Archive

Category Archives for "Networking"

Kubernetes Opportunities, Challenges Escalated in 2019

The past year was highlighted by ongoing security and commercialization challenges around business...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Choosing SD-WAN Vendor – Have You Found the Tradeoff?

When I studied for my CCDE, I had the good fortune of receiving mentoring from Russ White. Something he taught me, that I really took to heart, is that in every design and choice you make, there is a tradeoff.

If you haven’t found the tradeoff, you haven’t looked hard enough.

From a SD-WAN perspective, in selecting your vendor of choice, what does that mean?

SD-WAN vendors, for a loose definition of SD-WAN, come mainly from three different camps:

  • Router vendor
  • Firewall vendor
  • WAN optimization vendor

There are also vendors that were born in the SD-WAN era and have no previous background.

Cisco of course, through the acquisition of Viptela, bought a company that was very strong in routing, control- and data plane design. A solution designed by Architects/Engineers with profound experience of large scale networking, from large enterprises and service providers. Viptela was born in the SD-WAN era, with no legacy platforms or products to take into consideration. With the background of Viptela, this means that this is a SD-WAN product where the main strength is on routing, separation of control- and data plane, and the flexibility of the product. Other vendors with the same background will also likely Continue reading

Broadband RF scanner

One great thing about software defined radio is that you can become less blind to the invisible world of radio waves that’s all around us. One simple thing is to do a survey of the spectrum, to see what parts are busy.

More practically you can also use this to find which Wifi channels are least busy, so that you can get optimal performance on your network. Counting the number of networks is not a good indicator, since one network may be completely unused, while another is used 24/7 to stream Netflix. And some networks are hidden anyway, making them no more secure, but more annoying.

[GNU Radio][gnuradio] has a bunch of building blocks for some interactive peeking at spectrums, but there’s still some assembly required in order to make actually useful things.

To do a survey I used a USRP B200 with a [broadband spiral antenna. If you’re only interested in the Wifi spectrum then a 2.4/5GHz antenna is a better choice.

You can probably use a cheaper SDR, but you need to make sure it sends frequency tag updates in GNU Radio, so the block knows which frequency is tuned, as it moves across the spectrum.

Overall Continue reading

Day Two Cloud 029: Kubernetes Needs To Disappear

This is a special holiday episode of Day Two Cloud with guest Kelsey Hightower, a Kubernetes evangelist and contributor. We discuss the current state of Kubernetes and the future for this orchestration platform, including how it will address networking, should you get certified, and will Kubernetes eventually fade into the background as hidden infrastructure you don't have to think about so much.

Day Two Cloud 029: Kubernetes Needs To Disappear

This is a special holiday episode of Day Two Cloud with guest Kelsey Hightower, a Kubernetes evangelist and contributor. We discuss the current state of Kubernetes and the future for this orchestration platform, including how it will address networking, should you get certified, and will Kubernetes eventually fade into the background as hidden infrastructure you don't have to think about so much.

The post Day Two Cloud 029: Kubernetes Needs To Disappear appeared first on Packet Pushers.

Merry Christmas and Happy New Year 2020!

Dear friend,

The year 2019 is almost over and it is a time to sincerely thank you for the time you spend reading this blog, for all your questions, ideas and suggestions. All these things gives us inspiration to continue blogging about new things for you, dear friend!

We wish you jolly time over the holidays period with your families and friends. We wish you to achieve all your professional and personal goals in 2020! Let the year be successful for you and your loved ones!

Merry Christmas and Happy New 2020 Year!

BR, Anton

This holiday’s biggest online shopping day was… Black Friday

This holiday's biggest online shopping day was... Black Friday

What’s the biggest day of the holiday season for holiday shopping? Black Friday, the day after US Thanksgiving, has been embraced globally as the day retail stores announce their sales. But it was believed that the following Monday, dubbed “Cyber Monday,” may be even bigger. Or, with the explosion of reliable 2-day and even 1-day shipping, maybe another day closer to Christmas has taken the crown. At Cloudflare, we aimed to answer this question for the 2019 holiday shopping season.

Black Friday was the biggest online shopping day but the second biggest wasn't Cyber Monday... it was Thanksgiving Day itself (the day before Black Friday!). Cyber Monday was the fourth biggest day.

Here's a look at checkout events seen across Cloudflare's network since before Thanksgiving in the US.

This holiday's biggest online shopping day was... Black Friday
Checkout events as a percentage of checkouts on Black Friday

The weekends are shown in yellow and Black Friday and Cyber Monday are shown in green. You can see that checkouts ramped up during Thanksgiving week and then continued through the weekend into Cyber Monday.

Black Friday had twice the number of checkouts as the preceding Friday and the entire Thanksgiving week dominates. Post-Cyber Monday, no day reached 50% of the Continue reading

Lessons Learned from the Multistakeholder Process in the Philippines

In 2018, we began collaborating with the Philippines’ Department of Information and Communications Technology (DICT) to develop the country’s National ICT Ecosystem Framework (NICTEF), a successor to the Philippine Digital Strategy for 2011-2016.

The DICT, like all Philippine government agencies, is mandated by law to hold open consultations as a means of improving transparency and encouraging public involvement in the policymaking process. But it took this initiative further by ensuring that NICTEF is fully reflective of the needs and priorities of different sectors across the archipelago. For one year, the DICT led capacity building workshops, focus group discussions, writeshops, an online public survey, and regional consultations in each of the country’s major island groups, localizing the multistakeholder approach in the process to reach important and difficult decisions.

The NICTEF is now an authoritative guide on the Philippines’ digital ecosystem, and a roadmap to harmonize and coordinate the country’s ICT programs. The multistakeholder process adopted by NICTEF has been documented in a case study, offering other countries in the region a reference in developing public policies that are forward-thinking, inclusive, and suited to the needs of a steadily-interconnected world.

Below are some of our key takeaways from the process:

Develop Continue reading

Chipmakers’ Biggest Buys and Sells of 2019

Billions of dollars changed hands this year as industry giants attempted to bolster their positions...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Unix is turning 50. What does that mean?

2020 is a significant year for Unix. At the very start of the year, Unix turns 50.While some of the early development of Unix predates the official start of its "epoch," Jan 1, 1970 remains the zero-point in POSIX time and the recognized beginning of all things Unix. Jan 1, 2020 will mark 50 years since that moment.Unix time vs human time In terms of human time, 50 years is a big deal. In terms of Unix time, there's nothing particularly special about 50 years. 48.7 years would be no less significant.Unix (including Linux) systems store date/time values as the number of seconds that have elapsed since 1970-01-01 00:00:00 UTC in 32 bits. To determine how many seconds have passed since that time and, thus, what right now looks like as a Unix time value, you can issue a command like this:To read this article in full, please click here

Matt Oswalt – Portfolio

Short Bio Matt Oswalt hails from Portland, OR, and focuses on the intersection of network infrastructure, automation, systems, and software engineering. He’s passionate about enabling engineers to evolve their careers to the next level, and sharing the bright spots that exist within the technology industry with the masses. You can often find him speaking at conferences or meetups about these topics, as well as writing about them on his blog (https://keepingitclassless.

About Matt

My name is Matt Oswalt, and I have a fairly eclectic background. When I was 14, I created my first program - an alien shooter on my TI-82 calculator. Since then, I’ve enjoyed building new things and showing them to anyone who will listen. This passion continues to this day, as you’ll find with projects like ToDD and NRE Labs, I just really enjoy building cool stuff. You can explore these and all my other open source projects on my GitHub profile.

The Bookshelf

I am a big fan of Audible for books. Every once in a while I have time and patience to read a physical book, but often times I find myself needing to do things like washing dishes, going on a long walk or drive, and Audible has made it so much easier for me to get back into “reading”. Since I started doing this, I’d like to share the books that I’ve been able to get through this way.

DC. Part 16. Microsoft Azure SONiC on the Mellanox switches in data centre (with Cisco XR an Nokia SR OS for inter-OP).

Hello my friend,

The Christmas and New Year is coming, so it is typically the time to think about the future and plan ahead. And today we look into future by reviewing the new network operation system deployed in the data centres hosting Microsoft Azure clouds. This operation system is called SONiC: Software for Open Networking in the Cloud. 


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Discalimer

If you even more interested in your future, join our network automation training we start on 18th and 22nd of January, where we cover the details of the data modelling, NETCONF/YANG, REST API, Python and Ansible in the multivendor environment with Cisco, Nokia, Arista and Cumulus Linux as network functions.

Thanks

Special thanks for Avi Alkobi from Mellanox for providing me the Mellanox SN2010 for tests and initial documentation for Microsoft Azure SONiC setup.

Brief description

Everyone talks about the clouds. You can hear about public clouds, private clouds, hybrid clouds, clouds interconnection Continue reading

5G Gains US Foothold in 2019

5G is available from sea to shining sea — with many pockets of 4G LTE remaining in between.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Warns About Ongoing Security Exploit

The bug was initially spotted by Cisco in June 2018 and given a “critical” rating.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IDG Contributor Network: Recent VPN hacks reveal transparency issues within the industry and its supply chain

Consumers are no doubt becoming increasingly aware about the safety and security of their online activity after many highly publicized studies have shown an uptick in online data theft. According to the Federal Trade Commission, there were 3 million reports of identity theft alone in 2018.Even though these threats — and the rash of data breaches — continue to grab headlines, consumers still are connecting to public wifi despite the threats and are joining other unsafe networks while traveling. More cautious or tech-savvy individuals know to turn to virtual private networks (VPNs) as a way to safely connect online, and as VPNs become more mainstream, some project the VPN market can grow to more than $35 billion by 2022. We’ve even seen some vendors to capitalize by creating flashy TV commercials that insinuate that they are consumers’ digital doorman. To read this article in full, please click here