Archive

Category Archives for "Networking"

Palo Alto Networks Weathers Pandemic With Strong Earnings

The company’s Q3 revenues hit $869.4 million, up 20% year over year, bolstered by a pandemic...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Schneider Electric and Aveva announce solution for multi-site data center management

Schneider Electric has partnered with systems management company Aveva to put together a package for managing multiple and hyperscale data centers with a single view to enable and expand visibility into day-to-day operations.The package combines Aveva Unified Operations Center with Schneider Electric’s EcoStruxure for control and monitoring systems to offer predictive maintenance, staff training and financial aspects of large data centers. The combined software provides a homogenous view of engineering, operations and performance and improves workforce productivity by standardizing and de-siloing systems and processes across multiple sites for real-time decision making.To read this article in full, please click here

BGP AS Numbers on MLAG Members

I got this question about the use of AS numbers on data center leaf switches participating in an MLAG cluster:

In the Leaf-and-Spine Fabric Architectures you made the recommendation to have the same AS number on all members of an MLAG cluster and run iBGP between them. In the Autonomous Systems and AS Numbers article you discuss the option of having different AS number per leaf. Which one should I use… and do I still need the EBGP peering between the leaf pair?

As always, there’s a bit of a gap between theory and practice ;), but let’s start with a leaf-and-spine fabric diagram illustrating both concepts:

Scaling EVPN Multi-Site Overlays using Route-Servers

Cisco’s EVPN Multi-Site it’s a great technology that allows us to achieve massive scale of an EVPN network. With the latest release, the official scalability numbers give us something in the realm of over 12000 VTEPs (512 VTEPs per site x 25 sites).
I’m in no way suggesting that you would need such a big topology and you definitely should segment way sooner you reach the limit, but still…

The main configuration requirement for the Multi-Site overlay is to have a full mesh of eBGP peering between all border gateways.

This has scalability drawbacks as usual. Not only each leaf will have ever growing number of peers which will soon grow out of control, but maybe, worse is the fact that after one site is added, every other site must be touched too.

To avoid a full mesh, for iBGP topologies we would be using a Route Reflector, but with eBGP that’s obviously not an option. So, instead of a RR they way to scale eBGP peerings is to leverage a Route-Server.

A Route-Server provides route reflection capabilities and as such it must ensure that NLRIs attributes like the Next Hop and route-targets aren’t changed.
In Cisco’s EVPN implementation, the Continue reading

VMware, Dell add heft to on-prem cloud service

Aiming to help customers handle growing on-premises workloads, VMware and Dell EMC have bolstered their co-developed cloud software.First introduced in 2018, VMware Cloud on Dell EMC is intended to help enterpise customers move on-premises infrastructure and workloads to the cloud. Version 2.0 of VMware Cloud on Dell EMC bri-gs improved support for high-density and high-performance data-center applications. [Get regularly scheduled insights by signing up for Network World newsletters.] VMware Cloud on Dell EMC consists of VMware’s high-performance compute, storage and networking software, powered by VMware vSphere, vSAN and NSX, tightly integrated with Dell EMC VxRail hyperconverged infrastructure (HCI) hardware, and delivered as a service all –  managed by VMware.To read this article in full, please click here

The Hedge Episode 36: Rich Alderson and the Living Computer History Museum

The Living Computers History Museum and Labs was founding by Paul Allen to collect early computer systems and keep the constrained resource coding practices used on these systems alive. Over time it has developed into a living museum and lab, with hands-on access to some of the earliest examples of computing history. Rich Alderson joins us for this episode of the Hedge to describe the museum and its exhibits.

download

Central African Peering Forum: A Defining Moment for Peering and Interconnection

The first-ever Central African Peering Forum comes at a defining moment for Internet peering and interconnection. In the midst of the COVID-19 pandemic, countries have implemented measures to restrict people from moving from their homes, while only allowing essential movements and services.

But life cannot stop.

Kids still need to study and attend school. People still need to access financial services, conduct personal and business transactions, access government services, pay their taxes, and access health services. Most importantly, people need to access accurate and timely information. But now these services must be provided at a larger scale – via reliable Internet infrastructure. Moreover, some of this content and these services do not exist in digital format. They need to be created, sometimes in the language of local communities.

COVID-19 has uncovered gaps, missing elements, and key challenges, which need to be addressed so that life can smoothly transition to the new normal. Failing to address these challenges may result in severe socioeconomic consequences.

We are now a few months down the path since lockdown measures have been implemented in most countries. It is time to reflect on the lessons learnt so far, with respect to the reliability of the Internet Continue reading

Day Two Cloud 049: The Gritty Details Of Designing And Running A Private Cloud

On today's Day Two Cloud we tackle the practical aspects of private cloud, including designing the infrastructure and creating policies before you start racking gear, and why thinking about services is critical. Our guest is Brett Johnson, a Senior Consultant at VMware.

The post Day Two Cloud 049: The Gritty Details Of Designing And Running A Private Cloud appeared first on Packet Pushers.

The Latest Modern Innovation in Architecture

Architecture is constantly changing. New materials and ideas, as well as the needs of clients, drive new innovation in architecture. The latest innovation in architecture is that there are no defining standards, allowing for a wide variety of different styles and designs.

Modern architecture places emphasis on horizontal and vertical lines, as well as 90-degree angles. Modern architecture depends a great deal on sculpture forms, smooth surfaces, circular voids, and overhead shading systems.

Innovations in architecture include such features as large horizontal windows and ample natural light, as well as outdoors entertainment areas.

Architecture Innovations for Those on a Budget

In the last few years, one of the biggest innovations in architecture is the designing of tiny houses for those on a budget. These tiny homes need to be well thought out and the innovation comes in when architects have to come up with innovative ways to fit everything that normal homes have in a small space often no larger than a small bedroom.

Some of the innovations in this include such things as built in storage solutions and multifunctional furniture to make the most of the limited living space.

Another architecture innovation is the turning shipping containers into cute Continue reading

Using Technology In Disaster Response

Have you ever wondered how emergency communications get re-established after major disasters? Who are the people who rush in to enable first responders to do their jobs efficiently in the most trying of circumstances. In this episode we talk with Dustin Li and Andrew White of ITDRC (Information Technology Disaster Resource Center) to find out exactly what it takes to use technology in disaster response and why it is so important.

You can learn more about what ITDRC is doing as well as help out the cause at the following locations:

Dustin Li
Guest
Andrew White
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Using Technology In Disaster Response appeared first on Network Collective.

Feedback: Data Center for Networking Engineers

When I started designing Data Center Infrastructure for Networking Engineers webinar I wanted to create something that would allow someone fluent in networking but not in adjacent fields like servers or storage to grasp the fundamentals of data center technologies, from server virtualization and containers to data center fabrics and storage protocols.

Here’s what a network architect said about the webinar:

Nvidia unleashes new generation of GPU hardware

Nvidia, whose heritage lies in making chips for gamers, has announced its first new GPU architecture in three years, and it’s clearly designed to efficiently support the various computing needs of artificial intelligence and machine learning.The architecture, called Ampere, and its first iteration, the A100 processor, supplant the performance of Nvidia’s current Volta architecture, whose V100 chip was in 94 of the top 500 supercomputers last November. The A100 has an incredible 54 billion transistors, 2.5 times as many as the V100.10 of the world's fastest supercomputers Tensor performance, so vital in AI and machine learning, has been significantly improved. FP16 floating point calculations are almost 2.5x as fast as V100 and Nvidia introduced a new math mode called TF32. Nvidia claims TF32 can provide up to 10-fold speedups compared to single-precision floating-point math on Volta GPUs.To read this article in full, please click here

Mutable References To ‘self’ In Rust’s Object Methods

Lately I’ve been working on graphics programming in Rust, as a continuation of my first steps with the language. As part of this work, I created a type I created called Vec3f, to hold cartesian coordinates for a given vector: #[derive(Copy, Clone, Debug)] struct Vec3f { x: f32, y: f32, z: f32 } In the natural course of this work, I needed to add certain methods for this type to allow me to perform calculations like cross product, and dot/scalar product.

Full Stack Journey 042: How An IT Specialist Chooses Adjacent Competencies

David Klee is a SQL database expert, but he's also knowledgeable about virtualization, networking, and infrastructure. In today's Full Stack Journey podcast, host Scott Lowe talks with David about how and why IT specialists should be competent in other disciplines, how to decide which areas to branch out into, and how adjacent competencies enrich can enrich your specialization.

The post Full Stack Journey 042: How An IT Specialist Chooses Adjacent Competencies appeared first on Packet Pushers.

Full Stack Journey 042: How An IT Specialist Chooses Adjacent Competencies

David Klee is a SQL database expert, but he's also knowledgeable about virtualization, networking, and infrastructure. In today's Full Stack Journey podcast, host Scott Lowe talks with David about how and why IT specialists should be competent in other disciplines, how to decide which areas to branch out into, and how adjacent competencies enrich can enrich your specialization.

Juniper’s big push: AI in all areas of enterprise networking

Juniper intends to spread the gospel of artificial intelligence across enterprise networking in the coming months with new products and services.The expected moves are a continuation of a strategy that has been an integral part of Juniper since the company bought wireless and artificial-intelligence software maker Mist in 2019 for $405 million.[Get regularly scheduled insights by signing up for Network World newsletters.] Mist’s cloud-based Wi-Fi Assurance system includes an AI-base engine called Marvis that features dynamic packet capture and machine learning to automatically identify, adapt to and fix network issues.To read this article in full, please click here

Resolve internal hostnames with Cloudflare for Teams

Resolve internal hostnames with Cloudflare for Teams

Phishing attacks begin like any other visit to a site on the Internet. A user opens a suspicious link from an email, and their DNS resolver looks up the hostname, then connects the user to the origin.

Cloudflare Gateway’s secure DNS blocks threats like this by checking every hostname query against a constantly-evolving list of known threats on the Internet. Instead of sending the user to the malicious host, Gateway stops the site from resolving. The user sees a “blocked domain” page instead of the malicious site itself.

As teams migrate to SaaS applications and zero-trust solutions, they rely more on the public Internet to do their jobs. Gateway's security works like a bouncer, keeping users safe as they navigate the Internet. However, some organizations still need to send traffic to internal destinations for testing or as a way to make the migration more seamless.

Starting today, you can use Cloudflare Gateway to direct end user traffic to a different IP than the one they originally requested. Administrators can build rules to override the address that would be returned by a resolver and send traffic to a specified alternative.

Like the security features of Cloudflare Gateway, the redirect function is Continue reading