Archive

Category Archives for "Networking"

Gap Narrows Between Azure, AWS, GCP in Cockroach Labs 2020 Report

Cockroach Labs' cloud report measured AWS, GCP, and Azure, on CPU, network, and storage I/O,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SD-WAN to Clip WAN Edge Growth, Gartner Predicts

Gartner expects the slow down in WAN edge spending to be offset somewhat by increasing bandwidth...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Intel Is $2B Serious About AI, Buys Habana to Target Nvidia

“Clearly, Intel realizes that it needs breakthrough performance and efficiency to go up against...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Five Benefits of Network Monitoring Software You Can’t Deny

In this blog post, CA Technologies will discuss five benefits that you can derive out of your...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Buys Exablaze, Scores Ultra-Low Latency FPGA Tech

Exablaze’s field programmable gate array-based devices play into Cisco’s intent-based...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

HA inside Data Center

Overview

In Leaf/Spine VXLAN based data centers, everyone likes to provide HA with Active/Active in it, so choices are different. There are two types of HA in data centers, Layer 3 and Layer 2.

For layer 3 HA, always there is more than one spine that can provide ECMP and HA at same time. However, Layer 2 redundancy for hosts and l4-l7 services that connected to leafs are more than an easy choice. As Cisco provided vPC for nearly 10 years ago, almost this was the first (and only) choice of network engineers. Also, other vendors have their own technologies. For example, Arista provided Multi-chassis Link Aggregation (MLAG) for L2 HA in leafs. But, there is always a problem in implementation of them. One example in vPC is “peer-link” that is an important component in the vPC feature. However, it can be a tough one in most cases like Dynamic Layer-3 routing over vPC or Orphan members that may cause local traffic switching between vPC peers without using Fabric links.

To address the “peer-link” issue, there is a “fabric-peering” solution that uses Fabric links instead of “peer-link” and convert it to “virtual peer-link”. With this solution there is no concern Continue reading

The Week in Internet News: U.S. Lawmakers Threaten Anti-Encryption Regulations

Don’t make us make you: Members of a U.S. Senate committee recently told representatives of Facebook and Apple that they need to give police access to customers’ encrypted communications, or they will be forced to by Congress, the Washington Post reports. The companies told lawmakers that backdoors in encryption would be exploited by cybercriminals.

Facebook declines: Meanwhile, Facebook has refused a request from U.S. Attorney General William Barr to build encryption backdoors into WhatsApp and Messenger, the New York Times reports.

Women want to be included: As Internet access is growing in the central African country of Chad, women are demanding to be in on the action, Reuters reports. Women across sub-Saharan Africa are currently 15 percent less likely to own a mobile phone than men are and 41 percent less likely to use the mobile Internet, the story says.

Gigabit tech boom: Gigabit-speed Internet service is turning some small U.S. cities into tech centers, bringing businesses and jobs to the areas, Inc. says. The story looks at businesses taking advantage of gigabit-speed networks in Chattanooga, Tennessee, Melbourne, Florida, and Sarasota, Florida.

Arrested for reporting: Thirty journalists are currently in prison worldwide on charges related to Continue reading

Network Break 265: Cisco Chips At Broadcom With New ASIC; AWS Gives Networking Some Love

On today's Network Break we analyze Cisco's new ASIC platform and the 8000 router series, dig into a string of AWS announcements related to networking and security, and discuss new products from Cato Networks and Silver Peak.

The post Network Break 265: Cisco Chips At Broadcom With New ASIC; AWS Gives Networking Some Love appeared first on Packet Pushers.

BrandPost: Customers Demonstrate the Benefits of Secure SD-WAN Across Industries

Given today’s expanding networks, largely being driven by cloud transformation and similar digital transformation efforts, keeping everything connected in a single, easily manageable environment is a critical challenge. Extending things like cloud services to your mobile workers and branch offices will inevitably impact your network’s performance – especially if you are still trying to route traffic through your central network using things like WAN routers and MPLS connections in a hub and spoke design. Routing cloud-based applications through a WAN link to the central network can severely impact productivity and user experience while creating continually increasing bandwidth loads.To read this article in full, please click here

Figure Out What Problem You’re Trying to Solve

A long while ago I got into an hilarious Tweetfest (note to self: don’t… not that I would ever listen) starting with:

Which feature and which Cisco router for layer2 extension over internet 100Mbps with 1500 Bytes MTU

The knee-jerk reaction was obvious: OMG, not again. The ugly ghost of BRouters (or is it RBridges or WAN Extenders?) has awoken. The best reply in this category was definitely:

I cannot fathom the conversation where this was a legitimate design option. May the odds forever be in your favor.

A dozen “this is a dumpster fire” tweets later the problem was rephrased as:

Read more ...

7 considerations when buying network-automation tools

The concept of network automation has been around for as long as there have been networks, and until now the uptake has been slow for a number of reasons including resistance from network engineers.  But now forces are coming together to create a perfect storm of sorts, driving a need for network automation tools.One factor is that more and more network teams are starting to feel the pain of working in the fast-paced digital world where doing things the old way simply does not work.  The manual, box-by-box, method of configuring and updating routers and switches through a command-line interface (CLI) is too slow and error prone. [Get regularly scheduled insights by signing up for Network World newsletters.] Also, the rise of software-defined networks (SDN), including software-defined WANs (SD-WAN), has enabled network-automation tools to evolve from operationally focused point products that address things like change management and configuration into policy and orchestration tools.To read this article in full, please click here

Physically man-in-the-middling an IoT device with Linux Bridge

This is a quick writeup of how I did some analysis of an IoT device (The Thing) by physically inserting a Linux box into the network path between The Thing and the network service it consumed. The approach described here involves being physically close to the target system, but it should work equally well1 anywhere there's an Ethernet link along the path between The Thing and it's server.


First, the topology: The Thing is attached to an Ethernet switch and is part of the 192.168.1.0/24 subnet. We'll be physically inserting ourselves into the path of the red cable in this diagram.

Initial setup

The first step is to get a dual-homed Linux box into the path. I used an Ubuntu 18.04 machine with the following netplan configuration:

 network:  
version: 2
renderer: networkd
ethernets:
eth0:
dhcp4: no
eth1:
dhcp4: no
bridges:
br0:
addresses: [192.168.1.2/24]
gateway4: 192.168.1.1
interfaces:
- eth0
- eth1


This configuration defines an internal software-based bridge for handling traffic between The Thing and the switch. Additionally, it creates an IP interface for the Linux host to communicate with neighbors attached to the bridge (everybody on 192.168.1. Continue reading

Packet and Sprint on Why Bare Metal Is the ‘Lowest-Common Denominator’

IFX2019. In this latest The New Stack Makers podcast recorded live at Zachary Smith, CEO and co-founder of Packet, and Sprint, discussed how bare metal fits into the emerging Internet of Things. The Dec. 4-5 event was Packet’s second annual vendor-neutral infrastructure conference and ran at the same time as AW Re:Invent. A metaphor Rook used to describe bare-metal deployments for Sprint, a Packet customer, came from his daughter who had to tell her grade school class what her father did for a living: she said her father was a “machine whisperer.” Subscribe: Fireside.fm | Stitcher | Overcast | TuneIn The metaphor fits well because it aptly reflects what bare-metal machines “try to tell you,” Rook said. “An individual machine cannot tell you much, but what machines tell you only start to make sense when you do two things: Number one is you start to listen to all of them at same time, and number two is you start to learn what they tell Continue reading