Archive

Category Archives for "Networking"

6 clever command-line tricks for fewer keystrokes

Linux commands offer a lot of flexibility. This post details some ways to make them even more convenient to use by making use of some clever tricks.Using file-name completion You can avoid typing a full file name by typing the beginning of its name and pressing the tab key. If the string uniquely identifies a file, doing this will complete the filename. Otherwise, you can enter another letter in the name and press tab again. However, you can also get a list of all files that begin with a particular string by typing the string and then hitting the tab key twice. In this example, we do both:$ ls di<tab><tab> diff-commands dig.1 directory dig.2 dimensions disk-usage-commands $ cd dir<tab> $ pwd directory [Find out how MINNIX was used as the inspiration for Linux.]   Reusing commands and changing them Reissuing recently used commands is easy in bash. To rerun the previous command, all you have to do it type !! on the command line. You can also reissue a command with changes. If you issued the first command shown below only to find that sshd wasn't running, you could issue the second command to start it. Continue reading

Tech industry remains on a hiring spree

Overall U.S. employment figures for April may have been dismal but not in the tech sector, which has grown steadily all year, adding 16,000 new jobs in April for a total of 60,900 so far this year.That’s according to CompTIA‘s analysis of the U.S. Bureau of Labor Statistics’ (BLS) latest Employment Situation Summary. The overall jobs numbers, which came out last week, were dismal. The U.S. created just 266,000 new jobs in April when economists surveyed by Dow Jones and The Wall Street Journal had estimated 1 million new jobs.Network training 2021: Businesses grow their own expertise However, there are signs of tech hiring slowing. Employers across all sectors of the economy reduced their hiring of IT workers by an estimated 234,000 positions. This was the first decline after four consecutive months of employment gains. For the year, IT hires have increased by 72,000 positions.To read this article in full, please click here

Nokia Lab | LAB 8 RSVP-TE Resiliency |


Hello!

Today I'm going to lab one of my favorite topic - RSVP-TE Resiliency. It's a real pleasure to see how different methods of network resiliency can make your network more stable and reliable. 

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • Preparing
  • create LSP to_R6 on R1 (parameters: "totally loose" path, cspf)
  • create LSP to_R1 on R6 (parameters: "totally loose" path, cspf)
  • create Epipe service between CPE1 and CPE6. It helps to compare convergency time in the different cases. I use Virtual PC nodes as CPE devices and simple ping as a tool. It's not a production-ready tool suite, but it's relevant for the education lab. (Depend on your CPE devices, but I recommend use rapid ping or adjust send/receive timers. Results will be more clearly)
  • configure BFD (I use TX/RX equal 100ms):
  • on L3 interfaces
  • on OSPF interfaces
  • on RSVP interfaces
  • configure IP addresses on CPE
  • check IP connectivity between CPE
  • Secondary paths
    • The first method is Non-standby secondary path. Add secondary path to exist LSPs
    • check secondary path operation status
    • our goal is investigation the reconvergence process
    • run ping on CPE and break the primary path of any LSP(you can shut Continue reading

    Back to Basics: The History of IP Interface Addresses

    In the previous blog post in this series, we figured out that you might not need link-layer addresses on point-to-point links. We also started exploring whether you need network-layer addresses on individual interfaces but didn’t get very far. We’ll fix that today and discover the secrets behind IP address-per-interface design.

    In the early days of computer networking, there were three common addressing paradigms:

    IBM leapfrogs everyone with its 2nm chips

    As TSMC charges to 5nm transistor designs and Intel struggles for 7nm, IBM has topped them all with the world’s first 2-nanometer node chip.OK, it won’t come to market for four years, according to IBM, and they might not be the first name that comes to mind when you think of processor design, but they are the quiet power in the semiconductor world.[Get regularly scheduled insights by signing up for Network World newsletters.] As far as commercial chips go, IBM makes two: the Power series for its Power line of Unix and Linux servers, and zArchitecture that is used in the z Series of mainframes. But IBM has its IBM Joint Development Alliance which is partnered with just about every semiconductor vendor out there—Intel, AMD, Nvidia, TSMC, Samsung, you name it.To read this article in full, please click here

    IBM leapfrogs everyone with its 2nm chips

    As TSMC charges to 5nm transistor designs and Intel struggles for 7nm, IBM has topped them all with the world’s first 2-nanometer node chip.OK, it won’t come to market for four years, according to IBM, and they might not be the first name that comes to mind when you think of processor design, but they are the quiet power in the semiconductor world.[Get regularly scheduled insights by signing up for Network World newsletters.] As far as commercial chips go, IBM makes two: the Power series for its Power line of Unix and Linux servers, and zArchitecture that is used in the z Series of mainframes. But IBM has its IBM Joint Development Alliance which is partnered with just about every semiconductor vendor out there—Intel, AMD, Nvidia, TSMC, Samsung, you name it.To read this article in full, please click here

    9 enterprise-storage startups to watch

    As the enterprise edge expands to include semi-permanent remote workforces, IoT, and a range of applications like AI and M2M, they generate torrents of nonstop data that must be stored indefinitely and be available in near-real-time to users and applications.Legacy storage architectures are failing to keep up with both data growth and user/application demand. While storage innovation is pushing more workloads into the cloud, many startups have found that the average enterprise is not yet ready for cloud-only storage. Legacy architectures and applications are experiencing extended shelf-lives due to tight IT budgets, and many enterprises still prefer to keep certain workloads on-premises.To read this article in full, please click here

    9 enterprise-storage startups to watch

    As the enterprise edge expands to include semi-permanent remote workforces, IoT, and a range of applications like AI and M2M, they generate torrents of nonstop data that must be stored indefinitely and be available in near-real-time to users and applications.Legacy storage architectures are failing to keep up with both data growth and user/application demand. While storage innovation is pushing more workloads into the cloud, many startups have found that the average enterprise is not yet ready for cloud-only storage. Legacy architectures and applications are experiencing extended shelf-lives due to tight IT budgets, and many enterprises still prefer to keep certain workloads on-premises.To read this article in full, please click here

    What’s New in Calico v3.19

    We’re excited to announce Calico v3.19.0! This release includes a number of cool new features as well as bug fixes. Thank you to each one of the contributors to this release! For detailed release notes, please go here. Here are some highlights from the release…

    VPP Data Plane (tech-preview)

    We’re very excited to announce that Calico v3.19 includes tech-preview support for FD.io’s Vector Packet Processing (VPP) data plane, joining Calico’s existing iptables, eBPF, and Windows dataplanes.

    The VPP data plane promises high performance Kubernetes networking with support for network policy, encryption via WireGuard or IPSec, and MagLev service load balancing.

    Interested? Try it out by following the tech-preview getting started guide!

    Resource Management with kubectl (tech-preview)

    In previous versions of Calico, the “calicoctl” command line tool was required to properly manage Calico API resources. In Calico v3.19, we’ve introduced a new tech-preview feature that allows you to manage all projectcalico.org API resources directly with kubectl using an optional API server add-on.

    Try it out on your cluster by following the guide!

    Windows Data Plane Support for containerd

    Calico v3.19 introduces support for Calico for Windows users to deploy containers using containerd Continue reading

    Passed AWS Associate Exam

    I took the exam on 8th May 2021 and was able to crack it .Now you can call me AWS certified Associate .

    I started thinking of giving the AWS associate exam more than a year back when my company provided us the free license of cloud Guru. We started a group of individuals who were interested in learning and taking the AWS associate exam. Our plan was to go through the cloud guru videos twice in a week during office hrs ( Allocated 1 hrs for learning ) and discuss any doubts related to topics. It all went very well for few weeks and suddenly people started missing sessions due to different reasons such as office meeting and workload. The group which started with 30 people reduced to 10 now and unfortunately I too dropped due to timing clash and office workload.

    Almost after 6 months, again I started going through cloud Guru Videos and this time I was able to complete it and at that time i can easily rate myself 6 out of 10.

    I went through AWS FAQ’s , I must say that they are must if you are preparing to take AWS exam.

    I didn’t stop, Continue reading

    Designing the new Cloudflare Web Application Firewall

    Designing the new Cloudflare Web Application Firewall
    Designing the new Cloudflare Web Application Firewall

    The Cloudflare Web Application Firewall (WAF) protects websites and applications from malicious traffic attempting to exploit vulnerabilities in server software. It’s a critical piece of the broader security posture of your application. With that in mind, we made sure improvements to the Web Application Firewall dashboard experience made it easier to enable the WAF and configure rules to match the specific requirements of an application. In this post, I’ll share parts of the process we followed and the rationale behind the decisions we took when designing the new Web Application Firewall dashboard experience.

    I’ve separated out my design process into three stages:

    1. Identify the tasks customers are trying to complete using the WAF
    2. Prioritise the tasks in such a way that it’s clear what the most common tasks are vs what the more involved tasks are
    3. Define, create, and refine the interface and interactions

    Identifying the tasks customers are trying to complete

    We support a range of customers — individual developers or hobbyists, small/medium-sized businesses where it’s common for a developer to fulfil multiple roles and responsibilities, through to large global enterprises where often there is an entire department dedicated to information security. Traditionally, product development teams use techniques such Continue reading

    We Are the Internet Society: Our Impact in 2020

    If there were doubts about how important the Internet is for everyone, 2020 put those to rest. As we push forward through this turbulent time, I want to take a moment to share some inspiration. The Internet Society’s 2020 Impact Report: The Internet Is a Lifeline is a storybook of ingenuity, collaboration, and what happens […]

    The post We Are the Internet Society: Our Impact in 2020 appeared first on Internet Society.

    How to avoid the network-as-a-service shell game

    I can’t tell you how many times one of my clients or contacts has complained about the difficulties associated with getting network-budget approval. If I’d never met a CFO in person, the description these people gave me would have led me to expect something like a troll or a zombie, bent on eating projects and maybe people, too. Do we wear garlic when we visit the CFO, or maybe do a chant before the meeting, or might there be a more practical approach?CFOs aren’t just trying to mess up a good technology project (at least most of the time), they’re trying to validate two basic financial rules that govern technology procurements.  Rule One is that any project must advance a company’s financial position and not hurt it. That seems logical, but it’s often difficult to assess just what the return on investment (ROI) of any project is.  Rule Two is that you don’t want to buy equipment that you’ll have to replace before it’s been fully depreciated. The useful life of something should be at least as long as the financial life as set by tax laws.To read this article in full, please click here

    Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored)

    Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show.

    Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored)

    Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show.

    The post Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored) appeared first on Packet Pushers.