Archive

Category Archives for "Networking"

BGP PIC – Prefix Independent Convergence Fundemantals

BGP PIC ( Prefix Independent Convergence ) is a BGP Fast reroute mechanism which can provides sub second convergence even for the 500K internet prefixes by taking help of IGP convergence.

BGP PIC uses hierarchical data plane in contrast to flat FIB (Forwarding table) design which is used by Cisco CEF and many legacy platforms.

In a hierarchical dataplane , the FIB used by the packet processing engine reflects recursions between the routes.

I will explain the recursion concept throughout the post so don’t worry about the above sentence, it will make sense.

There are two implementation of BGP PIC concept and they can protect the network traffic from multiple failures.

Link, node in the core or edge of the network can be recovered under a second and most of the case under 100ms ( It mostly depends on IGP convergence, so IGP should be tuned or IGP FRR can be used ).

In this article I will not explained IGP fast convergence or IGP Fast reroute but you can read my Fast reroute mechanism article from here.

BGP PIC can be thought as BGP Fast Reroute Mechanism which relies on IGP convergence for the failure detection. ( All overlay Continue reading

Working together to build a bigger, stronger Internet

[Published on behalf of the Internet Society Board of Trustees.]

The Internet Society’s vision is that the Internet is for everyone. Earlier this month, we wrote about our efforts to ensure a stable and diverse funding model to support the work that takes us towards our vision. The role of the Board of Trustees is to provide, with support from the community, the strategic direction for that work. In this post, we discuss our recent and current strategic efforts, put them into context, and provide pointers with more information for our community to get involved in defining our wanted future.

Naturally, the starting point of our current strategy was to agree with the community on the overall direction. Therefore, two years ago, during 2017, the Board consulted with our community to revise our mission statement into what we have today. Many of you contributed to that 2017 effort, which resulted in the following three focus areas:

  • Building and supporting the communities that make the Internet work;
  • Advancing the development and application of Internet infrastructure, technologies, and open standards; and
  • Advocating for policy that is consistent with our view of the Internet

Based on that community agreement on the development of this new mission, the Continue reading

Automation Solution: Data Center Fabric with Tenant Connectivity

I always tell attendees in the Building Network Automation Solutions to create minimalistic data models with (preferably) no redundant information. Not surprisingly, that’s a really hard task (see this article for an example) - using a simple automation tool like Ansible you end with either a messy and redundant data model or Jinja2 templates (or Ansible playbooks) full of hard-to-understand and impossible-to-maintain business logic.

Read more ...

Google Cloud Beefs Up Security With Palo Alto Networks, Fortinet

Palo Alto Networks and Google Cloud pledged to jointly develop a new multi-cloud security framework...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Larry Ellison: Oracle Will Not Replace Hurd

Former co-CEO Mark Hurd passed away in October. Safra Catz will take on sole leadership at...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Edge Networking’s Role in 5G Monetization

Download Edge Networking's Role in 5G Monetization to see the role edge networking plays in service...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco grabs Exablaze for low-latency chip technology

Cisco will continued to build up its internal-electronics tools with its planned purchase of   field-programmable gate array (FPGA) technology designer Exablaze for an undisclosed amount.Exablaze, founded in 2013, specializes in low-latency FPGAs used to construct logically reconfigurable digital circuits for networking gear in high-performance environments such as data centers, high-frequency trading (HFT), big-data analytics, high-performance computing and  telecommunications. Exablaze products include FPGA-based switches and network interface cards (NICs), as well as picosecond-resolution timing technology.To read this article in full, please click here

Cisco grabs Exablaze for low-latency chip technology

Cisco will continued to build up its internal-electronics tools with its planned purchase of   field-programmable gate array (FPGA) technology designer Exablaze for an undisclosed amount.Exablaze, founded in 2013, specializes in low-latency FPGAs used to construct logically reconfigurable digital circuits for networking gear in high-performance environments such as data centers, high-frequency trading (HFT), big-data analytics, high-performance computing and  telecommunications. Exablaze products include FPGA-based switches and network interface cards (NICs), as well as picosecond-resolution timing technology.To read this article in full, please click here

IDG Contributor Network: SD-WAN management means more than reviewing logs and parsing events

By creating a single view of all network data, you can do things better like correlating threat information to identify real attacks or keep a log of packet statistics to better diagnose intermittent networking problems.However, to turn data into value with the limitations of traditional systems, we must be creative with the solution. We must find ways to integrate the different repositories in various appliances. It’s not an easy task but an architectural shift that I’ve written about in the past, SASE (Secure Access Service Edge), should help significantly.SASE is a new enterprise networking technology category introduced by Gartner in 2019. It represents a change in how we connect our sites, users, and cloud resources.To read this article in full, please click here

Gap Narrows Between Azure, AWS, GCP in Cockroach Labs 2020 Report

Cockroach Labs' cloud report measured AWS, GCP, and Azure, on CPU, network, and storage I/O,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SD-WAN to Clip WAN Edge Growth, Gartner Predicts

Gartner expects the slow down in WAN edge spending to be offset somewhat by increasing bandwidth...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Intel Is $2B Serious About AI, Buys Habana to Target Nvidia

“Clearly, Intel realizes that it needs breakthrough performance and efficiency to go up against...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Five Benefits of Network Monitoring Software You Can’t Deny

In this blog post, CA Technologies will discuss five benefits that you can derive out of your...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Buys Exablaze, Scores Ultra-Low Latency FPGA Tech

Exablaze’s field programmable gate array-based devices play into Cisco’s intent-based...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

HA inside Data Center

Overview

In Leaf/Spine VXLAN based data centers, everyone likes to provide HA with Active/Active in it, so choices are different. There are two types of HA in data centers, Layer 3 and Layer 2.

For layer 3 HA, always there is more than one spine that can provide ECMP and HA at same time. However, Layer 2 redundancy for hosts and l4-l7 services that connected to leafs are more than an easy choice. As Cisco provided vPC for nearly 10 years ago, almost this was the first (and only) choice of network engineers. Also, other vendors have their own technologies. For example, Arista provided Multi-chassis Link Aggregation (MLAG) for L2 HA in leafs. But, there is always a problem in implementation of them. One example in vPC is “peer-link” that is an important component in the vPC feature. However, it can be a tough one in most cases like Dynamic Layer-3 routing over vPC or Orphan members that may cause local traffic switching between vPC peers without using Fabric links.

To address the “peer-link” issue, there is a “fabric-peering” solution that uses Fabric links instead of “peer-link” and convert it to “virtual peer-link”. With this solution there is no concern Continue reading

The Week in Internet News: U.S. Lawmakers Threaten Anti-Encryption Regulations

Don’t make us make you: Members of a U.S. Senate committee recently told representatives of Facebook and Apple that they need to give police access to customers’ encrypted communications, or they will be forced to by Congress, the Washington Post reports. The companies told lawmakers that backdoors in encryption would be exploited by cybercriminals.

Facebook declines: Meanwhile, Facebook has refused a request from U.S. Attorney General William Barr to build encryption backdoors into WhatsApp and Messenger, the New York Times reports.

Women want to be included: As Internet access is growing in the central African country of Chad, women are demanding to be in on the action, Reuters reports. Women across sub-Saharan Africa are currently 15 percent less likely to own a mobile phone than men are and 41 percent less likely to use the mobile Internet, the story says.

Gigabit tech boom: Gigabit-speed Internet service is turning some small U.S. cities into tech centers, bringing businesses and jobs to the areas, Inc. says. The story looks at businesses taking advantage of gigabit-speed networks in Chattanooga, Tennessee, Melbourne, Florida, and Sarasota, Florida.

Arrested for reporting: Thirty journalists are currently in prison worldwide on charges related to Continue reading

Network Break 265: Cisco Chips At Broadcom With New ASIC; AWS Gives Networking Some Love

On today's Network Break we analyze Cisco's new ASIC platform and the 8000 router series, dig into a string of AWS announcements related to networking and security, and discuss new products from Cato Networks and Silver Peak.

The post Network Break 265: Cisco Chips At Broadcom With New ASIC; AWS Gives Networking Some Love appeared first on Packet Pushers.