It is common wisdom that BGP is awesome because, you know, … something. It runs the Internet therefore it must good. It can be extended and that makes it good. Lots of vendors use it ….. Hang on. When you think about it there are no good, solid BGP implementation in open source. Quagga is […]
The post Thought: Why Are There No Good Open Source BGP Implementations ? appeared first on EtherealMind.
In our last episode, we discussed how DNS is paid for in the real world — who builds, maintains, and manages all those servers that allow us to put in a domain name, and end up with a web page? This post will look at two other tools or protocols in the DNS system that […]
I have decided to change my focus quite a bit.
I was planning on tackling the IOS-XR exam this year and was preparing for it by going through the blueprint. However another track kept pulling me towards it, and ofcourse thats the CCDE track.
I have spent the last 6 years learning how to do something, but so far i havent spent alot of time thinking about why that is.
I am not doing the CCDE track in order to pass the exam. I might not even go as far as giving the practical exam a go. I am however going to pursue the written exam for now, as it will give me a target for which to learn new stuff.
To that end, a few of us have created a study group, which im very thrilled about. It will provide an outlet for any ideas and thoughts as well as input. All in all great stuff.
So thats a quick update
To be honest I really tried hard to find a name for this article. Maybe it is not convenient and if you have better idea please let me know in the comment. I want to mention sub optimality and stretch in the networks while using routing protocols but the idea actually came to me from […]
The post Visibility, Trustship,Sub optimality or whatever you want to call it. appeared first on Packet Pushers Podcast and was written by Orhan Ergun.
For the 3rd installment on my three part SDN series, building on A Business Case for SDN, and the SDN Ecosystem, the most practical way to start exploring an SDN deployment is with a proof of concept (POC). But even if you have the approval to go ahead with an SDN POC, it can be difficult to know where to start. Let’s cut through the uncertainty and lay out what it takes to do a successful SDN POC.
Identify a pain point
Start by identifying a key pain point in networking that you’d like to address with SDN. For example, you might want to improve campus security, or improve the performance of collaborative tools, or streamline your data center. Specific tasks in these areas include adding a network tap, increasing the speed of a LAN link, or reassigning VLANs.
We’ll assume you have surveyed business unit leaders, ranked overall IT strategies and come back with one SDN application to start your evolution. Similar to a cloud or BYOD initiative, giving visibility for SDN can help you bring the company together, and can also build support for improving how IT can drive the business. If you understand the Continue reading
You may have noticed Arista being uncharacteristically quiet throughout an imposed “quiet period” leading up to our IPO (ANET). While the industry continued to speak out on behalf of, or against, Arista, the company remained true to its focus on solving customer problems through disruptive cloud networking architectures and technology. Enabling innovative applications to take advantage of modern networking through Arista EOS remains a key priority for the company.
The migration from legacy “policy per application” to universal cloud networks is crystal clear and underway. The classical 1990s web, file and database tier in client-server architectures, with north-south traffic, is migrating to universal workflow telemetry and workload automation for east-west, server-to-server traffic of the 21st Century. This is particularly true as networks move to mandates of terabit scale for data, control, and management. Arista invented the concept of “Leaf-Spine” and late last year introduced the “SplineTM” as architectures to support these next generation network requirements. Five years later others are still trying to mimic the approach but lack the fundamental software or scale to achieve it.
Through the years we’ve witnessed many failed attempts to lock-in customers with proprietary fabrics (FabricPath, QFabric, etc.) and once again we are witnessing Continue reading
For the last 20 years, L2 tree-based network topologies meant that the only practical design methodology was to buy large, vertically scaled switch chassis for the core of the data centre. This limitation was largely due to the tree-structure forced on LAN networking by Spanning Tree Protocol. For every new device at point Access/1 we […]
The post Switch Prices Will Get Cheaper. Design Models Will Change. appeared first on EtherealMind.
Jay Swan, Lennart Koopman, and Wes Kennedy join the Packet Pushers co-hosts Ethan Banks and Greg Ferro in this discussion of effectively managing event logging. Why discuss logging on a show about networking? Because networking has a huge volume of logs coming from routers, switches, and firewalls that need to be managed. And frankly, it’s […]
The post Show 192 – Logging Design & Best Practices appeared first on Packet Pushers Podcast and was written by Ethan Banks.
A Meeting room. Discussing the possible options for product and vendor strategy. Company urgently needs to avoid capital expenditure and reduce maintenance costs. The engineer across the table is wearing a vendor t-shirt, a few years old and looks a bit tatty. The table and chairs are tired and a bit worn. I took a […]
The post The Disconnect. Good Enough Is Good Enough. appeared first on Packet Pushers Podcast and was written by Greg Ferro.
It can’t be helped. There’s just too much cool stuff out there and not enough time to spend dedicating myself to one piece of technology. That being said, I fully intend on continuing the Chef posts, but Im going to be mixing in some docker posts as well. Im hoping that there’s some cross-connect as well where we can talk about using docker in conjunction with Chef as well.
Docker is something that I haven’t seen before. From what I have seen so far, it appears to be an incredibly easy way to containerize applications and software on a linux system. The docker website summarizes docker as..
“An open platform for distributed applications for developers and sysadmins.”
That summarizes things nicely, but again, why is a network guy interested in this? First off, I’m a little tired of VMware. Don’t confuse me being tired with a general dislike of the product. I’ve been using VMware for years and for the most part, it works well and provides the functions I need. On the flip side, Im not convinced there’s anything particularly special about VMware.
I’ve been using ProxMox at home for some time and it does everything that I Continue reading
Most home users select their wireless network name without much thought to the actual name except to make it easy for them to see and connect to. So many people never think that the networks name also known as the Service Set Identifier or SSID could be a security risk. Okay, a security risk may be a reach, but let’s just say some SSIDs are more secure than others, and I will list some dos and don’ts when selecting an SSID.
Before the list lets discuss what makes the SSID important. Hackers need to gather several pieces of information including the SSID to crack a networks WPA/WPA2 password. Hackers have pre-configured tables with this information including common or default SSID names and if you’re using one of these common names you have made their job easier and your network more of a target.
Collection of useful, relevant or just fun places on the Internets for 12th June 2014 and a bit commentary about what I’ve found interesting about them: Will Network Engineers Become Programmers? « ipSpace.net by @ioshints – Ivan explains his view on the ways that network folks will work with programmers. I think he describes […]
The post Internets of Interest for 12th June 2014 appeared first on EtherealMind.
Update (10:00ET, 14-Jun-2014): See below for a copy of Friday’s Iraqi MoC order to disconnect social media.
Iraq is descending into further violence, as militant group ISIL takes control of Mosul and beyond. Renesys has observed two large Internet outages this week (here and here) that our sources confirmed to be government-directed outages. These interruptions appear to coincide with military operations, amid concerns that ISIL forces are using Internet websites to coordinate their attacks.
2nd massive outage this week in Iraq at 14:27UTC lasted over 3hrs. ISPs Earthlink, IQNetworks impacted pic.twitter.com/pR8ab7jFAa
— Renesys Corporation (@renesys) June 12, 2014
#iraq-i government to shutdown internet in #Nenwah #Kirkuk #salah_al_deen #alanbar #leaked -no prove- #email #ISIS pic.twitter.com/eM3OqkVzyo
— Jassey (@eng_mohamedarif) June 12, 2014
The screencapture image in this tweet shows an email message announcing the latest shutdown. It reads:
Dear Valued customers
Due to the current security situation in iraq and as per the MOC instruction sent by the PM Mr Nori Kamel Al-Maliki ,the internet service will be suspended for the below provinces until further notice starting from today Thursday 12/6/2014 , Continue reading
Couple of quotes from John Chambers keynote during Cisco Live that I seemed to leap out at me: “You are going to see a brutal, brutal consolidation of the IT industry where out of the top five players, only two or three of us will be meaningful in as quick as five years.” “When we […]
The post Musing: Cisco Playing the Underdog appeared first on EtherealMind.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Show Links Cisco’s 3 Commandments – Drew’s take on Chambers’ CLUS keynote Cisco Faces […]
The post Coffee Break Show 9 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
[player] This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Show Links Cisco’s 3 Commandments – Drew’s take on Chambers’ CLUS keynote Cisco […]
The post Coffee Break Show 9 appeared first on Packet Pushers.