Subscription Defined Networking

Cisco’s big announcement this week ahead of Cisco Live was their new Intent-based Networking push. This new portfolio does include new switching platforms in the guise of the Catalyst 9000 series, but the majority of the innovation is coming in the software layer. Articles released so far tout the ability of the network to sense context, provide additional security based on advanced heuristics, and more. But the one thing that seems to be getting little publicity is the way you’re going to be paying for software going forward.

The Bottom Line

Cisco licensing has always been an all-or-nothing affair for the most part. You buy a switch and you have two options – basic L2 switching or everything the switch supports. Routers are similar. Through the early 15.x releases, Cisco routers could be loaded with an advanced image that ran every service imaginable. Those early 15.x releases gave us some attempts at role-based licensing for packet, voice, and security device routers. However, those efforts were rolled back due to customer response.

Shockingly, voice licensing has been the most progressive part of Cisco’s licensing model for a while now. CallManager 4.x didn’t even bother. Hook things up and Continue reading

Juniper Routers Sample BGP Configurations : Quick and Easy

As in my earlier post i wrote about the basic configurations on Cisco Router where i define configurations on Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups.

In this article I am just going to put Juniper router basics BGP configurations. In the later articles I will cover all the configurations like Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups on juniper and Huawei routers.

Below is the basic network topology with configuration as below

Fig 1.1- Juniper Router BGP Topology
Here in the above shown topology, we have Router A, Router B, Router C, Router D and Router E. Router A, B and C are in the AS 22 while Router D is in AS 79 and Router E is in AS 17

Configure the interfaces to Peers A, B, C, and D
Router_NB# set ge-1/2/0 unit 0 description to-A
Router_NB# set ge-1/2/0 unit 0 family inet address 10.10.10.1/30
Router_NB# set ge-0/0/1 unit 5 description to-B
Router_NB# set ge-0/0/1 unit 5 family inet address 10.10.10.5/30
Router_NB# set ge-0/1/0 unit 9 description to-C
Router_NB# set ge-0/1/0 unit 9 family inet address Continue reading

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here

IDG Contributor Network: The fight to defend the Internet of Things

The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones during the first two decades of this century. This new chapter has a new set of challenges and opportunities because it involves a broader diversity of devices — ranging from connected light bulbs, smart gas meters and smart speakers, to IP monitoring cameras, smart watches, drones, and robots. And while the connectivity and compute requirements of these IoT devices vary widely, they all have a common need: strong security.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The fight to defend the Internet of Things

The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones during the first two decades of this century. This new chapter has a new set of challenges and opportunities because it involves a broader diversity of devices — ranging from connected light bulbs, smart gas meters and smart speakers, to IP monitoring cameras, smart watches, drones, and robots. And while the connectivity and compute requirements of these IoT devices vary widely, they all have a common need: strong security.To read this article in full or to leave a comment, please click here

The Biggest Shift in Supercomputing Since GPU Acceleration

For years, the pace of change in large-scale supercomputing neatly tracked with the curve of Moore’s Law. As that swell flattens, and as the competitive pressure ticks up to build productive exascale supercomputers in the next few years, HPC has been scrambling to find the silver bullet architecture to reach sustained exascale performance. And as it turns out, there isn’t one.

But there is something else—something few saw coming three years ago, has less to do with hardware than it does a shift in how we approach massive-scale simulations, and is happening so fast that too-far-ahead-of-time procurements are

The Biggest Shift in Supercomputing Since GPU Acceleration was written by Nicole Hemsoth at The Next Platform.

Security Here I Come!

The announcement has been made!  It is completely official!  I can finally share the awesome great news I am so excited about.  Security will be my absolute #1 focus now. 

Security has always fascinated me.  My entire career.  ….. It’s just that the fundamentals of routing and design intrigued me even more.  🙂

But now?  Yeah baby!  Now I get to flip a switch… dive into and completely surround myself with all things Security.  And I just could not be any more tickled pink and excited.  I feel like all my years of networking have been a build up towards this.

Am I leaving my CPOC lab and job I adore so much?  Nah… I’d go through withdrawal.  LOL.  Nah… wouldn’t be pretty.  It is just my role that will be changing.

Woot woot!  Security here I come!  ROCK!

 

 

 

 

Amazon Prime Gets You 50% off Razer Wildcat Controller for Xbox One, Windows 10 PC – Deal Alert

The Razer Wildcat controller is compatible with both Xbox One and Windows 10 PC. An elite level controller developed for tournament play with feedback from the best eSports athletes, it features four additional fully-programmable buttons for a personalized layout, a well thought out ergonomic shape and weight, reduced trigger travel distance for rapid fire, and much more. If you're an Amazon Prime member, the typical list price has been reduced generously to just $74.99. If you're not a Prime member but still want this deal, Amazon's 30 day Prime free trial (signup page here) is quick to activate and gets you all of the same benefits with no financial commitment required (unless you decide to keep it). See this deal now on Amazon.To read this article in full or to leave a comment, please click here

12 Innovative Projects Selected for Beyond the Net Funding

Beyond the Net Funding Programme is pleased to announce the results of our June 2017 grant application cycle. A total of 102 applications were received and, after a thorough review process, 12 projects were selected.

The new grantees are a group of talented, diverse, and devoted people committed to work on critical issues in their home region using the Internet to bring innovation and empower their communities all across the globe.

Ilda Simao

IDG Contributor Network: The future is not the cloud or the fog: it is actually the SEA!

A casual reflection on the last few years in the evolution of the wireless network provides us all the insights necessary to reason that there is at least one final frontier coming down the road. Who can deny that the last few years have been owned by the cloud, virtualization and softwarization (if that is even a word!). Edge Computing too, which is really nothing more than the pushing of all of these concepts deep into places in the network where they have never been before. Fog computing is another term (created by Cisco) for something similar but driven in its genesis more bottom up from the many Internet of Things use cases. The bigger trend is obvious; network intelligence is distributing but where will it, can it go, beyond this?To read this article in full or to leave a comment, please click here

Sample Network Automation Ansible Playbooks

I developed over a dozen different Ansible-based network automation solutions in the last two years for my network automation workshops and online course, and always published them on GitHub… but never built an index, or explained what they do, and why I decided to do things that way.

With the new my.ipSpace.net functionality I added for online courses I got the hooks I needed to make the first part happen:

Read more ...

What Is Steganographic Malware? New Type Of Attack Hides In Images

As defenses against standard cyberattacks evolve, so do the methods of attack carried out by malicious actors. Security researchers say a type of attack known as steganographic malware is on the rise. Gary Davis, the chief consumer security evangelist at cybersecurity firm McAfee, warned of the relatively new style of attack, which involves embedding secret …