Archive

Category Archives for "Networking"

You got promoted, now what?

Leadership in most companies is not really something explicitly practiced. Generally, a few people who are naturally inclined kind of do their thing while the rest of the leadership ranks sort of ignore the finer points of people management. But why is that the case? And how do you avoid being one of those leaders […]

Author information

The post You got promoted, now what? appeared first on Packet Pushers Podcast and was written by Michael Bushong.

Confusing The Familiar with The Superior

We all know the archetype of the fanboy (or fangirl of course, however I will forthwith use zealot as a gender-neutral term). They expound upon the superiority of their favorite… whatever, and lambaste the competing product or products, and will hear of nothing that would contradict their conclusions. The battle the zealots fight are well known: […]

Author information

Tony Bourke

Tony Bourke is an IT instructor teaching Cisco and other courses for various organizations. He writes about the hilarity of the converged roles at datacenteroverlords.com and random musing on twitter @tbourke. He's also an amateur pilot, skydiver, scuba diver, marathon runner, and crazy cat lady.

The post Confusing The Familiar with The Superior appeared first on Packet Pushers Podcast and was written by Tony Bourke.

PQ Show 30 – RPKI DNSEC and Internet Security with Ivan Pepelnjak

There are two proposals floating around that are trying to address BGP origination hijacks (aka Pakistan vs. YouTube): RPKI and DNSSEC-based system. Ivan Pepelnjak joins Greg Ferro to talk about what is means for Networking. This show was recorded in January 2013 and it’s been delayed publishing. Please accept my apologies. Show Links Opinionated background […]

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post PQ Show 30 – RPKI DNSEC and Internet Security with Ivan Pepelnjak appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Quality of Service (QoS) Congestion-Avoidance Notes

Congestion-avoidance tools are complementary to, and dependent upon, queuing algorithms. Queuing/scheduling algorithms manage the front of a queue, while congestion-avoidance mechanisms manage the tail of a queue.

Congestion-avoidance tools are designed for TCP traffic, because TCP has built-in flow-control mechanisms that operate by gradually increasing traffic flows until packet loss has occurred.  Once packet loss has occurred, the transmission rate is reduced before slowly ramping up again.  This means that if no mechanism is in place to control TCP, any particular flow has the ability to eat up all available bandwidth.

When there are no congestion-avoidance tools in place, and queues fill, tail drop occurs, which means all traffic is dropped. 

In a constricted channel without congestion-avoidance tools, TCP connections eventually synchronize with each other – they ramp up together, lose packets together, and back off together.  This is called global synchronization and basically results in “waves” of TCP traffic.

Congestion-avoidance tools has no real benefit or use for UDP traffic, because UDP traffic does not have any retry logic.

Random Early Detection (RED)

RED combats global synchronization by preemptively and randomly dropping packets before queues fill.  Instead of waiting for the queues to fill, Continue reading

Calculating distances in meatspace

I'm working on an automated provisioning system for a very large VPN network. For each new VPN client, I need to select a headend site where VPN tunnels should land. The only data available is that which I can get from the sales and billing systems. This system offers me the zip code of the install site.

Using the zip code of the install site, and the known zip codes of my various head-end sites, I'm able to select the destination for the primary and secondary VPN tunnels.

It's not perfect (physical location often has little to do with network path), but it's better than nothing. I haven't decided how to handle non-US sites yet.

I'm using a database of US zip codes found here, and a very dirty perl script. The script grabs the latitude and longitude of two zip codes from the database, and prints the mileage between them as calculated using the Haversine formula for great circle distance.

It runs like this:


Christophers-MacBook-Pro:scripts chris$ zipdistance.pl 95134 60614
1837 miles
Christophers-MacBook-Pro:scripts chris$

The script:


#!/opt/local/bin/perl
use GIS::Distance;

my $dbfile="/Users/chris/Downloads/zipcode.csv";
my $lat1,$lon1,$lat2,$lon2;

sub usage{
  printf "Usage: $0 <zipcode> <zipcode>n";
  exit;
}

if (@ARGV ! Continue reading

The value of Connectors in the workplace

In Malcolm Gladwell’s book The Tipping Point [affiliate link] the author identifies key roles that individuals play in spreading knowledge and ideas. Gladwell outlines two key roles, the maven and the connector. The maven is a person who accumulates subject matter expertise and is willing to distribute that knowledge on request. Think of a maven […]

Author information

John Harrington

John is an experienced data center engineer with a background in mobile telecoms. He works as a network test engineer for a large cloud service provider, and is gradually accepting that he's a nerd. He blogs about network technology and careers at theNetworkSherpa.com. You can reach him on twitter at: @networksherpa

The post The value of Connectors in the workplace appeared first on Packet Pushers Podcast and was written by John Harrington.

Ageism and your career in I.T.

I recently decided to commit to my current company.  I don’t mean work harder or focus more, though that’s implicit.  I mean to consider being a “lifer.”  For an independent personality like myself that’s a pretty tall leap.  One of the reasons I got my CCIE was to avoid ever being the guy sweating when […]

Author information

Keith Tokash

Keith Tokash

Keith Tokash, CCIE (R&S) #21236, began his career in 1999, and has spent the last decade running around large content and small ISP networks. He spends his spare time with his newborn son, on the mat at the local Jiu-Jitsu gym, and trying to keep his fat yap shut.

The post Ageism and your career in I.T. appeared first on Packet Pushers Podcast and was written by Keith Tokash.

Software Defined Data Centres and the blending of cultures

As some of you may know, I have spent a fair amount of my time in the last few years designing and improving multi-tennant hosting environments. Each revision attempts to learn from the mistakes of the previous iterations, as well as bundle in new features and “advancements” from each of the different vendors in the stack.

New offerings on the storage fronts, developments in the server space in the form of the boom of virtualisation, and the simple existence of the network amongst the fact that none of these technologies changed the existing/fundamental laws of networking.

Software-Defined Networking has sprung up as a way of providing both advancements in our current architectures and providing agility in changes needed in the future, but what is truly needed is a true abstraction of the entire data centre model that encompassed all of compute, storage, security and networking. The ability to define all of the requirements of your existing data centre and have them deployed and rolled out across which ever stack you are using (Private / Public / Hybrid / Tomorrows Favourite buzz.), in a consistent and definable manner.

Merging the requirements of each of the existing silos and describing Continue reading

AdaptingIT: Why I Started a Podcast Featuring Women in Tech

As a systems admin a few years back I decided that I needed to figure out a way to understand networking.  I could do basic things, but how do you figure out what you don’t know?  That’s when I started listening to podcasts.  The first podcast I came across was Packet Pushers and I haven’t […]

Author information

Lauren Malhoit

Lauren Malhoit

The post AdaptingIT: Why I Started a Podcast Featuring Women in Tech appeared first on Packet Pushers Podcast and was written by Lauren Malhoit.

When it’s OK to say “No”

A lot of us struggle in our careers when it comes to accepting or declining work, whether it be voluntary or voluntoldary. Especially the individuals in our field that strive to succeed. We see it as another opportunity to stand up to the plate and knock one out of the park. The problem, however, is that […]

Author information

Edward Henry

Edward Henry is currently employed with a regional optical network concentrating on Research and Education within the communities of Connecticut. Along with his day job, Edward is an avid techy and has been working toward advancing his career with all things nerdy. Also follow Ed on Twitter : @NetworkN3rd and at his personal blog : https://networkn3rd.wordpress.com

The post When it’s OK to say “No” appeared first on Packet Pushers Podcast and was written by Edward Henry.

Cisco UCS vNIC Switchport Mode

I wrote an article a while back regarding VLAN configuration when running vSphere ESXi on top of Cisco UCS. A comment pointed out that all vNICs are automatically configured as trunks. I had not heard of this before, so I got into the CLI to take a look. Here’s a VLAN configuration screen in the UCSM GUI for a sample vNIC: Check out the running configuration for this vNIC on the underlying NX-OS CLI.

Cisco UCS vNIC Switchport Mode

I wrote an article a while back regarding VLAN configuration when running vSphere ESXi on top of Cisco UCS. A comment pointed out that all vNICs are automatically configured as trunks. I had not heard of this before, so I got into the CLI to take a look. Here’s a VLAN configuration screen in the UCSM GUI for a sample vNIC: Check out the running configuration for this vNIC on the underlying NX-OS CLI.

Network Toolkit

My case full of network doodads always generates lots of questions when people see it for the first time. I don't carry dedicated iPhone chargers anymore, but Apple cube chargers forgotten behind hotel nightstands is where this started.

With this kit it is immediately apparent when something is missing, so things tend to not get left behind.

The limited space has driven me to find the best and most compact solutions to all of my problems. I'm really pleased with everything that's in here. I'm also aware that it's super nerdy.


The case itself is a Duluu Essential case for iPad. It's a nice semi-rigid clamshell type case. I've made two modifications:

  1. Removed the padded "page" between the two halves. This thing was intended to keep the stuff in the pockets on the left from scratching the iPad on the right. It also served as an iPad stand.
  2. I removed the original zipper pulls, replaced them with a repair part because the square corners of the original pulls tended to cause problems.
On the right side of the case I've installed a bit of floor padding foam (this kind of thing, but mine came from Harbor Freight Tools), Continue reading

Applications…Meet Your Network

If you’ve been following Embrane over the past several months, you know we’ve been focusing almost exclusively on differentiating our business in the SDN space by promoting the fact that we have been the only company securing and announcing a steady stream of paying, in-production customers.  As a result, we’ve been placing less emphasis on touting the advancements we’ve made on the technology side. However, since it’s our technology leadership that’s attracting our rapidly growing customer base, it’s time to show off our technology chops too. This week our SDN leadership becomes even more evident with the introduction of our new application-centric networking solutions.

(Okay, it’s not exclusively a technology announcement since we announced another new customer, Ryan Labs Asset Management. More on them in a bit.)

While most vendors started their SDN movement from the bottom up, looking at ways to add agility at the connectivity layer (a.k.a. Layer 2), Embrane continues to take a top-down approach to the network. We focus on the network services that support, enhance and secure the ever-growing number of business applications in an enterprise data center. After all, applications drive enterprises business. The newest release of the Embrane heleos Continue reading

IPv6 RA Router Advertisement and all the flags inside

How does the internet work - We know what is networking

I can say at the beginning that more and more fellows is visiting this blog. Finally networking knowledge project did succeed to get some fans from out there so I felt the need to thank you all for visiting this place. As you can see here from the blog post list I didn’t follow this movement myself these […]

IPv6 RA Router Advertisement and all the flags inside

Cisco onePK Screencast

As a follow-on to my previous article on onePK – Cisco onePK: Now I Get It – I recorded a screencast in which I talk about what a onePK-enabled network is capable of. I also demonstrate two applications which make use of onePK to gather telemetry from the network and also program the network.

  • MTU Checker – Verifies that when the MTU of an interface is changed on the CLI, that the adjoining interface MTU matches
  • Routing For Dollars – Programs the forwarding table of the routers in the network based on the cost – in terms of dollars – of the various links in the network

Please leave a comment below with any questions or feedback.


Copyright Joel Knight. All Rights Reserved.
www.packetmischief.ca

Junos and BGP FlowSpec

Introduction Recently I carried out tests in labs to evaluate the FlowSpec implementation on MX960 router with TRIO MPC cards. I used a 12.3 Junos release. Those tests have covered: - IPv4 blackholing traffic feature - IPv4 rate-limiting traffic feature...

Junos and BGP FlowSpec

Introduction Recently I carried out tests in labs to evaluate the FlowSpec implementation on MX960 router with TRIO MPC cards. I used a 12.3 Junos release. Those tests have covered: - IPv4 blackholing traffic feature - IPv4 rate-limiting traffic feature...

Show 154 – A Bit of Swamp Ass to Lift Your Day – CLUS 2013 Community Show

In this community show recorded at Cisco Live US 2013 in Orlando, Cooper Lees, Lauren Mahoit and Colin McNamara join Packet Pushers hosts Greg Ferro and Ethan Banks in a happy chat about the coming world of networking automation. We discuss the following high-level topics. Automation, orchestration and devops in the network is becoming an ever-bigger deal. We apply this in a Cisco […]

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post Show 154 – A Bit of Swamp Ass to Lift Your Day – CLUS 2013 Community Show appeared first on Packet Pushers Podcast and was written by Ethan Banks.