Flat OSPF network, or single area OSPF networks are real. In fact most of the OSPF network today deployed, is flat OSPF networks. But how many routers can be placed safely in an OSPF area ? Any number from the real world OSPF deployment ? I will share in this post.
Let me explain what it is first and then will share you some numbers from the real network which I engaged recently.
As you might know, OSPF has two levels of hierarchy. Backbone and Non-Backbone areas.
Why Non-Backbone Areas are used in OSPF?
The reason is scalability and manageability. At least in theory. I don’t see so many multi area OSPF design though I teach in very detail in my CCDE classes. But that is for the exam purpose.
There are some very large scale networks use OSPF for scalability, so, IP but satellite (Sometimes called an Access POP) POPs are in Non-Backbone area they place.
But there is manageability aspects of having multi area OSPF design. They group their slow speed access and metro or aggregation networks in different OSPF areas and place high speed backbone/core routers in a backbone OSPF area (Area 0).
But, we generally forget Continue reading
Got an interesting set of questions from a networking engineer who got stuck with the infamous “let’s push the **** down the stack” challenge:
So I am a rather green network engineer trying to solve the typical layer two stretch problem.
I could start the usual “friends don’t let friends stretch layer-2” or “your business doesn’t really need that” windmill fight, but let’s focus on how the vendors are trying to sell him the “perfect” solution:
Read more ...“5G is an important element but it’s not the Holy Grail of IoT," said AWS IoT VP Dirk...
It’s an unfortunate reality of information security: Eventually, everyone gets compromised. Manufacturers, banks, tech support companies, retail giants, power plants, municipal governments … these are just some of the sectors that have been affected by high-profile data breaches in recent months. Everyone gets hacked. You will, too.
This isn’t cause for despair. It simply means that effective security has to focus on more than just intrusion prevention. Hackers will eventually get into any network, if they’re willing to spend enough time and money doing so. But whether or not they get anything useful once they’ve gained entry—that’s another story.
Good network design can minimize the damage incurred during an attack. There are more ways to approach this than will fit in a single article, so this blog will only focus on network segmentation, and its smaller sibling, microsegmentation.
Network segmentation is the practice of dividing a network into one or more subsections. Each subsection usually contains different kinds of resources and has different policies about who has access to that segment. There are a variety of ways to accomplish the division.
Network segmentation runs along a spectrum from the purely physical to the purely logical. The Continue reading
While the basis of the suit isn’t clear at this time, court files indicate the case may center...
Hiring women and people of color, and cutting your company’s carbon footprint are no longer just...
SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.
The post Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored) appeared first on Packet Pushers.
In a separate report, Ericsson says the global number of 5G subscriptions will top 2.6 billion by...
A recent Dell’Oro Group report forecast that the adoption of 400GbE connections is not likely to...
The new FCC order only singles out Huawei and ZTE, but the agency has also established a process to...
Keysight took a different approach to this Tech Field Day briefing and spent a lot of time talking about the current state of networking threats and the events that you are protecting against. If you aren’t aware from what your network security is doing, its an good presentation for that. Keysight has many […]
The post BIB 084 Keysight Ixia Visibility and Testing appeared first on Packet Pushers.
Today's Network Break episode discusses new data center software and switches from Extreme, new networking cloud tools from Google, Microsoft's support for DoH, an internal re-organization at Cisco and more tech news.
The post Network Break 262: Extreme Announces Fabric Automation And New Switches; Google Rolls Out Smarter Cloud Networking appeared first on Packet Pushers.
Internet from the skies: Loon, Google’s sister company, is teaming up with Internet provider Telefonica to provide Internet access to remote areas of the Amazon rainforest in Peru, TechCrunch reports. Loon, the high-altitude balloon company, plans to have the service available in 2020. The area of Peru targeted by the service has about 200,000 residents.
Internet from the highway: Meanwhile, Osceola County Schools in Florida has equipped an unused bus with computer equipment in an effort to bring Internet access to homeless students living in motels, WSBTV.com reports. The school district, south of Orlando, has about 500 students living in motels, some with limited Internet access.
Investigating encryption: A top official at the U.S. Department of Justice has hinted that end-to-end encryption services could be part of a sweeping investigation into some big tech companies, the New York Times reports. The DOJ and law enforcement agencies from other countries have been pushing large tech companies like Facebook to drop their end-to-end encryption services, to the chagrin of many security experts.
Iran shuts it down: The Iranian government shut down Internet access for citizens for several days in response to protests about huge hikes in fuel prices, CNN.com reports. Continue reading
This blog was selected as a finalist in Cisco BLOG Awards in the Best Analysis category, the category for resources that provide insightful discussions and help for networking architects around the world. Fancy right? Do you agree? Go and vote, it’s the second one on the list ? https://www.ciscofeedback.vovici.com/se/705E3ECD18791A68
The post Best Analysis Finalist – Cisco IT Blog Awards for 2019 appeared first on How Does Internet Work.
I’m running two workshops in Zurich in the next 10 days:
I published the slide deck for the NSX versus ACI workshop a few days ago (and you can already download it if you have a paid ipSpace.net subscription) and it’s full of new goodness like ACI vPod, multi-pod ACI, multi-site ACI, ACI-on-AWS, and multi-site NSX-V and NSX-T.