I’m teaching a webinar on router internals through Pearson (Safari Books Online) on the 23rd of July. From the abstract—
A network device—such as a router, switch, or firewall—is often seen as a single “thing,” an abstract appliance that is purchased, deployed, managed, and removed from service as a single unit. While network devices do connect to other devices, receiving and forwarding packets and participating in a unified control plane, they are not seen as a “system” in themselves.
There is a lot of confusion around the 95th percentile bandwidth metering. Therefore this blog posting is intended to provide you with
The post 95th percentile and other bandwidth metering methods appeared first on Noction.
What is the first thing almost every training course in routing protocols begin with? Building adjacencies. What is considered the “deep stuff” in routing protocols? Knowing packet formats and processes down to the bit level. What is considered the place where the rubber meets the road? How to configure the protocol.
I’m not trying to cast aspersions at widely available training, but I sense we have this all wrong—and this is a sense I’ve had ever since my first book was released in 1999. It’s always hard for me to put my finger on why I consider this way of thinking about network engineering less-than-optimal, or why we approach training this way.
This, however, is one thing I think is going on here—
We believe that by knowing ever-deeper reaches of detail about a protocol, we are not only more educated engineers, but we will be able to make better decisions in the design and troubleshooting spaces.
To some degree, we think we are managing the Continue reading
Competing for ads: The European Union has launched an antitrust investigation of Google’s advertising practices, with investigators looking into whether the company favored its own online advertising technology, CNBC reports. The probe will look into whether made it harder for other online advertising services to compete. Blocking the ads: In a related story, Google has […]
The post The Week in Internet News: EU Launches Antitrust Investigation of Google appeared first on Internet Society.
I’m trying to figure out what makes a network engineer truly a “senior” engineer. What skills, mostly non-technical, do they possess in order to bring value to the work place?
I’ll share my opinions based on my experience having held junior and senior IT engineering roles, as well as multiple managerial stints with engineers as direct reports. I’m mostly going to address IT engineering broadly rather than networking specifically, as my opinion is the same no matter which tech silo an engineer might hail from.
As Ravi asked about “mostly non-technical” skills, I’ll be brief here. From a technical perspective, I believe a senior IT engineer is primarily differentiated from a junior in one word–experience. The senior engineer has installed more systems, planned more changes, fixed more problems, and survived more outages than a junior engineer in the same organization.
Ideally, that experience has led to wisdom about how technology can best serve the business needs of an organization. This wisdom will tend to eschew needlessly complex designs, nerd knobs, and “science experiments” conducted in production. This wisdom will also result in difficult problems being resolved more quickly. Experienced folks know somewhat instinctively Continue reading
We talk global IP backbones and 400G with sponsor Telia Carrier on today's Tech Bytes podcast. The company offers IP services from multiple PoPs in the US and is making significant investments in 400G, creating new opportunities for Telia Carrier and its customers. Our guest is Mattias Fridstrom, VP & Chief Evangelist at Telia Carrier.
The post Tech Bytes: What Telia Carrier’s 400G Expansion Means For Your WAN (Sponsored) appeared first on Packet Pushers.
Take a Network Break! We discuss how HPE raises the stakes on its GreenLake hybrid cloud strategy with new features, look at new products from Aruba Networks, review the latest changes in Windows 11, and more tech news. Guest commentator Tom Hollingsworth brings the virtual donuts this week.
The post Network Break 339: HPE Raises The Stakes On Its GreenLake Strategy; Windows 11 Injects Itself With Teams appeared first on Packet Pushers.
Security keeps getting more complex, and despite a multitude of products, tools and processes, organizations find it challenging to prevent 100 percent of breaches or unwanted access. Zero Trust holds the promise of achieving tighter security by only trusting network traffic that is specifically permitted by a security policy. While the task appears daunting, those organizations that follow a step-by-step approach can achieve success.
The process followed by VMware IT (VMIT) can serve as a blueprint for other organizations, removing some of the mystery and complexity. VMIT embarked on a Zero Trust project for data center security to prevent unwanted lateral movement, restricting communication among workloads to only the minimum needed to complete their jobs. The goal was to make Zero Trust the new normal for all applications in the data center. To do so, the team needed to gain a complete understanding of all applications, down to the workload level. Once understood, effective policies can be crafted to permit only the desired behavior.
Step one: macro-segmentation
Achieving Zero Trust fits neatly into a five-step approach (see A Practical Path to Zero Trust in the Data Center white paper), which starts with macro-segmenting the network and culminates in micro-segmenting all Continue reading