Back in the springtime of this year, I saw that Coursera was going to be offering a free six-week SDN MOOC taught by Dr. Nick Feamster, an Associate Professor at Georgia Tech’s School of Computer Science. As I had already been learning about and investigating this new SDN world in my free time, I thought […]
The post A review of the recent Coursera SDN MOOC appeared first on Packet Pushers Podcast and was written by Will Dennis.
These days, access to the web means that users are simply a click away from discovering anything – from how to expertly mollycoddle their Macs to the secret to a perfect cup of tea. But, as we all know, not everything is perfect. Many e-learning services do not have the luxuries of the time and […]
The post NetworkFaculty.com: Bite-sized IT Training Videos On Demand appeared first on Packet Pushers Podcast and was written by Sponsored Blog Posts.
There is probably no more stressful stage in the interview process than negotiating your salary. You usually don’t know entirely what to ask for. You have a feel for what you would like, but most of us have a healthy fear of leaving money on the table. We are less worried about asking for too […]
The post Negotiating your salary appeared first on Packet Pushers Podcast and was written by Michael Bushong.
Packet Design will be exhibiting at Cisco Live 2015, Jan 26-30 in Milan, Italy.
Register to attend the event here:
http://www.ciscolive.com/emea/
Packet Design will be exhibiting at Cisco Live 2015, November 2-5, 2015 in Cancun, Mexico.
Register to attend the event here:http://www.ciscolive.com/latam/
This episode (re-)introduces Carl Moberg and dives into Tail-f’s Network Control System (NCS). We talk through the moving parts of Network Control System at a technical level and discuss why you should care about this product. If you have been interested in tools that do multivendor automation of the network then you will be interested in this discussion.
The post Show 156 – Tail-f Network Control System – Sponsored appeared first on Packet Pushers Podcast and was written by Greg Ferro.
I mentioned in my Tcpdump Masterclass that Wireshark is capable of decrypting SSL/TLS encrypted data in packets captured in any supported format and that if anyone wanted to know how for them to ask. Someone did, so here it is. This is an extremely useful Wireshark feature, particularly when troubleshooting within highly secure network architectures. […]
The post Using Wireshark to Decode SSL/TLS Packets appeared first on Packet Pushers Podcast and was written by Steven Iveson.
Policers and shapers identify traffic violations in an identical manner, but treat them differently. Policers perform instantaneous checks and immediately take action when a violation occurs. Actions can include marking, dropping, and even just transmitting the packet. Shapers on the other hand are traffic-smoothing tools. Its objective is to send all traffic out a given interface, but to smooth it out so that it never exceeds a given rate – usually in order to meet SLAs. Excess traffic is buffered and delayed until the traffic once again dips below the defined maximum rate.
Policer | Shaper |
Causes TCP resends as traffic is dropped | Delays traffic; involves less TCP resends |
Inflexible; makes instant drop decisions | Adapts to network congestion by queuing excess traffic |
Ingress or egress interface tool | Typically egress only |
Rate limiting – no buffering | Rate limiting with buffering |
While policing and shaping tools are not employed to directly provide QoS for real-time traffic, they do regulate/stabilize traffic flows so that unexpected bursts in data traffic do not induce jitter and latency that adversely affects real-time traffic.
Policers determine whether each packet conforms, exceeds, or violates the policies configured for traffic, and takes the prescribed action Continue reading
In 1943, Spanish officials recovered the body of a spy from the Atlantic coast of Huelva. The suitcase still attached to his arm contained Allied war plans, identifying Greece and Sardinia as the beachhead for the forthcoming assault on Italy. Amazed by their luck, Axis forces redeployed divisions from Sicily, Northern France, and the Eastern […]
The post Operation (Unicorn?) Mincemeat, Counter Security, and a book about JWAS appeared first on Packet Pushers Podcast and was written by Glen Kemp.
This is the solution for quiz-13 that covers Frame Relay, a topic that is very hard to find it implemented in today's networks but often seen during certification exams, as it still part of the curriculum for some of them. This is about differences between static and dynamic frame relay mappings.
“Should I get a second CCIE, or a CCDE?” A number of people have asked me this recently; in the process of answering those questions, I’ve developed a couple of lines of reasoning that I thought worth sharing here. No, I’ve not been posting much recently — I’m wrapped up in a bunch of different […]
In my last article, I identified the importance of effective communication in the workplace. Today’s article is a follow-up that offers several suggestions meant to help individuals improve these skills. Some tips may be more or less relevant to the situations that are specific to an individual’s role. As I mentioned in my previous article,l […]
The post 7 Tips For Improving Your Communications Skills at Work appeared first on Packet Pushers Podcast and was written by Paul Stewart.
Date: September 17th, 2013
Time: 8:30am
Venue: The Four Seasons London at Canary Wharf
Please join us for an informal breakfast seminar to discuss the IP routing management needs of organizations in the financial services, broadcast video, and other industries. Attendees will also receive a Packet Design product update from Matt Sherrod, Vice President of Products, and see a demonstration of the newly-released Multicast Explorer which offers unprecedented real-time and historical visibility into multicast routing operations as well as powerful modeling capabilities. In addition to breakfast, attendees will have a chance to win a Beats by Dre™ Bluetooth Speaker.
Who should attend: Network routing engineers, network architects, planners and administrators; network operations engineers and managers, directors and vice presidents of network infrastructure and IP communications.
Date: September 12th, 2013
Time: 8:30am
Venue: The Westin at Times Square
Please join us for an informal breakfast seminar to discuss the IP routing management needs of organizations in the financial services, broadcast video, and other industries. Attendees will also receive a Packet Design product update from Matt Sherrod, Vice President of Products, and see a demonstration of the newly-released Multicast Explorer which offers unprecedented real-time and historical visibility into multicast routing operations as well as powerful modeling capabilities. In addition to breakfast, attendees will have a chance to win a Beats by Dre™ Bluetooth Speaker.
Who should attend: Network routing engineers, network architects, planners and administrators; network operations engineers and managers, directors and vice presidents of network infrastructure and IP communications.
EtherChannel allows you to aggregate several switch links into a single, fast, fault-tolerant, logical interface. 16 links can be defined for an EtherChannel, however, a maximum of 8 will be active at any one time. The other links are placed on standby.
While having multiple links between two switches can possibly create bridging loops, EtherChannel avoids this by bundling the links into a single logical interface. This logical interface can be configured as an access or trunk interface.
For ports to be members of the same EtherChannel, there are some restrictions. Ports must:
The full duplex maximum bandwidth for 8 links is as follows:
EtherChannel load balancing across the links can occur in a number Continue reading
The other day I was at work doing an interoperability test with Cisco and Brocade multilayer switches, and we ran into a strange issue that really highlighted my “tunnel view” to the Cisco world.
We were setting up basic OSPF stuff using md5 authentication and we couldn’t get the Cisco and Brocade to form an adjacency. A debug ip ospf adjacency command on the Cisco switch revealed that the Cisco was using “type 2” authentication, and the Brocade was using “type 0”.
Here’s a quick breakdown of the authentication types:
Type 0 | No authentication |
Type 1 | Clear text authentication |
Type 2 | md5 authentication |
I set up a SPAN on the Cisco switch and sure enough, we were getting the OSPF Hello packets from the Brocade with no authentication.
After some digging, it turns out the Brocade has an Auth-Change-Wait-Time command in interface configuration mode. This is set to 300 seconds (5 minutes) by default. While I don’t quite understand it, the description states it allows for graceful authentication implementation. So after you enable md5 on the interface, it waits 300 seconds before actually sending OSPF Hellos with authentication. We toyed around with it Continue reading