Introduction to Multi-Chassis Link Aggregation

Today I am going to talk about another technology named as Multi-Chassis Link Aggregation which is generally used is many of the vendors like Juniper, Arista Networks and so on. Here in this article I am going to have discussion with respect to Arista Networks.

As i said, before i will start with the Multi-Chassis Link Aggregation, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Now the question is what is Multi-Chassis Link Aggregation ?
A multi-chassis link aggregation group (MLAG) is a pair of links that terminate on two cooperating switches and appear as an ordinary link aggregation group (LAG). The cooperating switches are MLAG peer switches and communicate through an interface called a peer link. 

While the peer link’s primary purpose is exchanging MLAG control information between peer switches, it also carries data traffic from devices that are attached to only one MLAG peer and Continue reading

Introduction to Multi-chassis EtherChannel(MEC) in Cisco Switches

Today I am going to talk about the technology used in the enterprise or the datacenter environment for various vendors in the market. Starting from the Multi-chassis EtherChannel (MEC), Multi-chassis EtherChannel is generally used in the Cisco technology with the VSS.

Before I start with the Multichassis EtherChannel, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Multi-Chassis EtherChannel
 Multi-chassis EtherChannel (MEC) is a Layer 2 multipathing technology. This form of EtherChannel  allows a connected node to terminate the EtherChannel across the two physical Cisco Catalyst 6500/6800 Series Switches that make up the VSS leading to creating simplified loop-free Layer 2 topology. 

Cisco’s Multi-chassis EtherChannel (MCEC) solution addresses the need for inter-chassis redundancy mechanisms, where a carrier wants to “dual home” a device to two upstream points of attachment (PoAs) for redundancy 

Fig 1.1- Multi-Chassis Ether-Channel with DSLAM in MPLS and VPLS environment

Terminology Tuesday Presents: Data Gravity

Data Gravity is a concept first coined by Dave McCrory to describe the tendency of data to attract more data, applications and services.  As you may have guessed from the name, this principle has many parallels to Newton’s Theory of Universal Gravitation.

 

The basic premise is that a singular piece of data isn’t meaningful but with more data (metadata as it’s generally called) additional context (and therefore more meaning) can be derived.  When all that data is bundled with more applications and services, one can harness a considerable amount of power as evidenced by today’s trends towards data and analytics.

 

For example, let’s take this piece of data: 0.  Although we know what zero means conceptually, we don’t have any way to determine how we should feel about it.  Without any context just knowing the number 0 is essentially worthless.  If, for instance you were to know the additional data of “inventory of toy Elmos” + [insert where you live] you’d know that you need to make an only order and ASAP.

 

Data for larger institutions is just like this, except the concept of “friction” plays a larger role.  Data Friction Continue reading

Bitcoin: In Crypto We Trust

Tim Wu, who coined "net neutrality", has written an op-ed on the New York Times called "The Bitcoin Boom: In Code We Trust". He is wrong is wrong about "code".

The wrong "trust"

Wu builds a big manifesto about how real-world institutions aren't can't be trusted. Certainly, this reflects the rhetoric from a vocal wing of Bitcoin fanatics, but it's not the Bitcoin manifesto.

Instead, the word "trust" in the Bitcoin paper is much narrower, referring to how online merchants can't trust credit-cards (for example). When I bought school supplies for my niece when she studied in Canada, the online site wouldn't accept my U.S. credit card. They didn't trust my credit card. However, they trusted my Bitcoin, so I used that payment method instead, and succeeded in the purchase.

Real-world currencies like dollars are tethered to the real-world, which means no single transaction can be trusted, because "they" (the credit-card company, the courts, etc.) may decide to reverse the transaction. The manifesto behind Bitcoin is that a transaction cannot be reversed -- and thus, can always be trusted.

Deliberately confusing the micro-trust in a transaction and macro-trust in banks and governments is a sort of Continue reading

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time. I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source.

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time. I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source.

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time.

I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source. I feel like going in with the right expectations can really help any efforts here go much more smoothly. So if you’re accustomed to getting most if not all of your technology stack from a vendor, and you’re wondering about the open source craze, and trying to make sense of it all, this is for you. My goal with this post is to empower you to start getting out there and exploring the various communities behind the projects you may already have your eyes on.

Open Source is “Free as in Puppy”

Before some practical tips, I want to spend some time on expectations. This is crucially important Continue reading

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time.

I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source. I feel like going in with the right expectations can really help any efforts here go much more smoothly. So if you’re accustomed to getting most if not all of your technology stack from a vendor, and you’re wondering about the open source craze, and trying to make sense of it all, this is for you. My goal with this post is to empower you to start getting out there and exploring the various communities behind the projects you may already have your eyes on.

Open Source is “Free as in Puppy”

Before some practical tips, I want to spend some time on expectations. This is crucially important Continue reading

What is a hypervisor?

Hypervisors often get overlooked as a technology in favor of the flashier concept of virtualization, but you can’t get to the fun of virtualization until you understand what a hypervisor does within a computing system.While the benefits of virtualization and cloud computing may now seem like old hat within the IT infrastructure, that wasn’t always the case, and it is hypervisor technology that has helped drive innovation in the world of cloud computing.Hypervisor definition A hypervisor is a process that separates a computer’s operating system and applications from the underlying physical hardware. Usually done as software although embedded hypervisors can be created for things like mobile devices.To read this article in full, please click here

What is a hypervisor?

Hypervisors often get overlooked as a technology in favor of the flashier concept of virtualization, but you can’t get to the fun of virtualization until you understand what a hypervisor does within a computing system.While the benefits of virtualization and cloud computing may now seem like old hat within the IT infrastructure, that wasn’t always the case, and it is hypervisor technology that has helped drive innovation in the world of cloud computing.Hypervisor definition A hypervisor is a process that separates a computer’s operating system and applications from the underlying physical hardware. Usually done as software although embedded hypervisors can be created for things like mobile devices.To read this article in full, please click here

BrandPost: SD-WAN: Why DIY + Co-Managed Approach is a Win-Win

The SD-WAN market continues to experience phenomenal growth. A September 2017 IDC SD-WAN survey highlights that 75 percent of U.S. enterprises plan to adopt an SD-WAN solution in the next two years. Enterprises are eager to embrace and deploy SD-WAN solutions because they provide many important benefits such as improving network and application performance and availability, reducing branch office complexity, lowering bandwidth and operational costs, and improving the performance of directly connecting users from branch locations to cloud-native applications.Today, enterprises implementing an SD-WAN solution can choose between a do-it-yourself (DIY) approach or selecting a managed SD-WAN service from a managed service provider (MSP). The DIY approach is appealing to enterprises that have in-house expertise in managing their WAN network environment and have invested the time to evaluate and select an SD-WAN solution that addresses their connectivity requirements. In this model, enterprises procure, own, deploy and manage the SD-WAN equipment, software and network connectivity in-house.To read this article in full, please click here

IDG Contributor Network: Debunking today’s dominant automation myths

Automation is dominating a significant portion of the conversations trending among IT professionals. To those working in the industry, this comes as no surprise – the topic is not a new one. More and more enterprises are adopting automation as it quickly transforms from a luxury to a necessity.However, while there are well-defined benefits associated with automation, there are also important questions and misconceptions that remain. Smart IT teams must evaluate and analyze the pros, cons and impact of automation in their unique enterprise before moving forward.  The first step is debunking the most common automation myths with the facts.Myth: automation will completely replace jobs and employees This tops the list of the most significant automation myths. Some research studies do suggest that automation (especially in the form of robotics and artificial intelligence) will completely replace human jobs. This misconception must be clarified once and for all. There is no doubt that automation will have a noticeable impact on human jobs, but we can rest assured it will not replace them completely. Automation is assigning everyday tasks to computers to free up time for humans to be more creative and strategic.  This takes the meticulous tasks that Continue reading

IDG Contributor Network: Debunking today’s dominant automation myths

Automation is dominating a significant portion of the conversations trending among IT professionals. To those working in the industry, this comes as no surprise – the topic is not a new one. More and more enterprises are adopting automation as it quickly transforms from a luxury to a necessity.However, while there are well-defined benefits associated with automation, there are also important questions and misconceptions that remain. Smart IT teams must evaluate and analyze the pros, cons and impact of automation in their unique enterprise before moving forward.  The first step is debunking the most common automation myths with the facts.Myth: automation will completely replace jobs and employees This tops the list of the most significant automation myths. Some research studies do suggest that automation (especially in the form of robotics and artificial intelligence) will completely replace human jobs. This misconception must be clarified once and for all. There is no doubt that automation will have a noticeable impact on human jobs, but we can rest assured it will not replace them completely. Automation is assigning everyday tasks to computers to free up time for humans to be more creative and strategic.  This takes the meticulous tasks that Continue reading