I should have known better, but I got pulled into another stretched VLANs for disaster recovery tweetfest. Surprisingly, most of the tweets were along the lines of you really shouldn’t be doing that and that would never work well, but then I guess I was only exposed to a small curated bubble of common sense… until this gem appeared in my timeline:
Interestingly, that’s exactly how IP works:
Today's Tech Bytes, sponsored by Silver Peak, is an SD-WAN conversation with Rogers-O’Brien Construction. We’ll talk about how this construction company relies on SD-WAN to enable fast, high-performance connectivity at remote construction sites, handle massive file transfers, securely segment partner traffic, and more.
The post Tech Bytes: Construction Firm Improves Job Site Productivity With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.
Let’s play the analogy game. The Internet of Things (IoT) is probably going end up being like … a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. There is, of course, the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don’t know anything about. Some of these devices might be rogue, of course, such as Raspberry Pi attached to some random place in the network. Others might be more conventional, such as those new exercise machines the company just brought into the gym that’s sending personal information in the clear to an outside service.
While there is research into how to tell the difference between IoT and “larger” devices, the reality is spoofing and blurred lines will likely make such classification difficult. What do you do with a virtual machine that looks like a Raspberry Pi running on a corporate laptop for completely legitimate reasons? Or what about the Raspberry Pi-like device that can run a fully operational Continue reading
Cloudflare launched support for gRPC® during our 2020 Birthday Week. We’ve been humbled by the immense interest in the beta, and we’d like to thank everyone that has applied and tried out gRPC! In this post we’ll do a deep-dive into the technical details on how we implemented support.
gRPC is an open source RPC framework running over HTTP/2. RPC (remote procedure call) is a way for one machine to tell another machine to do something, rather than calling a local function in a library. RPC has been around in the history of distributed computing, with different implementations focusing on different areas, for a long time. What makes gRPC unique are the following characteristics:
In terms of the protocol, gRPC uses HTTP/2 frames extensively: requests and responses look very similar to a normal HTTP/2 request.
Today's Network Break covers new SD-WAN routers from Cisco, a giant Juniper acquisition, new WIPS capabilities from Extreme, the United States' anti-trust lawsuit against Google, Intel selling its NAND business, and Space Networking!
The post Network Break 307: Cisco Launches Catalyst 8000 Edge Routers; Juniper Spends $450 Million For 128 Technology appeared first on Packet Pushers.
Searching for a monopoly: The U.S. Department of Justice has filed an antitrust lawsuit against Google, accusing the tech giant of illegal monopolies in search and search advertising, CNet reports. The DOJ has accused Google of acting as an Internet “gatekeeper.” Google disputed the allegations, saying people use its services because they choose to, not because they have to.
New networking: The Lower Brule Sioux Tribe in central South Dakota has advanced a plan to provide computers and high-speed Internet connections to all students and teachers during the COVID-19 pandemic, the Argus Leader says. Since early June, the tribe has been working on a plan to build its own wireless Internet network, intended to cover the 207-square-mile Lower Brule reservation. The new network is the first-of-its-kind in South Dakota, and it began limited operations in July.
A bumpy relaunch: The French government’s relaunch of its COVID-19 tracing app, called, “TousAntiCovid,” hit some snags when it was downloaded more than 500,000 times in the hours following its launch, the BBC says. The traffic led to some stability problems, with some people unable to launch the app.
DNS vs. crime: Securing the Internet’s domain name system is a crucial step in Continue reading
After a bit more than a year we ran another math-focused webinar last week: Rachel Traylor came back to talk about graph algorithms, focusing on tree-, path- and center problems.
In her lecture you’ll find:
You’ll need Standard or Expert ipSpace.net subscription to watch the videos.
After a bit more than a year, we ran another math-focused webinar last week: Rachel Traylor came back to talk about graph algorithms, focusing on tree-, path- and center problems.
In her lecture you’ll find:
You’ll need Standard or Expert ipSpace.net subscription to watch the videos.
We often treat our careers like it’s a race. With only a winner. We setup goals where we want to get a degree by a certain age. Get that certification at another age. Get that job at a certain age and we judge our success by if we make more than say 100k per year. Because that’s what we’ve been told.
However, building a successful career in IT is nothing like that.
I’ve been there myself and felt the stress. I started my university studies when I was 22. I felt old at the time when I was surrounded by people that were 18-19 years old. I know that people where I lived before my university studies had started asking questions of the kind if I wasn’t to become anything. To do something with my life. I needed a few years break from school before going to university studies , and it turns out that was a great decision. I was able to study in a matter I had never done before.
One of the goals I setup in my career was to become a CCIE by 30. I’m not sure why. It just seemed like getting it Continue reading
This section explains how to create an object Interface Profile whose basic purpose is to attach the set of physical interfaces into this object. Phase 6 in Figure 1-40 illustrates the APIC Management Information Model (MIM) from the Interface Profile perspective. We are adding an object L101__102_IPR under the class AccPortP (Leaf Interface Profile). The name of the object includes Leaf switch identifiers (Leaf-101 and Leaf-102) in which I am going to use this Interface Profile. This object has a Child object Eth1_1-5 (class InfraHPorts) that defines the internet block and which has a relationship with the object Port_Std_ESXi-Host_IPG. By doing this we state that ethernet interfaces 1/1-5 are LLDP enabled 10Gbps ports which can use VLAN Identifiers from 300-399. Note that in this phase we haven’t yet specified in which switches we are using this Interface Profile.
The RN rules used with related objects:
Objects created under the class InfraAccportP (Leaf Interface Profile):Prefix1-{name}, where the Prefix1 is “accportprof”. This gives us RN “accportprof-L101_L102_IPR”.
Objects created under the class InfraHPortS (Access Port Selector): Prefix1-{name}-Prefix2-{type}, where the Prefix1 is “hports” and the Prefix2 is “typ”. This gives us RN “hports-Eth1_1-5_typ-range”.
Objects created under the class InfraPortBlk (Access Port Block): Prefix1-{name}, where the Prefix1 is “portblk” and where the name is Property (autogenerated). This gives us the RN “portblk-Block2”.