Archive

Category Archives for "Networking"

Cloud Networking Transformation Ahead

Networking is undergoing a metamorphosis. Today’s operations are challenged to cope with the DevOps, NetOps, SecOps and CloudOps models that need consistent operations control. Why should enterprises care? How do you cope with decades of legacy and is change possible? Arista believes that the networking world is at the cusp of a transformation, significantly facilitated by the agile, dynamic and economic network models of the public cloud providers. They have proven the elegance of simple yet scalable designs that transform siloed networks for the data center, core, campus or branch PINs (Places in the Network) into east west PICs(Places in the Cloud). This new paradigm is a far cry from the traditional siloed network architectures that required applications to be assigned to specific servers or storage, causing fixed-function rigidity. Agility and high availability are pivotal foundations to building the new PICs.

Should I Go with VXLAN or MLAG with STP?

TL&DR: It’s 2020, and VXLAN with EVPN is all the rage. Thank you, you can stop reading.

On a more serious note, I got this questions from an Johannes Spanier after he read my do we need complex data center switches for NSX underlay blog post:

Would you agree that for smaller NSX designs (~100 hypervisors) a much simpler Layer2 based access-distribution design with MLAGs is feasible? One would have two distribution switches and redundant access switches MLAGed together.

I would still prefer VXLAN for a number of reasons:

Read more ...

Should I Go with VXLAN or MLAG with STP?

TL&DR: It’s 2020, and VXLAN with EVPN is all the rage. Thank you, you can stop reading.

On a more serious note, I got this questions from an Johannes Spanier after he read my do we need complex data center switches for NSX underlay blog post:

Would you agree that for smaller NSX designs (~100 hypervisors) a much simpler Layer2 based access-distribution design with MLAGs is feasible? One would have two distribution switches and redundant access switches MLAGed together.

I would still prefer VXLAN for a number of reasons:

Rust: Constants, Variables, and Mutability – Oh My!

In the last post I wrote about my journey from Python to Go as my primary language, and how I am now exploring Rust. This will be the first in a series of posts on Rust, mostly written from this perspective. I realize not everyone is going to Rust from Go, but that’s my perspective, and it will be impossible to keep this perspective from showing through and making comparisons between Rust and Go or Python.

AT&T Puts More Jobs on the Chopping Block

Continued job losses at one of the world’s largest network operators underlines the impact...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Covid-19 affects IT pros at work

The Covid-19 virus has already forced cancellation of major technology conferences, Mobile World Congress being the first and most notable, and others could follow, but there are more immediate effects on IT professionals.The availability of servers is projected to be reduced due to scaled back or halted production in China, where efforts to contain the coronavirus include closing factories. The center of the outbreak, Wuhan, is also the center of display production.10 of the world's fastest supercomputers Processor manufacturer Nvidia acknowledges the effects of the virus on its production and predicts a $100 million revenue hit next quarter because of it.To read this article in full, please click here

COVID-19 affects IT pros at work

The COVID-19 virus has already forced cancellation of major technology conferences, Mobile World Congress being the first and most notable, and others could follow, but there are more immediate effects on IT professionals.The availability of servers is projected to be reduced due to scaled back or halted production in China, where efforts to contain the coronavirus include closing factories. The center of the outbreak, Wuhan, is also the center of display production.10 of the world's fastest supercomputers Processor manufacturer Nvidia acknowledges the effects of the virus on its production and predicts a $100 million revenue hit next quarter because of it.To read this article in full, please click here

Daily Roundup: Cumulus Touts Open Source Network Automation

Cumulus added open source network automation; Telefónica to lead yet another edge alliance; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

4 Ways SD-Branch Is Transforming Retail Networks

Retail SD-branch can help a business retain customers, offer them better service, and increase...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

CNCF Survey Underscores Cloud Native Popularity

Results from CNCF's annual survey indicate growing ubiquity of the use of cloud native technologies...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Use TheGreenBow VPN Client to Connect with VyOS

The site-to-site Virtual Private Networks (VPN) connect two or more remote locations. Thanks to it, computers located inside locations can communicate securely over the public Internet as they were located on the same private network. This is accomplished by tunnels that interconnect remote locations. Tunnels add extra layer security, encrypting user traffic carried inside tunnels. […]
Continue reading...

Ericsson 5G Production Ramps at Texas ‘Smart Factory’

While “smart,” the facility initially counts approximately 100 employees. The facility itself...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Are All Networks Created Equal?

It’s not illogical to argue that since we all use the same networking technologies that all networks are essentially the same. Routing protocols, layer two technologies, and overlays all behave the same whether they are run in SOHO, enterprise, or service provider environments. That being said, it feels like there can be worlds of difference between the application of these technologies in different environments. In this episode Nick Buraglio, Kevin Myers, and I discuss just how interchangeable these technologies are and why it feels like engineers who work on the same technologies can feel worlds apart when their paths intersect.

Nick Buraglio
Guest
Kevin Myers
Guest
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Are All Networks Created Equal? appeared first on Network Collective.

Day Two Cloud 038: Making The Case For Third-Party Cloud Storage

Today's Day Two Cloud podcast focuses on third-party cloud storage. While cloud providers have native storage offerings, there may be times when you want an alternative. Guest Stephen Foskett discusses why third-party storage in the cloud is viable, describes common enterprise use cases, and examines key issues including performance, data management, and operations.

The post Day Two Cloud 038: Making The Case For Third-Party Cloud Storage appeared first on Packet Pushers.

Internet Society Board of Trustees Meeting on March 13-14, 2020, changed to a virtual meeting

Internet Society community members,

Due to concerns associated with the COVID-19 coronavirus, including the possibility of quarantines and other travel restrictions, the Internet Society Board of Trustees has decided to hold its meeting on 13-14 March, 2020, as a virtual meeting instead of a physical meeting in Cancun, Mexico. This board meeting was originally planned to follow the ICANN 67 meeting in Cancun, which was also changed to a virtual meeting.

The agenda and remote participation information will be published to https://www.internetsociety.org/board-of-trustees/meetings/ within the next few days.

The post Internet Society Board of Trustees Meeting on March 13-14, 2020, changed to a virtual meeting appeared first on Internet Society.

Ampere Targets Intel, AMD With Cloud-First Chips, Oracle Partnership

Oracle, which holds a $40 million stake in Ampere, has announced plans to leverage the Altra...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cumulus Networks launches the industry’s first open source and fully packaged automation solution — making open networking easier to deploy and manage and enabling infrastructure-as-code models

Today, Cumulus Networks is announcing the release of its production-ready automation solution for organizations moving towards fully automated networks in order to take advantage of infrastructure-as-code deployment models.

At the forefront of the networking industry, we see our customers caught in the shifting tides as the modern data center moves toward fully automated networking. As they look to take advantage of innovative technology like 5G, cloud, IoT and more, organizations are looking to innovative networking deployments that incorporate new ways of thinking about automation like infrastructure-as-code, CI/CD and more. As network traffic continues to grow at an exponential rate, organizations are left with infrastructure that is harder to manage and deploy. Bogged down by the cost and time it takes to build out bits and pieces of fully automated solutions, these organizations are in need of a solution to help them innovate their networks at the speed business demands.

Cumulus is now offering the first open source, out-of-the-box, robust, end-to-end automated configuration and testing solution using Ansible. Customers no longer have to piece together their network automation from disparate and untested scripts and proof-of-concept playbooks. Cumulus is offering a framework for an elegant push-button solution for those looking for cutting-edge Continue reading

Pwned Passwords Padding (ft. Lava Lamps and Workers)

Pwned Passwords Padding (ft. Lava Lamps and Workers)
Pwned Passwords Padding (ft. Lava Lamps and Workers)

The Pwned Passwords API (part of Troy Hunt’s Have I Been Pwned service) is used tens of millions of times each day, to alert users if their credentials are breached in a variety of online services, browser extensions and applications. Using Cloudflare, the API cached around 99% of requests, making it very efficient to run.

From today, we are offering a new security advancement in the Pwned Passwords API - API clients can receive responses padded with random data. This exists to effectively protect from any potential attack vectors which seek to use passive analysis of the size of API responses to identify which anonymised bucket a user is querying. I am hugely grateful to security researcher Matt Weir who I met at PasswordsCon in Stockholm and has explored proof-of-concept analysis of unpadded API responses in Pwned Passwords and has driven some of the work to consider the addition of padded responses.

Now, by passing a header of “Add-Padding” with a value of “true”, Pwned Passwords API users are able to request padded API responses (to a minimum of 800 entries with additional padding of a further 0-200 entries). The padding consists of randomly generated hash suffixes with the usage Continue reading