Will End-to-End Service Management Standards and Tools Always Trail New SDN Technologies?
There’s an interesting Light Reading article by Carol Wilson talking about Ari Banerjee's research into end-to-end service management for SDN & NFV, and how Banerjee has shown that the European Telecommunications Standards Institute (ETSI) has failed to take into account hybrid virtualized and non-virtualized environments when drawing up their standards on virtualized service and network functions.
In other words, the standards work in theory, but in practice, they're just too simple for real-world environments. Will end-to-end service management standards and tools always trail new SDN technologies?
Here's an odd thing about technology development: it tends to come in five distinct stages.
Stage 1: Can we do this thing?
Stage 2: How can we do this thing?
Stage 3: What's the best way to do this thing?
Stage 4: How do we make doing this thing easier?
Stage 5: How can we manage this thing?
And of course, sometimes answering, "How do we make doing this thing easier?" and “How can we manage this thing?” starts with asking the question "Can we do this Continue reading
Thanks for tuning in for another crime busting episode of Healthy Paranoia. Today, we’ll be getting down and dirty with some actual practitioners to discuss what’s wrong with PCI DSS. Joining me in the secret Healthy Paranoia hideout will be Mr. Stits, an actual PCI QSA. We also have Mrs. Dystie, expert in exploding crypto […]
The post Healthy Paranoia Show 24: Down and Dirty with PCI DSS appeared first on Packet Pushers Podcast and was written by Mrs. Y.
A few weeks back the forum that I go on often held a obfuscation challenge, and people joked around about submitting a entry that was coded in APL.
APL (A Programming Language) is a programming language that w
Collection of useful, relevant or just fun places on the Internets for 24th May 2014 and a bit commentary about what I’ve found interesting about them: Google: ‘EVERYTHING at Google runs in a container’ • The Register – Containers are going to add to the complexity of virtual networking. With Google saying that they […]
The post Internets of Interest for 24th May 2014 appeared first on EtherealMind.
Cisco Live happened in the US this week and it seems like a good time to briefly summarise a few of the anouncements that I saw. Embrane Pivots Embrane announced that they will be offering: …. lifecycle management for virtual network service delivered within Cisco ACI™. The company also announced plans for integrating the Embrane […]
The post News Roundup: Embrane, Cisco Prime NCS, F5 and VMware appeared first on EtherealMind.
How does the internet work - We know what is networking
BGP prefix flapping can be caused by different issues in network. Basically every unstable network where links are unreliably and are going up and down here and there can cause BGP prefix flapping. Every prefix flap will cause some networks to became unreachable. BGP process will then need to recalculate best-path in order to hopefully […]
A router’s main function is to forward an incoming packet to its destination by using routing and forwarding techniques. Forwarding can be defined as taking the incoming packet, looking at its destination IP address, consulting the forwarding table, and directing the packet to the appropriate next-hop and output link based on the information retrieved from the forwarding table. On the other hand, routing is the process by which the forwarding table itself is built. Forwarding is a relatively simple process performed locally at the router, whereas routing depends on a variety of distributed dynamic and static routing protocols.
To consult the forwarding table, the router uses the packet’s destination IP address as a key to retrieve the forwarding information (e.g., next-hop and output interface) – this operation is called IP address lookup. Once the forwarding information is available, the router transfer the packet from the incoming interface to the appropriate outgoing interface.
The greatest challenge and major bottleneck is how to make the IP address lookup fast enough to keep up with backbone routers that support high data rate interfaces (up to 10 Gbps and more). Therefore, they must be able to perform millions of address lookup operations Continue reading
An explanation of the difference between SDN, Automation and Orchestration.
The post The Difference Between SDN, Automation and Orchestration appeared first on EtherealMind.
Hey everyone,
I’ve been having a really good time here at Cisco Live US. Here is a short update on CML.
General Info
CML is being released end of June or beginning of July. The corporate edition with
a base license and support for up to 15 nodes will be listed at around 13000$ per year.
If you subscribe for two years, the discount is 5% and for three years it is 10%
Normally 15 nodes cost around 13000$ per year so basically you get 5 nodes for “free”
if you get the base package which has the SKU R-CML-CE-K9=.
IOS will be supported by running IOSv. Every IOSv image requires around 512 MB of memory.
System Requirements:
Today, we’re announcing the acquisition of Renesys by Dyn, the leading provider of Internet Performance solutions. Dyn and Renesys represent the perfect combination of Internet Intelligence assets from Renesys and Traffic Management and Message Management solutions from Dyn. We’re excited to become part of the Dyn team!
Those who know both companies may ask, “What took you so long?” Our headquarters are located blocks apart in beautiful downtown Manchester, New Hampshire, and the two founding teams have known each other for years. Dyn and Renesys share a surprising amount of cultural DNA – building scalable global infrastructure, understanding the economics and performance of the Internet at a deep technical level, and helping our customers deliver smarter, faster service worldwide.
Renesys builds network performance management products for the Internet. We help enterprises tackle the strategic and operational challenges of delivering service over the public Internet, to consumers and businesses beyond the firewall. We operate a best-in-breed global Internet measurement platform, performing over a billion measurements each day to assess the Internet’s health and function. Anywhere in the world, when a decision maker needs insight into local Internet infrastructure, performance impairment, economics, competition, or strategy, we Continue reading
I'm not the only person pointing out the software routers are reaching unprecedented performance levels.
The post Response: NFV: Will vRouters ever replace hardware routers? appeared first on EtherealMind.
When i started looking at NFV, i always imagined it being relegated to places in the network that would receive only teeny weeny amount of data traffic since the commodity hardware and software could only handle so much of traffic. I also naively believed that it would be deployed in networks where customers were not uber-sensitive to latency and delay (broadband customers, etc). So if somebody really wanted a loud bang for their buck they had to use specialized hardware to support the network function. You couldnt really use Intel x86-based servers running SW serving customers for whom QoS and QoE were critical and vital. The two examples that leap to my mind are (i) Evolved Packet Core (EPC) functions such as Mobility Management Entity (MME) and BNG environments where the users need to be authorized before they can expect to receive any meaningful services.
While i understood that servers were getting powerful and Intel was doing its bit with its Data Plane Development Kit (DPDK) architecture, it didnt occur to me till recently that we would be seeing servers handling traffic at 10G+ line rate. Vyatta, a Brocade company now, uses vRouters to implement real network functions. Vyatta started with its modest 5400 vRouter that could Continue reading
I was going over my YouTube subscriptions tonight, as I do at least once a week, and came across this video from Aruba Networks:
While I do love watching things go through a shredder, I fail to see the point of this video. It begs the question: Who watches this and would this video change their mind?
In my opinion, this video is aimed at a non-technical buyer. If you make a significant investment in Aruba based on this video, I have serious concerns about your ability to make sound judgements when it comes to technology. That is not to say that the AP-225 from Aruba can’t beat a Cisco 3702 AP in testing. I honestly don’t know. I have access to both AP’s, and I suppose I could run my own independent tests, but to what aim? I certainly don’t have 20 laptops laying around to run my own version of this test, and I am struggling to locate the exact testing methodology used on the Aruba website. The video mentions that Aruba publishes the exact test they performed. I assume it is available somewhere. There was nothing in the video description, so I suppose I have to do Continue reading
40th Anniversary of the TCP Protocol
In May of 1974, the IEEE published a paper titled “A Protocol for Packet Network Intercommunication.” The authors were Vint Cerf and Bob Kahn.
Forty years later, the protocol they developed, TCP, is still the undisputed king of “sending stuff.” It’s no longer alone in packet types, but we still use the conventions for routing and interconnecting networks that TCP established, and the basic operation hasn’t changed since 1974.
It’s a brilliant design; one that, at its most simple, comes down to a single idea: it doesn’t matter where the packets come from, how fast they get there, what order they get there, or even how many copies there are of that packet on the network - so long as they get there.
The TCP receiver can simply reassemble the sequence as it was originally transmitted, and double-check with the sending computer to ensure accuracy. The TCP slow-start means that it automatically determines the safe rate at which to send packets.
The upshot of all of this has been that TCP enabled, for the first time, the building of robust Continue reading