Is a good network design just about technical specifications or should you take into account business drivers and needs? James is a network design veteran and presented on this topic at UKNOF45. We talk about design considerations, tips and tricks, drivers and motivations, asking the question behind the question and even about a book that is ‘in the works’. James is very active on Twitter, LinkedIn and can be reached via [email protected].
Brandon and Derick explore communities of IT folks, the wisdom of backup plans, and shifty vendors with Tech Field Day Organizer Tom Hollingsworth, also known as "The Networking Nerd."
Today, we are glad to share a milestone for the Mutually Agreed Norms for Routing Security (MANRS) initiative: the number of participants in the network operator program has reached 500.
By joining the community-driven initiative, these network operators, big and small, from around the world have taken specific, concrete actions to improve the resilience and security of the Internet’s inherently insecure routing infrastructure.
Systemic security issues about how traffic is routed on the Internet make it a relatively easy target for criminals. MANRS helps reduce the most common routing threats and increase efficiency and transparency among Internet service providers (ISPs) on peering relationships.
The growth of the network operator program – the oldest among three today – has been accelerating in recent years. Launched in 2014 with a group of nine operators, the number of participants in the program took four years to reach 100 in 2018 and has risen sharply in the last two years, with 156 joining in 2019 and 244 so far in 2020.
The 500 network operators manage 651 autonomous systems in total, as some of them manage multiple networks.
Meanwhile, the Internet Exchange Point (IXP) program, which we launched in 2018, now has 60 Continue reading
Continuing our Fast Failover saga, let’s focus on techniques and technologies available to implement it (assuming you still think it’s worth the effort).
There are numerous technologies you can use to implement fast reroute, from the most complex to the easiest one:
Continuing our Fast Failover saga, let’s focus on techniques and technologies available to implement it (assuming you still think it’s worth the effort).
There are numerous technologies you can use to implement fast reroute, from the most complex to the easiest one:
This is less concrete technical than my usual blog post.
It’s actually hard to be 99% sure of anything. I’m not 99% sure today’s Thursday. I say that because more often than one day in a hundred, I’ll think “hmm… feels like Wednesday” when it’s not.
I just closed my eyes and tried to remember what time it is. I don’t think I can guess with 99% accuracy what hour I’m in. (but to be fair, it’s de-facto Friday afternoon today, as I’m off tomorrow).
Anyway… the reason I say this is that this should be kept in mind every time someone comes and says they want to circumvent some process for a change that they are absolutely sure won’t cause an outage, that can actually be put into numbers. And those numbers are “you are not 100% sure of anything”.
By saying you are 99% sure this won’t cause an outage (and are you right about that?) you are saying that for every 100 requests like yours that will bypass normal checks, there will be an outage. You are taking on an amortized 1% of Continue reading
The first hour of material in my new BGP course over at Ignition dropped this week. I’m not going to talk about configuration and other operational things—this is all about understanding how BGP works, why it works that way, and thinking about design. This course will apply to cloud, Internet edge, DC fabric, and other uses of BGP. From the official site:
BGP is one of the fundamental protocols for routing traffic across the Internet. This course, taught by networking expert and network architect Russ White, is designed to take you from BGP basics to understanding BGP at scale. The 6-hour course will be divided into several modules. Each module will contain multiple video courses of approximately 15 minutes each that drill into key concepts. The first module contains four videos that describe how BGP works. They cover basics including reachability, building loop-free paths, BGP convergence, intra-AS models, and route reflectors.
There are many people, projects, and organizations that are collecting data on various facets of the Internet, but there’s no single site that provides a curated set of insights.
To help address this gap, we’ve launched the Internet Society Insights platform to help everyone gain deeper, data-driven insight into the Internet.
One of the key deliverables of the Measuring the Internet project, we have spent the last few months building the Insights platform together with our valued development partner, Frontwerks AG.
Data and Focus Areas
We’re collating data from several trusted organizations – our data partners – and will examine Internet trends, generate reports, and tell data-driven stories about how the Internet is evolving. Insights launched with two initial focus areas, Internet Shutdowns and Enabling Technologies.
Work is continuing on three additional focus areas – Internet Resilience, the Internet Way of Networking, and Keeping Traffic Local. We aim to add data and insights on these focus areas throughout 2021 and beyond.
Use and Share
Everyone is encouraged to use and share the text, images, and charts presented on Insights under our creative commons license.
If you would like to submit an idea for a guest post for the Continue reading
At first glance, it would seem like the history of a technology would have little to do with teaching that technology. Jacob Hess of NexGenT joins us in this episode of the Hedge to help us understand why he always includes the history of a technology when teaching it—a conversation that broadened out into why learning history is important for all network engineers.
Today's Tech Bytes peers into cloud visibility with sponsor ThousandEyes. The company is improving its platform with multi-service views, Internet and hybrid cloud visibility, SD-WAN monitoring, and more. The goal is to give you a more comprehensive picture of the dependencies that make up today's applications, services, and networks. Our guests are Angelique Medina and Archana Kesavan.
The post Tech Bytes: ThousandEyes Expands Visibility Into Modern App Architectures (Sponsored) appeared first on Packet Pushers.