Archive

Category Archives for "Networking"

Cisco, AWS integrate IoT, edge network software and serivces

Cisco continues to expand customer cloud-neutral connectivity options, this time tying its Edge Intelligence software with Amazon Web Services' IoT cloud service.Specifically, Cisco’s Edge Intelligence software now works with AWS’s IOT Core service to let customers process data from, communicate with and manage thousands of IoT devices and applications linked via industrial operations networks.Cisco Edge Intelligence runs on Cisco’s IoT and industrial networking family and gathers data from connected devices to create logical flows from the edge into private, public or third-party clouds. For example, if a robotic arm in a remote system needs replacement, it can send telemetry about the problem. Edge Intelligence extracts that data and gives the operational-technology team information it can use to fix the problem.To read this article in full, please click here

Cisco, AWS integrate IoT, edge network software and services

Cisco continues to expand customer cloud-neutral connectivity options, this time tying its Edge Intelligence software with Amazon Web Services' IoT cloud service.Specifically, Cisco’s Edge Intelligence software now works with AWS’s IOT Core service to let customers process data from, communicate with and manage thousands of IoT devices and applications linked via industrial operations networks.Cisco Edge Intelligence runs on Cisco's IoT and industrial networking family and gathers data from connected devices to create logical flows from the edge into private, public or third-party clouds. For example, if a robotic arm in a remote system needs replacement, it can send telemetry about the problem. Edge Intelligence extracts that data and gives the operational-technology team information it can use to fix the problem.To read this article in full, please click here

Cisco, AWS integrate IoT, edge network software and serivces

Cisco continues to expand customer cloud-neutral connectivity options, this time tying its Edge Intelligence software with Amazon Web Services' IoT cloud service.Specifically, Cisco’s Edge Intelligence software now works with AWS’s IOT Core service to let customers process data from, communicate with and manage thousands of IoT devices and applications linked via industrial operations networks.Cisco Edge Intelligence runs on Cisco’s IoT and industrial networking family and gathers data from connected devices to create logical flows from the edge into private, public or third-party clouds. For example, if a robotic arm in a remote system needs replacement, it can send telemetry about the problem. Edge Intelligence extracts that data and gives the operational-technology team information it can use to fix the problem.To read this article in full, please click here

Cisco, AWS integrate IoT, edge network software and services

Cisco continues to expand customer cloud-neutral connectivity options, this time tying its Edge Intelligence software with Amazon Web Services' IoT cloud service.Specifically, Cisco’s Edge Intelligence software now works with AWS’s IOT Core service to let customers process data from, communicate with and manage thousands of IoT devices and applications linked via industrial operations networks.Cisco Edge Intelligence runs on Cisco's IoT and industrial networking family and gathers data from connected devices to create logical flows from the edge into private, public or third-party clouds. For example, if a robotic arm in a remote system needs replacement, it can send telemetry about the problem. Edge Intelligence extracts that data and gives the operational-technology team information it can use to fix the problem.To read this article in full, please click here

Internet Shutdowns: How to Undermine Trust in the Network of Networks

The Indian government’s recent Internet shutdown during farmer protests impacted over 50 million residents. It is a stark warning of the danger of tampering with the foundations that make the Internet work for everyone.

Internet shutdowns are a dangerous tactic increasingly used by the state to quell situations of unrest. In this instance, it occurred during protests in the capital, Delhi, where farmers are asking for a repeal of three state-proposed farm laws. But while the initial Internet shutdown was targeted in Delhi and lasted around 29 hours, it soon extended to districts in the neighboring state of Haryana from 26 January to 1 February to “prevent disturbance to peace and public order”.

The consequence of shutting down parts of the Internet to prevent citizen access is profound: it undermines the global Internet infrastructure, which is based on collaboration and trust, and has severe individual and economic consequences that can extend far beyond a nation’s borders.

The Internet is an incredibly successful and powerful tool, a fact that has become all too clear during the COVID-19 pandemic. It is a key technology for supporting education, economic activity, and even access to healthcare for those under stay-at-home orders. Continue reading

The Three Levels of Data Protection for Data Hoarders

The following post is aimed for photographers and other digital hoarders. Those of us that want to keep various digital assets not just for a few years, but a lifetime, and even multiple lifetimes (passed down, etc.)

There are three levels of data protection: Data resiliency, data backup, and data archive.

Data Resiliency (Redundant Disks, RAID, NAS/DAS)

Data resiliency is when you have multiple disks in some sort of redundant configuration. Typically this is some type of RAID array, through there are other technologies now that operate similar to RAID (such as ZFS, Storage Spaces, etc.) This will protect you from a drive failure. It will not, however, protect you from accidental file deletion, theft, flood/natural disaster, etc. The drives have the same file system on them, and thus have a lot of “shared fate”, where if something happens to one, it can happen to the other.

To put it simply, while there are some scenarios where your data is protected by data resiliency (drive failure), there are scenarios where it won’t (flood, theft).

RAID is not backup.

Data Backup

One of the maxims we have in the IT industry in which I’ve worked for the past Continue reading

Preempting Gray Failures With AI/ML

The network was definitely up, and had been up. There was nothing in the logs indicating link flaps, spanning-tree convergence events, or routing process adjacency changes. The packets had been, were presently, and presumably would forever be flowing. Flowing like a river. I was pondering this inaccurate version of reality because of an annoying ticket that wouldn’t go away...

The post Preempting Gray Failures With AI/ML appeared first on Packet Pushers.

Day Two Cloud 085: Hosting Your Infrastructure Code In The Cloud

Let’s say I host my Infrastructure as Code provisioning stuff locally. It works. It’s nearby. I feel in control. Are there good reasons I should move that stuff to the cloud? Here to help us sort the pros and cons of that question is Calvin Hendryx-Parker. Calvin is the co-founder and CTO of Six Feet Up, a Python web application development company.

The post Day Two Cloud 085: Hosting Your Infrastructure Code In The Cloud appeared first on Packet Pushers.

Data-center training, recruitment need to change to meet staffing demand

As demand for data-center capacity has surged, owners and operators are struggling to keep pace on the employee side. Improved outreach, more creative approaches to recruitment, and better training and education opportunities are needed to ensure the data-centers can meet the "astronomical anticipated demand" for skilled people, said Rhonda Ascierto, vice president of research at Uptime Institute.The research firm's newly released Global Data Center Staffing Forecast reveals concern about the volume of open jobs and hard-to-find skills. In 2020, 50% of data-center owners and operators reported having difficulty finding qualified candidates for open jobs, compared to 38% in 2018. Meanwhile, demand for data-center staff is forecast to grow globally from about 2 million full-time employees in 2019 to nearly 2.3 million by 2025, Uptime Institute reports.To read this article in full, please click here

Data-center training, recruitment need to change to meet staffing demands

As demand for data-center capacity has surged, owners and operators are struggling to keep pace on the employee side. Improved outreach, more creative approaches to recruitment, and better training and education opportunities are needed to ensure the data-centers can meet the "astronomical anticipated demand" for skilled people, said Rhonda Ascierto, vice president of research at Uptime Institute.The research firm's newly released Global Data Center Staffing Forecast reveals concern about the volume of open jobs and hard-to-find skills. In 2020, 50% of data-center owners and operators reported having difficulty finding qualified candidates for open jobs, compared to 38% in 2018. Meanwhile, demand for data-center staff is forecast to grow globally from about 2 million full-time employees in 2019 to nearly 2.3 million by 2025, Uptime Institute reports.To read this article in full, please click here

Data-center training, recruitment need to change to meet staffing demand

As demand for data-center capacity has surged, owners and operators are struggling to keep pace on the employee side. Improved outreach, more creative approaches to recruitment, and better training and education opportunities are needed to ensure the data-centers can meet the "astronomical anticipated demand" for skilled people, said Rhonda Ascierto, vice president of research at Uptime Institute.The research firm's newly released Global Data Center Staffing Forecast reveals concern about the volume of open jobs and hard-to-find skills. In 2020, 50% of data-center owners and operators reported having difficulty finding qualified candidates for open jobs, compared to 38% in 2018. Meanwhile, demand for data-center staff is forecast to grow globally from about 2 million full-time employees in 2019 to nearly 2.3 million by 2025, Uptime Institute reports.To read this article in full, please click here

Data-center training, recruitment need to change to meet staffing demands

As demand for data-center capacity has surged, owners and operators are struggling to keep pace on the employee side. Improved outreach, more creative approaches to recruitment, and better training and education opportunities are needed to ensure the data-centers can meet the "astronomical anticipated demand" for skilled people, said Rhonda Ascierto, vice president of research at Uptime Institute.The research firm's newly released Global Data Center Staffing Forecast reveals concern about the volume of open jobs and hard-to-find skills. In 2020, 50% of data-center owners and operators reported having difficulty finding qualified candidates for open jobs, compared to 38% in 2018. Meanwhile, demand for data-center staff is forecast to grow globally from about 2 million full-time employees in 2019 to nearly 2.3 million by 2025, Uptime Institute reports.To read this article in full, please click here

Link-State Routing Protocols Are Eventually Consistent

One of my readers sent me this interesting question:

Assuming we are running a very large OSPF area with a few thousand nodes. If we follow the chain reaction of OSPF LSA flooding while the network is converging at the same time, how would all routers come to know that they all now have same view of area link states and there are no further updates or convergence?

I have bad news: the design requirements for link state protocols effectively prevent that idea from ever working well.

Upgrading Firmware on Northbound Networks Zodiac FX

Recent versions of firmware (after v0.80) running on the Northbound Networks Zodiac FX can be updated directly from the web interface, or using XMODEM via the serial console. But what if, say, you had sat one your Zodiac FX for a while and are running firmware earlier than v0.81 and have a sudden, unexpected desire to upgrade the firmware? Say you are, for example, me?

The process turned out to be less straightforward than I had hoped, so I am documenting the successful steps I followed in case it’s of use to somebody else.

My (Brief) Zodiac FX Background

Back in 2015 I backed a Kickstarter project for this awesome-sounding four-port FastEthernet SDN switch with OpenFlow support. It sounded so cool that I even ordered a two-pack as I thought it would be more fun to have two OpenFlow switches to mess around with). The project was funded successfully, but embarrassingly when the beautifully-made boards arrived in early 2016, for some reason I never quite got around to playing with them. I think it was in part because it was just a printed circuit board without a case and without easy access to 3D printing I was turned Continue reading

Heavy Networking 562: Juniper’s Paragon Automation Portfolio Prioritizes Service Experience (Sponsored)

In today’s sponsored show with Juniper Networks, we dive into Juniper's Paragon product portfolio, which measures service quality for critical applications. The portfolio allows service providers and enterprises to get deeper visibility into, and automated control over, their networks. Our guests from Juniper to walk us through the portfolio are Peter Weinberger and Jonas Krogell.

The post Heavy Networking 562: Juniper’s Paragon Automation Portfolio Prioritizes Service Experience (Sponsored) appeared first on Packet Pushers.

Heavy Networking 562: Juniper’s Paragon Automation Portfolio Prioritizes Service Experience (Sponsored)

In today’s sponsored show with Juniper Networks, we dive into Juniper's Paragon product portfolio, which measures service quality for critical applications. The portfolio allows service providers and enterprises to get deeper visibility into, and automated control over, their networks. Our guests from Juniper to walk us through the portfolio are Peter Weinberger and Jonas Krogell.

SEC 3. Building your own containerised PKI (root CA) with Linux and Docker to simplify and secure network automation

Hello my friend,

You know our passion to network automation. We truly believe, that this is the only sustainable way for the network development and operation. In the same time, one the key goals of the automation is to make your network secure and safe. Therefore, the security of the automation and communication channels used by automation is very important. So today we’ll take a look how to build


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Can automation make your network better?

Automation is the key component of the perpetual engine of your network development and operation. It allows you to run the network quick, stable, and safe. And we are willing you to benefit as much as you can from that.

We have created a new training, which is focused only on the Nornir and you can use it for the network (and not only) automation. It is an organic extension of our network automation training, which assumes you are already Continue reading

Smart ways to compare files on Linux

Commands for comparing files have proliferated since the early days of Linux. In this post, we'll look at a suite of commands available for comparing files and highlight the advantages that some of the newer ones provide.diff One of the oldest and still popular commands for detecting and reporting on file differences is the diff command. Comparing two lists of meeting attendees, the diff command will simply and clearly show you the differences.$ diff attendance-2020 attendance-2021 10,12c10 < Monroe Landry < Jonathon Moody < Donnell Moore --- > Sandra Henry-Stocker Only the lines that are different are displayed. The output precedes lines that are only in the first file with < and those only in the second file with >.To read this article in full, please click here