Archive

Category Archives for "Networking"

Flat/Single Area OSPF network is not a problem!

Flat OSPF network, or single area OSPF networks are real. In fact most of the OSPF network today deployed, is flat OSPF networks. But how many routers can be placed safely in an OSPF area ? Any number from the real world OSPF deployment ? I will share in this post.

Let me explain what it is first and then will share you some numbers from the real network which I engaged recently.

As you might know, OSPF has two levels of hierarchy. Backbone and Non-Backbone areas.

 

Why Non-Backbone Areas are used in OSPF?

 

The reason is scalability and manageability. At least in theory. I don’t see so many multi area OSPF design though I teach in very detail in my CCDE classes. But that is for the exam purpose.

There are some very large scale networks use OSPF for scalability, so, IP but satellite (Sometimes called an Access POP) POPs are in Non-Backbone area they place.

But there is manageability aspects of having multi area OSPF design. They group their slow speed access and metro or aggregation networks in different OSPF areas and place high speed backbone/core routers in a backbone OSPF area (Area 0).

But, we generally forget Continue reading

The EVPN Dilemma

Got an interesting set of questions from a networking engineer who got stuck with the infamous “let’s push the **** down the stack” challenge:

So I am a rather green network engineer trying to solve the typical layer two stretch problem.

I could start the usual “friends don’t let friends stretch layer-2” or “your business doesn’t really need that” windmill fight, but let’s focus on how the vendors are trying to sell him the “perfect” solution:

Read more ...

How cloud providers’ performance differs

Not all public cloud service providers are the same when it comes to network performance.Each one’s connectivity approach varies, which causes geographical discrepancies in network performance and predictability. As businesses consider moving to the cloud, especially software-defined wide-area networks (SD-WAN) and multi-cloud, it’s important to understand what each public cloud service provider brings to the table and how they compare.To read this article in full, please click here

AWS: 5G Is ‘Not the Holy Grail of IoT’

“5G is an important element but it’s not the Holy Grail of IoT," said AWS IoT VP Dirk...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Prevent lateral compromise with microsegmentation

It’s an unfortunate reality of information security: Eventually, everyone gets compromised. Manufacturers, banks, tech support companies, retail giants, power plants, municipal governments … these are just some of the sectors that have been affected by high-profile data breaches in recent months. Everyone gets hacked. You will, too.

This isn’t cause for despair. It simply means that effective security has to focus on more than just intrusion prevention. Hackers will eventually get into any network, if they’re willing to spend enough time and money doing so. But whether or not they get anything useful once they’ve gained entry—that’s another story.

Good network design can minimize the damage incurred during an attack. There are more ways to approach this than will fit in a single article, so this blog will only focus on network segmentation, and its smaller sibling, microsegmentation.

What is network segmentation?

Network segmentation is the practice of dividing a network into one or more subsections. Each subsection usually contains different kinds of resources and has different policies about who has access to that segment. There are a variety of ways to accomplish the division.

Network segmentation runs along a spectrum from the purely physical to the purely logical. The Continue reading

IDG Contributor Network: SASE: Redefining the network and security architecture

In a cloud-centric world, users and devices require access to services everywhere. The focal point has changed. Now it is the identity of the user and device as opposed to the traditional model that focused solely on the data center. As a result, these environmental changes have created a new landscape that we need to protect and connect.This new landscape is challenged by many common problems. The enterprises are loaded with complexity and overhead due to deployed appliances for different technology stacks. The legacy network and security designs increase latency. In addition, the world is encrypted; this dimension needs to be inspected carefully, without degrading the application performance.To read this article in full, please click here

Amazon Challenges Pentagon’s $10B JEDI Award

While the basis of the suit isn’t clear at this time, court files indicate the case may center...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Dell Tech’s 2030 Goals Show Social Impact Makes Business Sense

Hiring women and people of color, and cutting your company’s carbon footprint are no longer just...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

The post Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored) appeared first on Packet Pushers.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

5G NR Demand Skyrockets RAN Market, Dell’Oro Says

In a separate report, Ericsson says the global number of 5G subscriptions will top 2.6 billion by...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T, Juniper Claim 400GbE ‘Firsts’

A recent Dell’Oro Group report forecast that the adoption of 400GbE connections is not likely to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

FCC Bans Huawei, ZTE From USF-Funded Projects

The new FCC order only singles out Huawei and ZTE, but the agency has also established a process to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BIB 084 Keysight Ixia Visibility and Testing

Keysight took a different approach to this Tech Field Day briefing and spent a lot of time talking about the current state of networking threats and the events that you are protecting against. If you aren’t aware from what your network security is doing, its an good presentation for that.     Keysight has many […]

The post BIB 084 Keysight Ixia Visibility and Testing appeared first on Packet Pushers.

Network Break 262: Extreme Announces Fabric Automation And New Switches; Google Rolls Out Smarter Cloud Networking

Today's Network Break episode discusses new data center software and switches from Extreme, new networking cloud tools from Google, Microsoft's support for DoH, an internal re-organization at Cisco and more tech news.

The post Network Break 262: Extreme Announces Fabric Automation And New Switches; Google Rolls Out Smarter Cloud Networking appeared first on Packet Pushers.

The Week in Internet News: Balloon-Based Internet Comes to the Amazon

Internet from the skies: Loon, Google’s sister company, is teaming up with Internet provider Telefonica to provide Internet access to remote areas of the Amazon rainforest in Peru, TechCrunch reports. Loon, the high-altitude balloon company, plans to have the service available in 2020. The area of Peru targeted by the service has about 200,000 residents.

Internet from the highway: Meanwhile, Osceola County Schools in Florida has equipped an unused bus with computer equipment in an effort to bring Internet access to homeless students living in motels, WSBTV.com reports. The school district, south of Orlando, has about 500 students living in motels, some with limited Internet access.

Investigating encryption: A top official at the U.S. Department of Justice has hinted that end-to-end encryption services could be part of a sweeping investigation into some big tech companies, the New York Times reports. The DOJ and law enforcement agencies from other countries have been pushing large tech companies like Facebook to drop their end-to-end encryption services, to the chagrin of many security experts.

Iran shuts it down: The Iranian government shut down Internet access for citizens for several days in response to protests about huge hikes in fuel prices, CNN.com reports. Continue reading

Best Analysis Finalist – Cisco IT Blog Awards for 2019

This blog was selected as a finalist in Cisco BLOG Awards in the Best Analysis category, the category for resources that provide insightful discussions and help for networking architects around the world. Fancy right? Do you agree? Go and vote, it’s the second one on the list ? https://www.ciscofeedback.vovici.com/se/705E3ECD18791A68

The post Best Analysis Finalist – Cisco IT Blog Awards for 2019 appeared first on How Does Internet Work.

Upcoming Workshops: NSX, ACI, VXLAN, EVPN, DCI and More

I’m running two workshops in Zurich in the next 10 days:

I published the slide deck for the NSX versus ACI workshop a few days ago (and you can already download it if you have a paid ipSpace.net subscription) and it’s full of new goodness like ACI vPod, multi-pod ACI, multi-site ACI, ACI-on-AWS, and multi-site NSX-V and NSX-T.