IPv6 Link-Local Addresses and VLAN Interfaces

One of my readers sent me an email that’s easiest paraphrased into: “Why can’t I have a different IPv6 link-local address (LLA) on every access port connected to a VLAN interface?

There’s probably nothing stopping someone from implementing such an approach, but it would go against the usual understanding of how bridging and routing interact in L2+L3 switches.

Read more ...

Interface basics on the Juniper MX

I’ve been spending more time on the MX recently and I thought it would be worthwhile to document some of the basics around interface configuration.  If you’re like me, and come from more of a Cisco background, some of configuration options when working with the MX weren’t as intuitive.  In this post, I want to walk through the bare bone basic of configuring interfaces on a MX router.

Basic L3 interface

ge-0/0/0 {
    unit 0 {
        family inet {
            address 10.20.20.16/24;
        }
    }
}

The most basic interface configuration possible is a simple routed interface. You’ll note that the interface address is configured under a unit. To understand what a unit is you need to understand some basic terminology that Juniper uses. Juniper describes a physical interface as an IFD (Interface Device). In our example above the IFD would be the physical interface ge-0/0/0. We can then layer one or more IFL (Interface Logical) on top of the IFD. In our example the IFL would be the unit configuration, in this case ge-0/0/0.0. Depending on the configuration of the IFD you may be able to provision additional units. These additional units (Logical interfaces (IFLs)) Continue reading

Docker for the SysAdmin Webinar Q&A

On June 27th I presented a webinar on “Docker for the SysAdmin”.  The webinar was driven by a common scenario I’m seeing: A sysadmin is sitting at her desk minding her own business when a developer walks in and says “here’s the the new app, it’s in a Docker image. Please deploy it ASAP”. This session is designed to help provides some guidance on how sysadmins should think about managing Dockerized applications in production.

In any case, I was a bit long-winded (as usual), and didn’t have time to answer all the Q&A during the webinar (and there were quite a few).

So, as promised, here are all the questions from that session, along with my answers.  If you need more info, hit me up on Twitter: @mikegcoleman

————

Q: I am planning an application deployment and want to use Docker. What cloud would you recommend at the moment? I have GCP, Azure, AWS under my belt. 1) TCO 2) Performance ?

A: Answering that would require me to understand your application on a pretty deep level, so I can’t really provide a specific response. I will say that if you choose one cloud provider today, and realize that Continue reading

Google, IBM look to mimic the human brain

Several years ago, there were reports that an IBM artificial intelligence (AI) project had mimicked the brain of a cat. Being the smartass that I am, I responded on Twitter with, “You mean it spends 18 hours a day in sleep mode?”That report was later debunked, but the effort to simulate the brain continues, using new types of processors far faster and more brain-like than your standard x86 processor. IBM and the U.S. Air Force have announced one such project, while Google has its own.+ Also on Network World: Machine learning proves its worth to business + Researchers from Google and the University of Toronto last month released an academic paper titled “One Model To Learn Them All,” and they were pretty quiet about it. What Google is proposing is a template for how to create a single machine learning model that can address multiple tasks.To read this article in full or to leave a comment, please click here

Google, IBM look to mimic the human brain

Several years ago, there were reports that an IBM artificial intelligence (AI) project had mimicked the brain of a cat. Being the smartass that I am, I responded on Twitter with, “You mean it spends 18 hours a day in sleep mode?”That report was later debunked, but the effort to simulate the brain continues, using new types of processors far faster and more brain-like than your standard x86 processor. IBM and the U.S. Air Force have announced one such project, while Google has its own.+ Also on Network World: Machine learning proves its worth to business + Researchers from Google and the University of Toronto last month released an academic paper titled “One Model To Learn Them All,” and they were pretty quiet about it. What Google is proposing is a template for how to create a single machine learning model that can address multiple tasks.To read this article in full or to leave a comment, please click here

What’s the difference between SDN and NFV?

SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years.Software defined networking (SDN), network function virtualization (NFV) and the related virtual network functions (VNF) are important trends. But Forrester analyst Andre Kindness says vague terminology from vendors has created a complicated marketplace for end users evaluating next-generation networking technology. “Few I&O pros understand (these new acronyms), and this confusion has resulted in many making poor networking investments,” he says.So what’s the difference between SDN, NFV and VNF?SDN: Software defined networking To read this article in full or to leave a comment, please click here

What’s the difference between SDN and NFV?

SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years.Software defined networking (SDN), network function virtualization (NFV) and the related virtual network functions (VNF) are important trends. But Forrester analyst Andre Kindness says vague terminology from vendors has created a complicated marketplace for end users evaluating next-generation networking technology. “Few I&O pros understand (these new acronyms), and this confusion has resulted in many making poor networking investments,” he says.So what’s the difference between SDN, NFV and VNF?SDN: Software defined networking To read this article in full or to leave a comment, please click here

W3C embraces DRM—puts itself on the wrong side of history

Last week, the World Wide Web Consortium (W3C)—the organization with the purpose of standardizing aspects of the "Web"—voted to endorse DRM on the web. It’s a move that is in direct opposition to the W3C's mission statement—and puts them squarely on the wrong side of history.Specifically, what the W3C is approving is a specification called Encrypted Media Extensions (EME)—an extension to existing HTML to make implementing playback restrictions a "standard" across all web browsers. Contradictory statements from the W3C These sorts of restrictions (DRM) are, by definition, created for the sole purpose of making it harder for people to see/hear/consume some piece of content—a movie, a song, a book, an image, etc. —often based on their hardware, software or geographical location.To read this article in full or to leave a comment, please click here

Ethernet Getting Back On The Moore’s Law Track

It would be ideal if we lived in a universe where it was possible to increase the capacity of compute, storage, and networking at the same pace so as to keep all three elements expanding in balance. The irony is that over the past two decades, when the industry needed for networking to advance the most, Ethernet got a little stuck in the mud.

But Ethernet has pulls out of its boots and left them in the swamp and is back to being barefoot again on much more solid ground where it can run faster. The move from 10 Gb/sec

Ethernet Getting Back On The Moore’s Law Track was written by Timothy Prickett Morgan at The Next Platform.

Complexity and the Thin Waist

In recent years, we have become accustomed to—and often accosted by—the phrase software eats the world. It’s become a mantra in the networking world that software defined is the future. full stop This research paper by Microsoft, however, tells a different story. According to Baumann, hardware is the new software. Or, to put it differently, even as software eats the world, hardware is taking over an ever increasing amount of the functionality software is doing. In showing this point, the paper also points out the complexity problems involved in dissolving the thin waist of an architecture.

The specific example used in the paper is the Intel x86 Instruction Set Architecture (ISA). Many years ago, when I was a “youngster” in the information technology field, there were a number of different processor platforms; the processor wars waged in full. There were, primarily, the x86 platform, by Intel, beginning with the 8086, and its subsequent generations, the 8088, 80286, 80386, then the Pentium, etc. On the other side of the world, there were the RISC based processors, the kind stuffed into Apple products, Cisco routers, and Sun Sparc workstations (like the one that I used daily while in Cisco TAC). The argument Continue reading

ISOC Rough Guide to IETF 99: Internet Infrastructure Resilience

IETF 99 is next week in Prague, and I’d like to take a moment to discuss some of the interesting things happening there related to Internet infrastructure resilience in this installment of the Rough Guide to IETF 99.

Simple solutions sometimes have a huge impact. Like a simple requirement that “routes are neither imported nor exported unless specifically enabled by configuration”, as specified in an Internet draft “Default EBGP Route Propagation Behavior Without Policies”. The draft is submitted to IESG and expected to be published as a Standards Track RFC soon.

Andrei Robachevsky

MIT IoT and wearable project foretells the future of industrial safety

The IoT in the commercial sector might better be called the Internet of Prototypes, the IoP.Few of the components for building the ubiquitous IoT that the future holds are available today. The best way to envision the future is by prototyping. Prototypes of mission-critical or high-ROI applications will tease money out of research budgets to build them. All the prototypes will lead to a greater understanding, and when the cost of the problem matches the development investment  the prototypes will become products. With cost reduction and standardization, products could become generalized extensible platforms.+ Also on Network World: How industrial IoT is making steel production smarter + MIT built a fitting prototype that could, with further development, scale into a platform. A multidisciplinary team from the MIT Design Lab led by MIT Media Lab researcher Guillermo Bernal won best research paper at the Petra Conference last month for the team’s work applying IoT and wearables to industrial safety. The sophisticated and purpose-built prototype at the center of the research makes the paper “Safety++. Designing IoT and Wearable Systems for Industrial Safety through a User-Centered Design Approach” extremely tangible and predictive about how the IoT will unfold.To Continue reading

MIT IoT and wearable project foretells the future of industrial safety

The IoT in the commercial sector might better be called the Internet of Prototypes, the IoP.Few of the components for building the ubiquitous IoT that the future holds are available today. The best way to envision the future is by prototyping. Prototypes of mission-critical or high-ROI applications will tease money out of research budgets to build them. All the prototypes will lead to a greater understanding, and when the cost of the problem matches the development investment  the prototypes will become products. With cost reduction and standardization, products could become generalized extensible platforms.+ Also on Network World: How industrial IoT is making steel production smarter + MIT built a fitting prototype that could, with further development, scale into a platform. A multidisciplinary team from the MIT Design Lab led by MIT Media Lab researcher Guillermo Bernal won best research paper at the Petra Conference last month for the team’s work applying IoT and wearables to industrial safety. The sophisticated and purpose-built prototype at the center of the research makes the paper “Safety++. Designing IoT and Wearable Systems for Industrial Safety through a User-Centered Design Approach” extremely tangible and predictive about how the IoT will unfold.To Continue reading