Risk Management in Submarine Cable Systems

Risk Management in Submarine Cable System   Submarine networks carry over 99% of the world’s Intercontinental electronic communications traffic. There is misconception that Satellites carry data from continent to continent. If we ask anyone in the world, 95% of people give answer as satellites carry international traffic. This is absolutely wrong.   The Internet, International […]

The post Risk Management in Submarine Cable Systems appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Best Practices for RHV 4

Hi folks, one of the many things that I’ve been working on behind the scenes has finally seen the light of day: Best Practices for Red Hat Virtualization 4. This takes over where the product documentation leaves off.What I mean by that is this:

The product documentation is (mostly) great about telling you “how” to do the many activities related to deploying Red Hat Virtualization.

This new document tells you “why” to do many of the activities related to deploying Red Hat Virtualization. It does NOT have code examples, but it DOES have lots of things to consider. Things like:

  • “Standard” deployment or “Hosted Engine” deployment
  • RHEL host or RHV host
  • NAS or SAN
  • Lager or Ale (just kidding)

In other words, when you go to plan out your deployment, this is the document that you want to read before you paint yourself into a corner. Many of the items are best practices, like “don’t turn off SELinux”. Others are more considerations and implications, like “NAS or SAN”.

If this is something you’re interested in, you can download it here:

Best Practices for Red Hat Virtualization 4

Hope this helps,

Captain KVM

 

The post Best Practices for RHV Continue reading

Top storage certifications for IT pros

Skilled storage pros are in demand as enterprise IT teams take on exponential data growth and strategically migrate data assets from legacy systems to more modern options.For these professionals who are looking for a new job or aiming to advance in their current role, a certification could potentially differentiate them from other one candidates. And for hiring managers, certifications can help trim some of the risk from the recruitment process by validating to some extent expertise in areas such as network-attached storage, storage area networks, and storage configuration and operations management.Vendor neutral vs. vendor specificTo read this article in full or to leave a comment, please click here

Top storage certifications for IT pros

Skilled storage pros are in demand as enterprise IT teams take on exponential data growth and strategically migrate data assets from legacy systems to more modern options.For these professionals who are looking for a new job or aiming to advance in their current role, a certification could potentially differentiate them from other one candidates. And for hiring managers, certifications can help trim some of the risk from the recruitment process by validating to some extent expertise in areas such as network-attached storage, storage area networks, and storage configuration and operations management.Vendor neutral vs. vendor specificTo read this article in full or to leave a comment, please click here

Bluetooth Mesh networks: Is a standards body right for IoT innovation?

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. It is clear that the Internet of Things (IoT) is the intended market. The SIG says: Bluetooth Mesh is “ideally suited for building automation, sensor networks and other IoT solutions where tens, hundreds, or thousands of devices need to reliably and securely communicate with one another.” Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. The IoT-purpose-built Zigbee—a low-power, low-bandwidth ad hoc network—is a mesh network. Dating to 2002, Aruba Networks was founded to build Wi-Fi mesh networks. In 2014, student protesters in Hong Kong used mobile app FireChat to turn the crowd’s smartphones into a Wi-Fi and Bluetooth mesh network so authorities could not interrupt protester’s coordinating conversations by blocking 3G and 4G network access. Bluetooth Mesh has some very desirable features:To read this article in full or to leave a comment, please click here

Bluetooth Mesh networks: Is a standards body right for IoT innovation?

Earlier this week, the Bluetooth Special Interest Group (SIG) announced the Bluetooth Low Energy (BLE) standards have been extended to include mesh network features. It is clear that the Internet of Things (IoT) is the intended market. The SIG says: Bluetooth Mesh is “ideally suited for building automation, sensor networks and other IoT solutions where tens, hundreds, or thousands of devices need to reliably and securely communicate with one another.” Mesh networks are not new. It is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. The IoT-purpose-built Zigbee—a low-power, low-bandwidth ad hoc network—is a mesh network. Dating to 2002, Aruba Networks was founded to build Wi-Fi mesh networks. In 2014, student protesters in Hong Kong used mobile app FireChat to turn the crowd’s smartphones into a Wi-Fi and Bluetooth mesh network so authorities could not interrupt protester’s coordinating conversations by blocking 3G and 4G network access. Bluetooth Mesh has some very desirable features:To read this article in full or to leave a comment, please click here

Juniper Q-fabric Solution

Today I am going to talk about the Juniper Q-Fabric solution which is an alternate approach to the Cisco SDA - Software Defined Access solution in the market. If you check the SDA in detail, Cisco uses Fabric network and on the top of it they are using LISP and VXLAN in the campus environment as a overlay protocols. On top of it there is Automation, Analytics and Authentication which is then connected via different APIs in the network.

Let's talk about the Q-fabric which is introduced by Juniper in the market. The so called Q-fabric of juniper is composed of multiple components working together as a single switch to provide high-performance, any-to-any connectivity and management simplicity in the data center or in the campus as well that depends where the requirement actually have.

QFabric System flattens the entire data center network to a single tier where all access points are equal, eliminating the effects of network locality and making it the ideal network foundation for cloud-ready, virtualized data centers.

With the help of QFabric System you can actually improves application performance with low latency and converged services in a nonblocking, lossless architecture that supports Layer 2, Layer 3, Continue reading

RFC 8196: IS-IS Autoconfiguration

Finally a group of engineers figured out it’s a good idea to make things less complex instead of heaping layers of complexity on top of already-complex kludges.

RFC 8196 specifies default values and extensions to IS-IS that make it a true plug-and-play routing protocol. I wonder when we’ll see it implemented now that everyone is obsessed with intent-based hype.