Archive

Category Archives for "Networking"

Red Hat buttresses edge features in RHEL 8.4

New features in Red Hat Enterprise Linux (RHEL) are tuned to provide better remote support for edge networking where processor- and memory-constrained devices can present management problems.RHEL 8.4 announced this week at Red Hat Summit has new capability to send lighter-weight universal base images and is designed for potentially less capable edge devices, letting Red Hat customers deploy edge applications more flexibly.[Get regularly scheduled insights by signing up for Network World newsletters.] In addition to the new RHEL version, Red Hat announced updates to Podman, the company’s open-source container engine, that will allow users to manage widely deployed containers from a single console, and an OpenShift update that adds support for smaller clusters and remote worker nodes makes it easier to use Kubernetes in resource-constrained locations.To read this article in full, please click here

VMware Debuts A SASE Distributed Work Conglomeration Called Anywhere Workspace

VMware has announced the Anywhere Workspace. Designed to help control access to premises and cloud apps, and enforce security policies regardless of where an employee may be working, Anywhere Workspace is an assemblage of several existing products in VMware’s portfolio: endpoint management for laptops and smartphones, access control, endpoint security, and cloud-based security services. The […]

The post VMware Debuts A SASE Distributed Work Conglomeration Called Anywhere Workspace appeared first on Packet Pushers.

IBM buys Turbonomic for AIOps, hybrid-cloud management support

Big Blue kept its checkbook open this week buying AI-based application and network-performance management vendor Turbonomic for an unconfirmed estimate of $2 billion.The acquisition is the eleventh hybrid-cloud and AI-focused buy since Arvind Krishna became IBM CEO in 2020. "Hybrid cloud and AI are the two dominant forces driving change for our clients and must have the maniacal focus of the entire company,” he said at that time.Top metrics for multicloud management The Economic Times and Reuters said the deal was worth between $1.5 billion and $2 billion and would make it the largest since IBM grabbed Red Hat for $34 Billion in 2019.To read this article in full, please click here

Announcing Calico Enterprise 3.5: New ways to automate, simplify and accelerate Kubernetes adoption and deployment

We are thrilled to announce the availability of Calico Enterprise 3.5, which delivers deep observability across the entire Kubernetes stack, from application to networking layers (L3–L7). This release also includes data plane support for Windows and eBPF, in addition to the standard Linux data plane. These new capabilities are designed to automate, simplify and accelerate Kubernetes adoption and deployment. Here are highlights from the release…

Application-level security and observability: Get the benefits of a service mesh, minus the operational complexity

The majority of operational problems inherent to deploying microservices in a distributed architecture are linked to two areas: security and observability. At the application level, the need to understand all aspects associated with service-to-service communication within the cluster becomes paramount. DevOps teams often struggle with these questions: Where is monitoring needed? How can I understand the impact of issues and effectively troubleshoot? How can I effectively protect application-level data?

If observability and security are your primary drivers for considering a service mesh, Calico provides L3–L7 observability and security without the additional overhead associated with a service mesh. Calico integrates Envoy at the node level to provide deep observability of microservices at the application level. Since HTTP is one of Continue reading

Announcing Calico Enterprise 3.5: New ways to automate, simplify and accelerate Kubernetes adoption and deployment

We are thrilled to announce the availability of Calico Enterprise 3.5, which delivers deep observability across the entire Kubernetes stack, from application to networking layers (L3–L7). This release also includes data plane support for Windows and eBPF, in addition to the standard Linux data plane. These new capabilities are designed to automate, simplify and accelerate Kubernetes adoption and deployment. Here are highlights from the release…

Application-level security and observability: Get the benefits of a service mesh, minus the operational complexity

The majority of operational problems inherent to deploying microservices in a distributed architecture are linked to two areas: security and observability. At the application level, the need to understand all aspects associated with service-to-service communication within the cluster becomes paramount. DevOps teams often struggle with these questions: Where is monitoring needed? How can I understand the impact of issues and effectively troubleshoot? How can I effectively protect application-level data?

If observability and security are your primary drivers for considering a service mesh, Calico provides L3–L7 observability and security without the additional overhead associated with a service mesh. Calico integrates Envoy at the node level to provide deep observability of microservices at the application level. Since HTTP is one of Continue reading

Italy Celebrates Internet Anniversary

On 30 April, the Internet Society Italy Chapter is scheduled to celebrate a major anniversary, marking 35 years since the country’s first connection to the Internet. On that day in 1986, at about 6 p.m., a network connection was established between the former CNUCE Institute of the National Research Council in Pisa, Italy, and a […]

The post Italy Celebrates Internet Anniversary appeared first on Internet Society.

Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video

Red Hat’s Stu Miniman chats with Day Two Cloud podcast hosts Ned Bellavance and Ethan Banks on why OpenShift is the right platform for some companies to consume Kubernetes. MORE PODCASTS FOR IT PROS? Why, yes, thanks for asking…packetpushers.net/subscribe. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. […]

The post Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video appeared first on Packet Pushers.

Nokia Lab | LAB 6 RSVP-TE CSPF |


Hello everyone!

Today is the second RSVP-TE lab. So I will try to show the differences between TE LSP and non-TE LSP. And we will start to investigate the real traffic engineering features - hop limit and admin groups. I'm using topology and RSVP-TE infrastructure from the previous lab.

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • Comprasion TE LSP and non-TE LSP
  • create LSP from R1 to R6 with an "empty" path and CSPF option - name to_R6
  • create another LSP from R1 to R6 with an "empty" path and without CSPF option - name to_R6_no_CSPF
  • examine LSP signaling process
  • capture PATH messages for every LSP in the different point of our topology
  • Do PATH messages contain ERO?
  • describe the difference in signaling process - TE LSP/ non-TE LSP
  • So we can assume that both LSP have the same path R1 - R2 - R4 - R6
    • Try to increase link metric R2 - R4 and examine LSP behavior
    • Does Head-end resignal LSP to_R6? Why?
    • exec manual resignal (see useful debug commands for reference)
    • What is the default value of resignal timer?
    • examine Make-before-break process

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here