Archive

Category Archives for "Networking"

Using predictive analytics to troubleshoot network issues: Fact or fiction?

Predicting the future is getting easier. While it's still not possible to accurately forecast tomorrow's winning lottery number, the ability to anticipate various types of damaging network issues — and nip them in the bud — is now available to any network manager.Predictive analytic tools draw their power from a variety of different technologies and methodologies, including big data, data mining and statistical modeling. A predictive analytics tool can be trained, for instance, to use pattern recognition — the automated recognition of patterns and regularities in data — to identify issues before they become significant problems or result in partial or total network failures.To read this article in full, please click here

The TOGAF ADM – Part II

 Continuing right off from my last post, we going to continue our run-though of the ADM wrapping the last few phases. Phase E: opportunities & Solution: Now, it’s time for us to review the outputs from our previous phases and to start defining the beginning of our implementation details. We do this in the form of creating the […]

Just Published: NSX-T Technical Deep Dive Slide Deck

Last year when I was creating the first version of VMware NSX Deep Dive content, NSX-V was mainstream and NSX-T was the new kid on the block. A year later NSX-V is mostly sidelined, and all the development efforts are going into NSX-T. Time to adapt the webinar to new reality… taking the usual staged approach:

Cumulus content roundup: Summer 2019

Summer has flown by and you may have missed some of the great content that was published. Don’t worry, you can catch up on some of our favorite podcasts, blog posts, and articles below. So settle in and then dive into all things open networking!

From Cumulus Networks:

Customizing your network: Take a quick look at the types of automation available in Linux, from basic to dynamic, and how these automation capabilities help to enable data center-wide orchestration here.

Kernel of Truth podcast: Network monitoring: When it comes to network monitoring, have you run into a “switch that cried wolf?”Kernel of Truth host Brian O’Sullivan is joined by two new guests to the podcast Justin Betz & Faye Ly to chat more about networking monitoring here.

Best practices: MLAG backup IP: We cover the best ways to build a redundant backup IP link for multi-chassis link aggregation (MLAG).

Exploring Batfish with Cumulus – part one: With Batfish supporting Cumulus Networks this year, we show how it can fit into pipelines & replace or complement existing testing strategies in part one of a two-part series.

Kernel of Truth podcast: Innovation in the data center: Spiderman aka Rama Continue reading

ClearOS Installation on QEMU

ClearOS is an operating system based on CentOS for use in small and medium enterprises as a network gateway and network server with a web-based administration interface.

ClearOS in Gateway mode acts as a firewall, gateway and server on a local network. The tutorial provides installation and configuration steps for deployement of ClearOS on QEMU VM. We will later connect ClearOS QEMU VM into GNS3 network topology in order to test  features such as application traffic filtering and transparent proxy with user authentication.

Software Used:
Host OS: Kubuntu Linux 18.04.1 LTS with Qemu 3.0.0 installed and kvm-intel module loaded
Guest OS: ClearOS 7.5.0 x86_64

1. Preparing Host Network Infrastructure

As we are going to  install ClearOS guest QEMU VM in a gateway mode,  your host should have two network adapters available. (Picture 1). In our case, the first ClearOS guest network interface ens3 will be defined as LAN type during ClearOS installation. The second guest interface ens4 will be defined as External and used for connection to SOHO network. We will bridge the interface ens4 with the host interface enp4s0f2 using iproute utility. But first, we need to create tap interfaces tap0 and Continue reading

Heavy Networking 468: Making The Business Case For SD-WAN

Building a business case for SD-WAN involves more than just anticipating savings by moving from private circuits to business broadband connections. On today's Heavy Networking, we look at how to tie SD-WAN capabilities to business benefits, what to consider when developing a business case, how measure ROI, and more with guest Jason Gintert.

The post Heavy Networking 468: Making The Business Case For SD-WAN appeared first on Packet Pushers.

HPE introduces VMware services on GreenLake

HP Enterprise (HPE) has been aggressively promoting its GreenLake IT consumption model since it was introduced last year. GreenLake is a pay-per-use consumption model where the customer does not take ownership of the hardware but merely leases it and pays only for their use, which is metered.Consumption models have become popular among OEMs looking to keep customers that are anxious to get out of owning expensive assets, such as servers. Dell EMC has its own program called Flex on Demand, and Lenovo has ThinkAgile CP.To read this article in full, please click here

HPE introduces VMware services on GreenLake

HP Enterprise (HPE) has been aggressively promoting its GreenLake IT consumption model since it was introduced last year. GreenLake is a pay-per-use consumption model where the customer does not take ownership of the hardware but merely leases it and pays only for their use, which is metered.Consumption models have become popular among OEMs looking to keep customers that are anxious to get out of owning expensive assets, such as servers. Dell EMC has its own program called Flex on Demand, and Lenovo has ThinkAgile CP.To read this article in full, please click here

Weekly Wrap: AT&T CEO Donovan Departs After Paving SDN Foundation

Weekly Wrap for Aug. 30, 2019: AT&T CEO John Donovan gives his notice; VMware bets the farm on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Every business is a technology business

Success for an NFL franchise involves the cultivation of a variety of core competencies both on and off the field. Recently I had the opportunity to spend time with the Seattle Seahawks organization and I was surprised by the extent to which the team utilizes data and digital tools to drive continuous improvements within their core competencies.But then why should I be surprised? Let’s face it, today, every business is a technology business. The Seahawks are no different. They are, like many other companies, investing in digital technologies to improve the product on the field and the fan experience in the stands.Data literacy is a core competency the Seahawks have added to their business. I won’t give away any trade secrets, but let’s take a high-level look at three ways this core competency creates competitive advantage.To read this article in full, please click here

CDNetworks Drives Kubernetes to the Edge

The CDN's Edge Computing Platform Service is built on Kubernetes and Docker using a container...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Broadcom Releases PCIe Switches for Data Centers

Broadcom claims its PEX88000 family of switches are "ideal for high-throughput and low-latency...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Patches Critical Bug in REST API Container

Cisco issued a patch for a critical bug in its IOS XE operating system that could allow a remote...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Positioning Policy Properly

Who owns the network policy for your organization? How about the security policy?Identity policy? Sound like easy questions, don’t they? The first two are pretty standard. The last generally comes down to one or two different teams depending upon how much Active Directory you have deployed. But have you ever really thought about why?

During Future:NET this week, those poll questions were asked to an audience of advanced networking community members. The answers pretty much fell in line with what I was expecting to see. But then I started to wonder about the reasons behind those decisions. And I realized that in a world full of cloud and DevOps/SecOps/OpsOps people, we need to get away from teams owning policy and have policy owned by a separate team.

Specters of the Past

Where does the networking policy live? Most people will jump right in with a list of networking gear. Port profiles live on switches. Routing tables live on routers. Networking policy is executed in hardware. Even if the policy is programmed somewhere else.

What about security policy? Firewalls are probably the first thing that come to mind. More advanced organizations have a ton of software that scans for security Continue reading

Beyond the Palm Trees: Local Action Key to Fast, Affordable and Reliable Internet Solutions in Rural Hawai’i

To many North Americans, Hawai’i is a place of beaches, resorts, surfing, rainforests, and volcanoes — it’s a vacation destination.

But despite its tourism infrastructure and economy, Native Hawaiian communities in the far-flung chain of more than 130 islands face many of the same Internet connectivity challenges as Indigenous communities in Canada and the continental United States. And for a variety of economic, policy and geographic reasons, it is often excluded from efforts to improve access for Indigenous, rural and remote communities.

The Internet Society believes the Internet is for everyone and works with underserved communities to find and create local access solutions in some of the hardest-to-reach places on earth. What’s exciting is that despite the different geographic landscapes, the same community-led solution underway to improve Internet access in the high Arctic could also help Native Hawaiians carve their own path to better connectivity.

That’s why, in 2019, the Internet Society is holding its third annual Indigenous Connectivity Summit (ICS) in Hawai’i.

Including Indigenous voices in the planning and solutions that shape the Internet is a vital part of closing the digital divide. Previous summits in Santa Fe, New Mexico, in 2017, and Inuvik, Northwest Territories, Canada, Continue reading

Unix as a Second Language: The touch command

The Linux touch command allows users to create an empty file or update a file’s data and time settings.You might want to do this if you need to be sure that a file exists before a script or process begins. The command can also be used to set the date and time to match those of another file.Watch this Two-minute Linux Tip video by Sandra Henry-Stocker to learn more. To read this article in full, please click here