The goal is to develop a proof-of-concept SD-WAN service designed to run on white-box consumer...
Yesterday we ran the last live webinar session for 2019, and all we have to do before locking the virtual office doors and returning to our families is to get the videos back from our editor and publish them. The “this is what we did in 2019” and “this is what we plan to do in 2020” blog posts will have to wait till we come back.
We’ll be (mostly) gone until early January… unless of course you have an urgent support problem. The desperate paperwork ideas like “I need you to sign, stamp, and notarize this legal document written in a language you’ve never seen in your life” will have to survive for a few weeks without our immediate attention (but then they usually don’t disappear on their own).
I hope you’ll be able to do something similar, disconnect from the crazy pace of networking world, forget all the unicorns you’ve been trying to tame during this year, and focus on your loved ones - they need you more than the router sitting in the basement of your building. We would also like to wish you all the best in 2020!
Oh, and Continue reading
Hello my friend,
I had an honour to be invited to Cumulus Linux podcast, where we had quite an interesting discussion about the role of network automation and real-life challenges.
The discussion covered the experience we collected in THG (The Hut Group) Hosting during driving the build of the open network data centres implementing the latest achievements of white boxes, disaggregation and (add your marketing buzzword here). And yes, we speak about real-life experience, not the lab tests in Cumulus VX
The whole podcast you can list at the Cumulus Website.
If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.
BR,
Anton Karneliuk
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Cast Box and Sticher!
Click here for our previous episode.
In this episode we continue the conversation about “infrastructure as code.” Last time we chatted about it we talked to Nick Mitchell and Eric Pulvino, two of our consultants, and shared not only what it is but what the problems infrastructure as code is solving for and why you should care. In this latest episode we go a step further. Kernel of Truth hosts Brian O’Sullivan and Pete Lumbis are joined by Anton Karneliuk who talk more about what it is and also discuss how to evolve it, what the challenges are and Anton shares his real-life experiences implemented it at The Hut Group.
Guest Bios
Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a Continue reading
Late last month Cisco announced it had 20,000 SD-WAN customers spread across its Viptela and...
One of the common starting points during the IT architecture process is trying to define and identify tenancy. Part of the problem is that the term “tenant” has various definitions depending on the business unit. As a network engineer, I don’t care about one of those definitions of the word: “Layer 3 subnet isolation with a unified set of routing and security policies.” Trying to communicate that to technical leaders in other IT organizations is hard enough, but trying to communicate this to a non-technical business leader can feel like an impossible task.
The goal then becomes trying to distill the complexities of a tenant into a consumable morsel.
In my most recent consulting engagement, I worked with a company that had three key players during the design stage:
We kept using the word “tenancy” thinking we were speaking the same language , but we slowly realized that we weren’t speaking with the same definitions. In my network-first definition, I only cared about the subnets allocated to the servers and whether the servers were able to talk to each other. From my definition of tenancy, any server allocated to a tenant Continue reading
Open source software has had a significant influence on the tech career of today's Full Stack Journey podcast guest, Matt Broberg. We discuss why open source has been so influential, the importance of community in IT, and topics such as how to stay technical when your role changes, and why business fundamentals should matter to technologists.
The post Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg appeared first on Packet Pushers.
“AWS has not copied anybody’s software or services," wrote Andi Gutmans, VP for analytics and...
Cisco has been battling Chinese manufacturers over the sale of spurious versions of its products...
The chipmaker issued a patch for the vulnerability, which could allow attackers to change...
The growing complexity of IT environments make it harder for SecOps teams to keep pace with developers, manage access to resources, and ensure that the right controls are in place and policies are met. Sponsor Tufin joins the Heavy Networking podcast to discuss how automation can boost SecOps effectiveness while tackling initiatives such as zero trust and network segmentation on premises and in the cloud.
The post Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored) appeared first on Packet Pushers.
Hear from Corsa's Eduardo Cervantes and his thoughts on security, the data explosion, and why...
BGP PIC ( Prefix Independent Convergence ) is a BGP Fast reroute mechanism which can provides sub second convergence even for the 500K internet prefixes by taking help of IGP convergence.
BGP PIC uses hierarchical data plane in contrast to flat FIB (Forwarding table) design which is used by Cisco CEF and many legacy platforms.
In a hierarchical dataplane , the FIB used by the packet processing engine reflects recursions between the routes.
I will explain the recursion concept throughout the post so don’t worry about the above sentence, it will make sense.
There are two implementation of BGP PIC concept and they can protect the network traffic from multiple failures.
Link, node in the core or edge of the network can be recovered under a second and most of the case under 100ms ( It mostly depends on IGP convergence, so IGP should be tuned or IGP FRR can be used ).
In this article I will not explained IGP fast convergence or IGP Fast reroute but you can read my Fast reroute mechanism article from here.
BGP PIC can be thought as BGP Fast Reroute Mechanism which relies on IGP convergence for the failure detection. ( All overlay Continue reading