Archive

Category Archives for "Networking"

Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video

Red Hat’s Stu Miniman chats with Day Two Cloud podcast hosts Ned Bellavance and Ethan Banks on why OpenShift is the right platform for some companies to consume Kubernetes. MORE PODCASTS FOR IT PROS? Why, yes, thanks for asking…packetpushers.net/subscribe. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. […]

The post Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video appeared first on Packet Pushers.

Nokia Lab | LAB 6 RSVP-TE CSPF |


Hello everyone!

Today is the second RSVP-TE lab. So I will try to show the differences between TE LSP and non-TE LSP. And we will start to investigate the real traffic engineering features - hop limit and admin groups. I'm using topology and RSVP-TE infrastructure from the previous lab.

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • Comprasion TE LSP and non-TE LSP
  • create LSP from R1 to R6 with an "empty" path and CSPF option - name to_R6
  • create another LSP from R1 to R6 with an "empty" path and without CSPF option - name to_R6_no_CSPF
  • examine LSP signaling process
  • capture PATH messages for every LSP in the different point of our topology
  • Do PATH messages contain ERO?
  • describe the difference in signaling process - TE LSP/ non-TE LSP
  • So we can assume that both LSP have the same path R1 - R2 - R4 - R6
    • Try to increase link metric R2 - R4 and examine LSP behavior
    • Does Head-end resignal LSP to_R6? Why?
    • exec manual resignal (see useful debug commands for reference)
    • What is the default value of resignal timer?
    • examine Make-before-break process

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

    Red Hat announces Red Hat Edge initiative

    During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

    Red Hat announces Red Hat Edge initiative

    During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading

    The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time

    A young person scrolls through Instagram to see the latest updates on their favorite profiles. To many around the world this doesn’t seem strange, but for a hamlet outside of a small village in Indonesia’s rural southwest, it’s revolutionary. And it’s in part thanks to the work of an Internet entrepreneur named Gustaff Harriman Iskandar. […]

    The post The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time appeared first on Internet Society.

    Day Two Cloud 095: Grappling With The Open Source Business Model

    Today on Day Two Cloud we get into a whole lot of things. For example, what is IT's value in the age of cloud? How can IT figure out what's actually providing value to the business vs. undifferentiated heavy lifting? How companies built on open-source software make their money? Our guest is Stu Miniman, Director of Market Insights at Red Hat.

    The post Day Two Cloud 095: Grappling With The Open Source Business Model appeared first on Packet Pushers.