TCAMs, etc at nano-second rates.
So after more than three years of work and million lines of C code, the Pluribus Network’s engineering team has the switch chip under Crossbow control. For people who are not sure what I am talking about, in 2005 project Crossbow invented virtual switching inside a server hypervisor and introduced hardware based Virtual NICs and dynamic polling to get 40Gbps of bandwidth through a server OS. The details were published in “Crossbow: From Hardware Virtualized NICs to Virtualized Networks” in ACM Sigcomm VISA 09.
In the goal to benefit from merchent silicon ecosystem and orchestrate the entire infrastructure using Open source OS Continue reading
At Cisco Live 2013 in Orlando, Packet Pushers co-hosts Ethan Banks and Greg Ferro sat with Nexus 7000 champion Ron Fuller and network design expert Russ White to discuss how, when and why you might choose to deploy FabricPath, OTV, or LISP. In particular, we get into the specifics of what each protocol does, where […]
The post Show 155 – Integrating OTV, FabricPath & LISP – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.
It’s the latest dudilicious episode of Healthy Paranoia! This time we’ll be covering the topic of information sharing and analysis centers (ISAC), specifically in the research and educational networking sector, aka REN-ISAC. Joining Mrs. Y on this adventure into the land of dudeness is Wes Young, REN-ISAC Principal Security Engineer and Architect (El Duderino), Keith […]
The post Healthy Paranoia Show 15: The Dudes of REN-ISAC appeared first on Packet Pushers Podcast and was written by Mrs. Y.
A while back, I set about developing a modest configuration templating system for my employer. When I first joined the company, new network devices were being provisioned using configuration templates stored as Microsoft Word files, which, as you can imagine, was pretty painful. Each variable had to be identified and replaced by hand in a tedious and error-prone process. I wanted something better, but also cheap (or free) and simple. So I started building something.
To kick off my crazy project, I first decided to build a web application based on the Django Python framework (the same platform on which PacketLife.net runs). Django and similar frameworks handle most of the mundane tasks involved in writing a web application and allow for rapid prototyping. It also includes a built-in administration interface for creating and manipulating data independent of the front-end user interface. I spun up a modest internal VM running...
Leadership in most companies is not really something explicitly practiced. Generally, a few people who are naturally inclined kind of do their thing while the rest of the leadership ranks sort of ignore the finer points of people management. But why is that the case? And how do you avoid being one of those leaders […]
The post You got promoted, now what? appeared first on Packet Pushers Podcast and was written by Michael Bushong.
We all know the archetype of the fanboy (or fangirl of course, however I will forthwith use zealot as a gender-neutral term). They expound upon the superiority of their favorite… whatever, and lambaste the competing product or products, and will hear of nothing that would contradict their conclusions. The battle the zealots fight are well known: […]
The post Confusing The Familiar with The Superior appeared first on Packet Pushers Podcast and was written by Tony Bourke.
There are two proposals floating around that are trying to address BGP origination hijacks (aka Pakistan vs. YouTube): RPKI and DNSSEC-based system. Ivan Pepelnjak joins Greg Ferro to talk about what is means for Networking. This show was recorded in January 2013 and it’s been delayed publishing. Please accept my apologies. Show Links Opinionated background […]
The post PQ Show 30 – RPKI DNSEC and Internet Security with Ivan Pepelnjak appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Congestion-avoidance tools are complementary to, and dependent upon, queuing algorithms. Queuing/scheduling algorithms manage the front of a queue, while congestion-avoidance mechanisms manage the tail of a queue.
Congestion-avoidance tools are designed for TCP traffic, because TCP has built-in flow-control mechanisms that operate by gradually increasing traffic flows until packet loss has occurred. Once packet loss has occurred, the transmission rate is reduced before slowly ramping up again. This means that if no mechanism is in place to control TCP, any particular flow has the ability to eat up all available bandwidth.
When there are no congestion-avoidance tools in place, and queues fill, tail drop occurs, which means all traffic is dropped.
In a constricted channel without congestion-avoidance tools, TCP connections eventually synchronize with each other – they ramp up together, lose packets together, and back off together. This is called global synchronization and basically results in “waves” of TCP traffic.
Congestion-avoidance tools has no real benefit or use for UDP traffic, because UDP traffic does not have any retry logic.
RED combats global synchronization by preemptively and randomly dropping packets before queues fill. Instead of waiting for the queues to fill, Continue reading
In Malcolm Gladwell’s book The Tipping Point [affiliate link] the author identifies key roles that individuals play in spreading knowledge and ideas. Gladwell outlines two key roles, the maven and the connector. The maven is a person who accumulates subject matter expertise and is willing to distribute that knowledge on request. Think of a maven […]
The post The value of Connectors in the workplace appeared first on Packet Pushers Podcast and was written by John Harrington.
I am selling my rack as I need to make some space and I am now using CCIE Rack Rentals all the time which I find are so much more convenient. Only for UK as it is collection only, but if you are in the market for a CCIE Rack based on the INE topology […]
The post CCIE Rack for Sale appeared first on Roger Perkin - Networking Articles.
I recently decided to commit to my current company. I don’t mean work harder or focus more, though that’s implicit. I mean to consider being a “lifer.” For an independent personality like myself that’s a pretty tall leap. One of the reasons I got my CCIE was to avoid ever being the guy sweating when […]
The post Ageism and your career in I.T. appeared first on Packet Pushers Podcast and was written by Keith Tokash.
As some of you may know, I have spent a fair amount of my time in the last few years designing and improving multi-tennant hosting environments. Each revision attempts to learn from the mistakes of the previous iterations, as well as bundle in new features and “advancements” from each of the different vendors in the stack.
New offerings on the storage fronts, developments in the server space in the form of the boom of virtualisation, and the simple existence of the network amongst the fact that none of these technologies changed the existing/fundamental laws of networking.
Software-Defined Networking has sprung up as a way of providing both advancements in our current architectures and providing agility in changes needed in the future, but what is truly needed is a true abstraction of the entire data centre model that encompassed all of compute, storage, security and networking. The ability to define all of the requirements of your existing data centre and have them deployed and rolled out across which ever stack you are using (Private / Public / Hybrid / Tomorrows Favourite buzz.), in a consistent and definable manner.
Merging the requirements of each of the existing silos and describing Continue reading