AT&T’s Gordon Mansfield: No Surprises Yet in 5G Trials
"No one dreamt of doing friendly user trials in LTE."
"No one dreamt of doing friendly user trials in LTE."
IBM is less expensive than rivals Microsoft, Google, or AWS.
The IETF published RFC8200 last week, which officially makes IPv6 an Internet Standard. While this move was a long time coming—IPv6 has now reached about 20% deployment—a more interesting question is: what has changed since RFC2460, which was a draft standard, was published in 2013? After all, the point of moving from the experimental to the draft standard to the internet standard states is to learn more about the protocol as it operates on the wire, and to make changes to improve deployability and performance.
Where would you look to determine what these changes might be? The IETF draft tracker tool, of course. If you look at the data tracker page for RFC8200, you will find a tab called history. From there, you have the option of looking at the revision differences, as shown below.
![]()
When you click on the wdiff button, you will see something like this—
![]()
In this case, I went back to the original version of the RFC2460bis draft (which just means the draft was designed to replace RFC2460). There are earlier versions of this draft from before it was accepted as a working group document, but even this comparison should give you some idea of the Continue reading
The post Worth Reading: BCP79bis and Patents in the IETF appeared first on rule 11 reader.
Turn to the DellEMC channel to learn how to create agility and efficiency at scale with DellEMC products.
Just a short note: I’ve updated the sixty book section of the site with a new plugin designed to keep track of book libraries. Along the way, I’ve added an Amazon affiliate code, so maybe I can buy a cup of hot chocolate and a piece of banana nut bread at some point in the future.
The look should really be a bit nicer, though, and it is easier to add books to this system than manually adding them as I was doing before.
Remember that the idea of sixty books is not that there are actually 60 books on the list, but rather this is what I read in an average year—and hence what I am challenging you to work up to.
The post Administravia 20170703 appeared first on rule 11 reader.
A company's ability to leverage software depends on efficient infrastructure.
Learn about default Docker network settings and options for expanded networking capabilities.
![]() |
| Fig 1.1- Sample DMVPN Topology |
In this post i would like to highlight a couple of “features” of ISIS.
More specifically the authentication mechanism used and how it looks in the data plane.
I will do this by configuring a couple of routers and configure the 2 authentication types available. I will then look at packet captures taken from the link between them and illustrate how its used by the ISIS process.
The 2 types of Authentication are link-level authentication of the Hello messages used to establish an adjacency and the second type is the authentication used to authenticate the LSP’s (Link State Packet) themselves.
First off, here is the extremely simple topology, but its all thats required for this purpose:
Simple, right? 2 routers with 1 link between them on Gig1. They are both running ISIS level-2-only mode, which means they will only try and establish a L2 adjacency with their neighbors. Each router has a loopback interface, which is also advertised into ISIS.
First off, lets look at the relevant configuration of CSR-02 for the Link-level authentication:
key chain MY-CHAIN key 1 key-string WIPPIE ! interface GigabitEthernet1 ip address 10.1.2.2 255.255.255.0 ip router isis 1 negotiation auto no Continue reading