IDG Contributor Network: Network simulation or emulation?

As a network engineer, an improperly configured application can cost a whole lot of time and money down the line. The best way to try and prevent these unfortunate accidents is by conducting thorough and efficient testing on a routine basis. Whether designing a network, migrating to the cloud, or adding a new device to the rack, every step within the application  deployment life cycle should be validated with accurate testing.Regarding network testing, the terms emulation and simulation are often used interchangeably. In most cases, either term will generally get the point across, but there’s a big difference between a network emulator and network simulator, both practically and semantically. To read this article in full or to leave a comment, please click here

Legacy IT Sucks

In my last few blog posts, I’ve been looking back at some of the ideas that were presented at Future:Net at VMworld this year. While I’ve discussed resource contention, hardware longevity, and event open source usage, I’ve avoided one topic that I think dictates more of the way our networks are built and operated today. It has very little to do with software, merchant hardware, or even development. It’s about legacy.

They Don’t Make Them Like They Used To

Every system in production today is running some form of legacy equipment. It doesn’t have to be an old switch in a faraway branch office closet. It doesn’t have to be an old Internet router. Often, it’s a critical piece of equipment that can’t be changed or upgraded without massive complications. These legacy pieces of the organization do more to dictate IT policies than any future technology can hope to impact.

In my own career, I’ve seen this numerous times. It could be the inability to upgrade workstation operating systems because users relied on WordPerfect for document creation and legacy document storage. And new workstations wouldn’t run WordPerfect. Or perhaps it cost too much to upgrade. Here, legacy Continue reading

IDG Contributor Network: The promise of the pervasive network

The Pervasive Network is far more than a collection of technologies and processes; it is a promise to be fulfilled. A promise of delivering constant, reliable, smart, secure, intelligent and scalable bandwidth to power a future of ubiquitous IoT devices, augmented reality experiences, super smart AI systems and innovation in the form of new mobile services and applications yet to be imagined. These technologies will be the building blocks for improving the operational efficiency of every business and providing customer experiences that will make the difference in every company’s competitive position going forward.I have been on the customer and consultant side of the fence, and one thing has become clear to me: the network is not a commodity component, but a vital and strategic key to unlocking the potential of the innovation that we see in new services, experiences and opportunities.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The promise of the pervasive network

The Pervasive Network is far more than a collection of technologies and processes; it is a promise to be fulfilled. A promise of delivering constant, reliable, smart, secure, intelligent and scalable bandwidth to power a future of ubiquitous IoT devices, augmented reality experiences, super smart AI systems and innovation in the form of new mobile services and applications yet to be imagined. These technologies will be the building blocks for improving the operational efficiency of every business and providing customer experiences that will make the difference in every company’s competitive position going forward.I have been on the customer and consultant side of the fence, and one thing has become clear to me: the network is not a commodity component, but a vital and strategic key to unlocking the potential of the innovation that we see in new services, experiences and opportunities.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What’s your problem? Survey uncovers top sources of IT pain

It’s hardly surprising that IT professionals have their hands full in the age of IoT (Internet of Things) and Big Data. Supporting rapidly growing data volumes, new data types, and many more data sources is making it harder than ever for IT to meet service level agreements (SLAs) while keeping spending in check. The complexity IT manages is clear in the results of a recent Storage Census of over 300 IT professionals my company, Primary Data, conducted at VMworld 2017. The survey showcased the conflicting pressures currently faced by IT leaders. Those surveyed included delivering performance, executing data migrations, meeting expectations with existing budgets, and integrating the cloud into their infrastructure among the biggest challenges facing their departments today. Let’s examine the factors that contribute to these challenges and how IT can solve them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What’s your problem? Survey uncovers top sources of IT pain

It’s hardly surprising that IT professionals have their hands full in the age of IoT (Internet of Things) and Big Data. Supporting rapidly growing data volumes, new data types, and many more data sources is making it harder than ever for IT to meet service level agreements (SLAs) while keeping spending in check. The complexity IT manages is clear in the results of a recent Storage Census of over 300 IT professionals my company, Primary Data, conducted at VMworld 2017. The survey showcased the conflicting pressures currently faced by IT leaders. Those surveyed included delivering performance, executing data migrations, meeting expectations with existing budgets, and integrating the cloud into their infrastructure among the biggest challenges facing their departments today. Let’s examine the factors that contribute to these challenges and how IT can solve them.To read this article in full or to leave a comment, please click here

How Uber Charges You Money, But You Get No Ride

I spent part of last week in Seattle, a city known for its frequent rain. While caught in some weather with my lovely wife, we felt that grabbing an Uber was preferable to walking back to the parking garage. Being on the road, we weren’t prepared to handle a steady downpour.

I fired up the Uber app for the first time in a long time, as I’m not in need of Uber services very often. Hmm. Things had changed since the last time I hailed a ride. Some major GUI changes had happened, along with the app requesting an upfront commitment of a little cash before requesting a pickup. Um…okay. That’s new, but that makes sense. I suppose the cash commitment means that fewer people would cancel their ride after the driver accepts it, and that’s fair enough.

Here’s where it gets ugly, though. We’d hailed a ride during a rush hour in Seattle. There were a lot of cars on the streets. While it wasn’t gridlock, it was busy. An Uber driver accepted my request, and then a few moments later, I get a call. More or less, the driver said, “I’m not that close to you, and it’s Continue reading

How Uber Charges You Money, But You Get No Ride

I spent part of last week in Seattle, a city known for its frequent rain. While caught in some weather with my lovely wife, we felt that grabbing an Uber was preferable to walking back to the parking garage. Being on the road, we weren’t prepared to handle a steady downpour.

I fired up the Uber app for the first time in a long time, as I’m not in need of Uber services very often. Hmm. Things had changed since the last time I hailed a ride. Some major GUI changes had happened, along with the app requesting an upfront commitment of a little cash before requesting a pickup. Um…okay. That’s new, but that makes sense. I suppose the cash commitment means that fewer people would cancel their ride after the driver accepts it, and that’s fair enough.

Here’s where it gets ugly, though. We’d hailed a ride during a rush hour in Seattle. There were a lot of cars on the streets. While it wasn’t gridlock, it was busy. An Uber driver accepted my request, and then a few moments later, I get a call. More or less, the driver said, “I’m not that close to you, and it’s Continue reading

Technology Short Take #87

Welcome to Technology Short Take #87! I have a mix of newer and older items for you this time around. While I’m a bit short on links in some areas, hopefully this is outweighed by some good content in other areas. Here’s hoping you find something useful!

Networking

  • Vincent Bernat has a really in-depth article on IPv4 route lookup on Linux (and one on IPv6 route lookup as well).
  • Ivan Pepelnjak has a great article that tries to get to the kernel of truth in the middle of the intent-based networking hype.
  • Jason Edelman of Network2Code also has a post on intent-based network automation with Ansible, in which he breaks down the idea of intent-based networking (IBN) and how tools such as Ansible or NAPALM can make it possible.
  • From the Department of “Sitting in my Inbox for Way Too Long”, I wanted to point out a company that I ran into back in May of this year at the OpenStack Summit in Boston. The company is VirTool Networks (catchy, eh?), and their product (VirTool Network Analyzer) is aimed at providing some operational visibility into OpenStack virtual networks. I saw a demo of the product—it looks quite handy, Continue reading

Self-Driving Networks with Kireeti Kompella

A while ago I got a kind email from Kireeti Kompella, CTO @ Juniper Networks, saying “A colleague sent me an email of yours regarding SDN, the trough of disillusionment, and the rise of automation. Here's a more dramatic view: the Self-Driving Network -- one whose operation is totally automated.

Even though Software Gone Wild podcast focuses on practical ideas that you could deploy relatively soon in your network, we decided to make an exception and talk about (as one of my friends described it) a unicorn driving a flying DeLorean with a flux capacitor.

Read more ...

NAT- Network Address Translation types and configurations

Today I am going to talk about the NAT which stands for Network Address Translation of the IPs in your network. NAT is one of the most important topic of the network space and is used in almost all the enterprise networks. With the help of NAT you can save your IPs from the public domain.

Now question is Why we are in need and the purpose of NAT ?
What kinds of NAT is there, we are using ?
How configurations looks line if we are using the NAT in our networks ?
How it helps me in my network ?

I knew we have multiple questions on NAT and i also knew that many of you guys already knew about the NAT, the concept and the configuration part. This post is generally for the new comers in the network space who really want to understand the basics of it. Lets start from the beginning why and where to start from.

Why we required NAT:

Its a kind of shortage of the public IPv4 address space has forced the all of us to think harder about alternative ways of addressing networked hosts. Network Address Translation (NAT) therefore was introduced to overcome these addressing Continue reading

Cisco Intersight brings cloud management to compute

I don’t think anyone would argue with the premise that data centers have increased significantly over the past decade. Data centers used to be orderly, as each application had its own dedicated hardware and software. This was highly inefficient, but most data centers could be managed with a handful of people. Then something changed. Businesses were driven to improve the utilization of infrastructure and increase the level of agility, and along came a number of technologies such as virtualization, containers and the cloud. Also, organizations started to embrace the concept of DevOps, which necessitates a level of dynamism and speed never seen before in data centers. To read this article in full or to leave a comment, please click here

Cisco Intersight brings cloud management to compute

I don’t think anyone would argue with the premise that data centers have increased significantly over the past decade. Data centers used to be orderly, as each application had its own dedicated hardware and software. This was highly inefficient, but most data centers could be managed with a handful of people. Then something changed. Businesses were driven to improve the utilization of infrastructure and increase the level of agility, and along came a number of technologies such as virtualization, containers and the cloud. Also, organizations started to embrace the concept of DevOps, which necessitates a level of dynamism and speed never seen before in data centers. To read this article in full or to leave a comment, please click here

Mastering file searches on Linux

There are many ways to search for files on Linux systems and the commands can be very easy or very specific -- narrowing down your search criteria to find what just you're looking for and nothing else. In today's post, we're going to examine some of the most useful commands and options for your file searches. We're going to look into: quick finds more complex search criteria combining conditions reversing criteria simple vs detailed responses looking for duplicate files There are actually several useful commands for searching for files. The find command may be the most obvious, but it's not the only command or always the fastest way to find what you're looking for.To read this article in full or to leave a comment, please click here