Late last month Cisco announced it had 20,000 SD-WAN customers spread across its Viptela and...
One of the common starting points during the IT architecture process is trying to define and identify tenancy. Part of the problem is that the term “tenant” has various definitions depending on the business unit. As a network engineer, I don’t care about one of those definitions of the word: “Layer 3 subnet isolation with a unified set of routing and security policies.” Trying to communicate that to technical leaders in other IT organizations is hard enough, but trying to communicate this to a non-technical business leader can feel like an impossible task.
The goal then becomes trying to distill the complexities of a tenant into a consumable morsel.
In my most recent consulting engagement, I worked with a company that had three key players during the design stage:
We kept using the word “tenancy” thinking we were speaking the same language , but we slowly realized that we weren’t speaking with the same definitions. In my network-first definition, I only cared about the subnets allocated to the servers and whether the servers were able to talk to each other. From my definition of tenancy, any server allocated to a tenant Continue reading
Open source software has had a significant influence on the tech career of today's Full Stack Journey podcast guest, Matt Broberg. We discuss why open source has been so influential, the importance of community in IT, and topics such as how to stay technical when your role changes, and why business fundamentals should matter to technologists.
The post Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg appeared first on Packet Pushers.
“AWS has not copied anybody’s software or services," wrote Andi Gutmans, VP for analytics and...
Cisco has been battling Chinese manufacturers over the sale of spurious versions of its products...
The chipmaker issued a patch for the vulnerability, which could allow attackers to change...
The growing complexity of IT environments make it harder for SecOps teams to keep pace with developers, manage access to resources, and ensure that the right controls are in place and policies are met. Sponsor Tufin joins the Heavy Networking podcast to discuss how automation can boost SecOps effectiveness while tackling initiatives such as zero trust and network segmentation on premises and in the cloud.
The post Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored) appeared first on Packet Pushers.
Hear from Corsa's Eduardo Cervantes and his thoughts on security, the data explosion, and why...
BGP PIC ( Prefix Independent Convergence ) is a BGP Fast reroute mechanism which can provides sub second convergence even for the 500K internet prefixes by taking help of IGP convergence.
BGP PIC uses hierarchical data plane in contrast to flat FIB (Forwarding table) design which is used by Cisco CEF and many legacy platforms.
In a hierarchical dataplane , the FIB used by the packet processing engine reflects recursions between the routes.
I will explain the recursion concept throughout the post so don’t worry about the above sentence, it will make sense.
There are two implementation of BGP PIC concept and they can protect the network traffic from multiple failures.
Link, node in the core or edge of the network can be recovered under a second and most of the case under 100ms ( It mostly depends on IGP convergence, so IGP should be tuned or IGP FRR can be used ).
In this article I will not explained IGP fast convergence or IGP Fast reroute but you can read my Fast reroute mechanism article from here.
BGP PIC can be thought as BGP Fast Reroute Mechanism which relies on IGP convergence for the failure detection. ( All overlay Continue reading
[Published on behalf of the Internet Society Board of Trustees.]
The Internet Society’s vision is that the Internet is for everyone. Earlier this month, we wrote about our efforts to ensure a stable and diverse funding model to support the work that takes us towards our vision. The role of the Board of Trustees is to provide, with support from the community, the strategic direction for that work. In this post, we discuss our recent and current strategic efforts, put them into context, and provide pointers with more information for our community to get involved in defining our wanted future.
Naturally, the starting point of our current strategy was to agree with the community on the overall direction. Therefore, two years ago, during 2017, the Board consulted with our community to revise our mission statement into what we have today. Many of you contributed to that 2017 effort, which resulted in the following three focus areas:
Based on that community agreement on the development of this new mission, the Continue reading
I always tell attendees in the Building Network Automation Solutions to create minimalistic data models with (preferably) no redundant information. Not surprisingly, that’s a really hard task (see this article for an example) - using a simple automation tool like Ansible you end with either a messy and redundant data model or Jinja2 templates (or Ansible playbooks) full of hard-to-understand and impossible-to-maintain business logic.
Read more ...Palo Alto Networks and Google Cloud pledged to jointly develop a new multi-cloud security framework...
Former co-CEO Mark Hurd passed away in October. Safra Catz will take on sole leadership at...
Download Edge Networking's Role in 5G Monetization to see the role edge networking plays in service...
Cockroach Labs' cloud report measured AWS, GCP, and Azure, on CPU, network, and storage I/O,...