10 Hyperconvergence Vendors Setting the Pace
Hyperconverged infrastructure is hot. Here are some of the companies leading the charge.
Hyperconverged infrastructure is hot. Here are some of the companies leading the charge.
The companies also plan to build a joint security product.
![]() |
| Fig 1.1- Multicast Vs Unicast |
![]() |
| Fig 1.1- DNS |
![]() |
| Fig 1.1- Sample DHCP request |
![]() |
| Fig1.2 - Sample DHCP Response |
Hi,
We have seen how iBGP was used to do the IP Clos with a RR Setup, how about eBGP.
Configurations / EVE Topology – https://github.com/r2079/JDC
Two simple rules
Here is the topology.
The picture says 1000 words here – How the physical links are connected that’s how the bgp flows.
Lets see the BGP Status on R1 and R2
Since the hurdles of multipath has been explained. The use ADD-Path is not required here, instead since the update comes from Different AS numbers (R4 and R5) giving out the same update, we have to use another knob called MULTIPLEAS. This has to be on all Spine and leaf devices so that proper Load Balancing can be done along with EXPORTLB policy in the forwarding table.
Lets see one of the routers
Verification from R6
Regards
Rakesh
In case you’re not familiar with RFC 1925, its Rule 5 states:
It is always possible to agglutinate multiple separate problems into a single complex interdependent solution. In most cases this is a bad idea.
Most routing protocols are a perfect demonstration of this rule.
Read more ...
It combines Lanner’s uCPE appliances and 128 Technology’s routing software.
Managing an organization’s many tools and business processes is becoming increasingly complicated as technology expands. Whether your teams are performing their weekly system reboot, or looking to configure instances to a desired state, it’s no secret that automation is critical to increase speed, efficiency, productivity, and accuracy. Listed below are several instances1 where automation can help across your enterprise.
This is the first post of a series on the persona between “network engineer” and “developer”. This role does not exist in myth, but it is a natural evolutionary step forwards. This position inherits skills from both ends of the scale, but in itself is an emerging role in organisations globally.
Why describe personas? They are important because:
1. They provide a roadmap for a career
2. They provide a set of skill requirements to master for a role matching the persona
3. They provide a set of tool consumption and usage hints
4. They provide a viewing glass to defining thought processes
Some of the challenges both vendors and network technology consumers are facing today are related to the set of evolving personas in our field, therefore it’s crucial to understand them properly. Remember when you wanted to be a network engineer? You became the persona and worked your way through a set of learnings. Your thoughts and habits changed, along with your recognition and self awareness.
Every industry evolves and some industries disappear. The need to move packets about on the Internet hasn’t evolved out of existence just yet; our current highly generalized reality is: Continue reading
About a year ago, Internet Society partnered with its Georgian Chapter, Small and Medium Telecom Operators Association of Georgia, Freenet LTD Association, Internet Development Initiative and Tusheti Development Fund to help the remote and mountainous region of Tusheti to build access to the Internet. The network was recently completed as a true community effort and became fully operational in August.
Impact
When the Internet Society team visited the village of Omalo in Tusheti two weeks ago for an official launch ceremony, the Internet speeds measured at 4-5 Mbps. A dramatic change to a region, where many villages are not even covered by mobile signal!
During our brief stay in Omalo the impact of the newly established Internet connection was not evident at first glance. Apart from a couple of visible repeaters on the surrounding mountains, people were getting on with their usual daily chores while a group of tourists travelled past on horseback. The local community, however, was exuding a sense of achievement and optimism. The recently established Internet access opens new opportunities for tourism and cultural preservation, and provides an essential communication channel for healthcare and potential emergency situations.
Partnership
The engine behind this effort was a solid Continue reading
SDAN is targeted at greater control over network access resources.
Companies can deploy entry-level cloud object storage systems with the ability to scale.
Challenge will be in garnering attention from developers.

Last week I published an article called Making a Clickable HTML Network Diagram using OmniGraffle. One of the questions I was asked was whether I’d tried doing the same in draw.io or Gliffy. I have not, although I do use Gliffy a fair amount, and I have dabbled with draw.io.
Thankfully, Keith Miller (@packetologist) is on hand to provide the answer! Keith has put together an article mirroring a similar process using the free (and platform-agnostic) draw.io. Definitely worth a read, and a great example of a free tool making our lives way easier.
Link: CLICKABLE HTML NETWORK DIAGRAMS WITH DRAW.IO
Thanks, Keith for the excellent demonstration!
If you liked this post, please do click through to the source at Microburst: Update on the HTML Home Network Diagram and give me a share/like. Thank you!
Where’s Russ?
This is my second week of PhD seminars this fall—the only time in this program I intend to take two seminars back to back. One of the two was, in fact, very deep philosophy, so I was pretty taxed trying to pull the material together.
At the same time, the book has passed through technical review, and is now in author review. I hope it soon be in proofs. The combination of these two things, the book and the PhD work, along with multiple other things, is what caused me to call a pause in blogging for these two weeks. The date to watch is the 29th of December. It might be released earlier, but it is hard to tell right now. I will do a post a little later this week describing the book for those who are interested.
Tonight (Monday) I will be recording a new Network Collective show on the Intermediate System to Intermediate System (IS-IS) protocol, and we have a long list of History of Networking guests to bring on. The history material has turned out to be absolutely fascinating; I am thankful we have the connections available, and the recording venue, and someone Continue reading
Maybe programming will look something like the above video. Humans and AIs working together to produce software better than either can separately.
The computer as a creative agent, working in tandem with a human partner, to produce software, in a beautiful act of co-creation.
The alternative vision—The Coming Software Apocalypse—is a dead end. Better requirements and better tools have already been tried and found wanting. Requirements are a trap. They don't work. Requirements are no less complex and undiscoverable than code. Tools are another trap. Tools are just code that encode an inflexible solution to a problem that's already been solved.
Admittedly, I'm cheating. I have no idea how any of this will work, but here are the seeds of how it has already started:
Here's what we do know: neither tools or requirements are a silver bullet, they are a method of incrementally improving software quality. Software production quantity is not increased at all.
What we need is a manufacturing process that puts software production on an exponential curve. The only conceivable tool we have at Continue reading