Archive

Category Archives for "Networking"

Beyond Moore’s Law: Neuromorphic computing?

With the conceivable exhaustion of Moore’s Law – that the number of transistors on a microchip doubles every two years – the search is on for new paths that lead to reliable incremental processing gains over time.One possibility is that machines inspired by how the brain works could take over, fundamentally shifting computing to a revolutionary new tier, according to an explainer study released this month by Applied Physics Reviews.[Get regularly scheduled insights by signing up for Network World newsletters.] “Today’s state-of-the-art computers process roughly as many instructions per second as an insect brain,” say the paper’s authors Jack Kendall, of Rain Neuromorphics, and Suhas Kumar, of Hewlett Packard Labs. The two write that processor architecture must now be completely re-thought if Moore’s law is to be perpetuated, and that replicating the “natural processing system of a [human] brain” is the way forward.To read this article in full, please click here

Public Cloud Cannot Change the Laws of Physics

Listening to public cloud evangelists and marketing departments of vendors selling over-the-cloud networking solutions or multi-cloud orchestration systems, you could start to believe that migrating your workload to a public cloud would solve all your problems… and if you’re gullible enough to listen to them, you’ll get the results you deserve.

Unfortunately, nothing can change the fundamental laws of physics, networking, or application architectures:

Read more ...

EVENTS. My experience attending and speaking at UKNOF 45 in London.

Hello my friend,

This year, besides Cisco championship started for me with an opportunity to speak at UKNOF event in London. UKNOF stands for United Kingdom’s Network Operators’ Forum, and per their webpage acts as an open forum for operational, technical and engineering information exchange related to networking technologies and practices. And here is my experience.

How do I get there?

Some time ago I was presenting at NetLdn event in a nice pub in London, and apparently there were some people from the UKNOF board (hey, Chris Russel).

I have an interesting discussion with NetLdn organizers some time ago, you can watch it on our YouTube channel.

They advised me to submit my talk to UKNOF, and if the committee voted for it, I’d have an opportunity to speak in front of quite a big audience at UKNOF 45 in London. I was positively surprised and took that opportunity to apply for a talk. After a month of waiting I finally got an invitation to talk at the 45th UKNOF meeting, which took place in London. 

Despite I have an almost ready slide deck, I need to rework it a bit to comply with the event’s Continue reading

Tech Bytes: Reviewing 2019’s Most Impactful Internet Outages With ThousandEyes (Sponsored)

Today’s Tech Bytes podcast looks back at some of 2019's impactful Internet outages, including Google Cloud, with sponsor ThousandEyes. We’ll discuss what happened in these outages, who was affected, and lessons learned. Our guest is Angelique Medina, Director of Product Marketing at ThousandEyes.

The post Tech Bytes: Reviewing 2019’s Most Impactful Internet Outages With ThousandEyes (Sponsored) appeared first on Packet Pushers.

Why I Bought A Meraki Camera

I recently purchased a Meraki MV 72 and wanted to share some of the logic behind why I did this. Having 4 other camera ecosystems in “production” at my home, this decision to add number 5 may defy logic for many. My thoughts around this particular investment were more about my personal learning than about function.

To provide a little background, I have a combination of various consumer and prosumer type cameras that vary in form and functionality. Every single brand (and ecosystem), while covering some functions very well, seem to leave a little to be desired. Hence the reason to buy a Meraki MV.

No–I do not expect the Meraki solution to be a perfect solution. Actually, since it is built around business use cases, it might not be as good at somethings that I find very useful. However, there is an API that I wanted to experiment with and solidify my knowledge of how I might build and extend my own ecosystem.

The deeper function of the Meraki MV API is included with MV Sense which is an add-on. Fortunately, every MV Sense organization with capable cameras comes with 10 free licenses. This requires the new generation of Continue reading

The Week in Internet News: Kentucky Broadband Program Stalls

Broadband delays: KentuckyWired, an ambitious plan to bring broadband services to underserved, rural parts of the state, is about two years behind schedule, the Courier Journal reports. As a result, the promise of new high-tech jobs has not materialized. About 405,000 residents of Kentucky have no access to wired broadband.

Cities take the lead: Meanwhile, a handful of cities in Oregon are considering municipal broadband projects, KPTV reports. Hillsboro is about to join the ranks of cities offering city-funded connectivity.

Tweets against encryption: U.S. President Donald Trump has tweeted a demand for Apple to defeat encryption on iPhones owned by criminal suspects, CNet says. Administration officials have criticized Apple for not unlocking a phone used by a dead mass shooter.

Election hacking: A security researcher has found that an election server in the U.S. state of Georgia may have been hacked in 2014, before a tight 2018 race for governor, Politico reports. If hackers did manage to breach the server, they would have “almost total control” of it, including the abilities to modify files, delete data, and install malware,” election security expert Logan Lamb said.

The cost of pulling the plug: Internet and social media shutdowns cost economies Continue reading

GPON vs. Traditional Ethernet Architecture

GPON (Gigabit Passive Optical Network) is used to reduce the number of active switching nodes in the network design. Network Design Best practice in Campus networks and many Datacenter networks (Not Massively Scale Datacenters), is to use Three-Tier; Access, Distribution and Core network design. Although the design decision depends on the scalability requirements in the Campus and DC, two layer; Access and Collapsed Distribution/Core design can be used. Below figure depicts common three tier Access, Distribution and Core design.

 

This post was first published on “Service Provider Networks Design and Architecture by Orhan Ergun” book. 

 

GPON vs Active Ethernet

Figure – GPON vs. Traditional Ethernet Architecture, Source: cisco.com

 

In Three-tier Traditional campus networks, there are active Ethernet devices used in each tier. Active means, nodes require electricity. Active Ethernet switches forward traffic based on forwarding rules. If it’s a Layer 2 network, traffic is forwarded based on Layer 2 information, if it is a Layer 3 design, traffic is forwarded based on routing protocol information.

GPON in the campus network replaces traditional three-tier design with two-tier optical network, by removing the Active access and distribution layer Ethernet switches with the ONT, Splitter and OLT devices. Although ONT Continue reading

Edge Computing Providers

Edge computing is a networking philosophy focused on bringing computing as close to the source of data as possible, in order to reduce latency and bandwidth usage. In a simpler term, edge computing means running fewer processes in the cloud and moving those processes to local places, such as on a user’s computer, an IoT device, or an edge server.

 

This post was first published in ‘ Service Provider Networks Design and Architecture by Orhan Ergun ‘ book.

Bringing computation to the network’s edge minimizes the amount of long-distance communication that has to happen between a client and server.

For Internet devices, the network edge is where the device, or the local network containing the device, communicates with the Internet. The edge may not be a clear term; for example, a user’s computer or the processor inside of an IoT camera can be considered the network edge, while the user’s router, ISP, or local edge servers are also considered the edge.

 

It is important to understand that the edge of the network is geographically close to the device, unlike origin servers and cloud servers, which can be very far from the devices they communicate with.

 

Cloud computing Continue reading

Segment Routing Workbook by Orhan Ergun

Recently I published a new book on Segment Routing.

Segment Routing have been deployed by many networks (Both Enterprises and Service Providers ) for many different use cases such as Traffic Engineering, Fast Reroute , Monitoring and so on and I believe Segment Routing will be even more popular in near future. Thus, I believe this book should be read by anyone who are interested in networking.

You can get the sample copy of the book and purchase it from here. 

This book covers both Theory and Practical aspect of Segment Routing.

Segment Routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefit of interfacing with Software Defined Networks and works based on Source Routing.

This Workbook will be useful for those who want to understand, deploy,  verify and troubleshoot Segment Routing Networks. This Workbook will be useful for the  CCIE and CCDE certification exams.

Book Content:

  • Segment routing fundamental and concepts
    • Segment routing introductions
    • SR and MPLS data plane
    • Segment routing global block
  • Segment routing in IGP
    • SR Control Plane overview
    • SR in OSPF
    • SR in ISIS
    • IP FRR (LFA/TI-LFA)
    • Configuration lab and troubleshooting tips
    • Segment Routing and LDP

Different wordings for the same definition/meaning in Networking

In computer network engineering almost always we use different definitions/wordings to explain same thing. In this post, I will give you some examples, please add whatever else you remember in the comment box below , we can discuss them there.

 

All below keywords explain the same thing. 

 

Let’s start with MPLS Cases :

  1. Tunnel Label , Transport Label , Transport Label , Outer Label , Topmost Label , Outmost Label : They all define PE to PE reachability in MPLS network.
  2. Ingress PE , Source PE , Headend PE , Ingress LSR , Edge LSR : Either in MPLS VPN or MPLS Traffic Engineering cases, you can see these keywords and they all define the same thing.
  3. Inner Label, VPN Label , VC (Virtual Circuit) Label , Service Label : They all define same thing which is Layer 2 VPN customer service information.

Inter Domain Routing Cases :

  1. IX (Internet Exchange) , IXP (Internet Exchange Point) , Internet Exchange , Peering Point , Exchange Point
  2. Public Peering Exchange , MLPE (Multi Lateral Peering Exchange) , Public Exchange

IOT Case:

  1. Smart Device, Smart Object , Sensors , Intelligent Object , Smart Things

Routing :

ASBR , IGW (Internet Continue reading

Early Stages of Product Decline

One of the worst things that can happen to anyone selecting equipment for a new network infrastructure is to receive the End-of-Life notice a week after the gear has been deployed in a production network… or maybe it’s even worse to be stuck with a neglected piece of technology full of bugs that the vendor never fixes because they’re chasing other shinier squirrels.

If you’re careful and watch what the vendors are doing, you might be able to save the day and identify the early phases of product decline. Here they are (as seen from the outside) in approximate order:

End of promotion opportunities. In most corporations aggressive hunters fare better than meticulous farmers, and product development is no different. As a friend of mine working for a large corporation once said “The culture here rewards launches instead of steady improvements. Like in academia, publishing a paper is valued more than running ISS”.

Read more ...

Windows Server vulnerability disclosed by NSA; Don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here

Windows Server vulnerability disclosed by NSA; don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here

Windows Server vulnerability disclosed by NSA; Don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here

Windows Server vulnerability disclosed by NSA; don’t wait to patch

Microsoft’s monthly Patch Tuesday included a hefty haul of fixes: 49 total, and one of them is more than just critical. For enterprises running Windows Server 2016 and Server 2019, it's vital you implement the patch ASAP.The National Security Agency (NSA) disclosed the Windows vulnerability on Tuesday, the same day the fix was issued. That means the NSA found the flaw likely months ago but held off on public notification until Microsoft could come up with a fix. It would be irresponsible for the NSA, or anyone else, to announce a vulnerability and not give the software maker time to patch it.The vulnerability was spotted in "crypt32.dll," a Windows module that has been in both desktop and server versions since NT 4.0 more than 20 years ago. Microsoft describes the library as handling certificate and cryptographic messaging functions in the CryptoAPI.To read this article in full, please click here