This post originally appeared in the Packet Pushers’ Human Infrastructure newsletter. You can subscribe for free here. We never share or sell your details to anyone. One unforeseen event following the COVID-19 pandemic has been an uptick in attempts to organize workers. Starbucks and Amazon warehouse employees are two high-profile examples. Though private-sector union membership […]
The post The Case For IT Unionization appeared first on Packet Pushers.
There’s an important debate happening in Europe that could affect the future of the Internet. The European Commission is considering new rules for how networks connect to each other on the Internet. It’s considering proposals that – no hyperbole – will slow the Internet for consumers and are dangerous for the Internet.
The large incumbent telcos are complaining loudly to anyone who wants to listen that they aren’t being adequately compensated for the capital investments they’re making. These telcos are a set of previously regulated monopolies who still constitute the largest telcos by revenue in Europe in today's competitive market. They say traffic volumes, largely due to video streaming, are growing rapidly, implying they need to make capital investments to keep up. And they call for new charges on big US tech companies: a “fair share” contribution that those networks should make to European Internet infrastructure investment.
In response to this campaign, in February the European Commission released a set of recommended actions and proposals “aimed to make Gigabit connectivity available to all citizens and businesses across the EU by 2030.” The Commission goes on to say that “Reliable, fast and secure connectivity is a must for everybody and Continue reading
Today on the Tech Bytes podcast we talk with Nokia about 800G Ethernet. Nokia is deploying 800G Ethernet routing to customers (primarily hyperscalers and providers). We examine the drivers of 800G, and how Nokia balances performance with efficiencies for power and density. Our guest from Nokia is Igor Giangrossi, Sr. Director, Consulting Engineering - Webscale Segment.
The post Tech Bytes: Nokia Delivers 800GE Routing With An Eye On Performance And Efficiency (Sponsored) appeared first on Packet Pushers.
Take a Network Break! This week we discuss a new Azure-native cloud firewall from Palo Alto Networks, why pharma giant Merck might be owed a big settlement from its cyber-insurers, and why HPE wants to simplify its branding. Lumen offers 400G IP transit ports, the US White House announces actions to promote safe, responsible AI; Versa Networks rolls out zero trust for remote and campus users, and Rogers teams up with SpaceX to allow SMS messaging via satellite.
The post Network Break 429: Palo Alto Previews Azure Firewall; White House Chases AI Horse After It Escapes Barn appeared first on Packet Pushers.
Interacting with the F5 Programatically is an exciting yet challenging journey. During my experience, I faced timeouts that disrupted session stability and hindered effective API communication with F5 devices.
In this blog post, I'll share my journey of overcoming these obstacles while developing a script to generate backups of F5 configurations. Although I focus on timeout challenges in Go, the principles and solutions discussed apply to any programming language. By sharing my insights, I aim to empower you to handle timeouts and generate F5 backups effectively, regardless of your language preference.
In the code examples below, I use the Go and its SDK to interact with the F5 guest, which can be found here.
The first timeout issue I encountered was the session timeout. This happened while trying to create a UCS backup of the device's configuration. This task can be quite time-consuming, especially when dealing with large configuration files -my file was over 1GB. The challenge arose when the F5 session would time out before the backup process completed, forcing me to establish a new connection to continue interacting with the F5 device.
Below is the code snippet for reference:
package main
import (
"log"
Continue reading
I always love to hear about real-life netlab use cases, and try to make them even easier to implement with new netlab features – that’s how netlab got custom Vagrant configuration templates and per-node configuration templates.
When Anne Baretta sent me his initial DMVPN solution, we quickly figured out we could make it even cleaner if netlab supported tunnel interfaces; you can enjoy the results in release 1.5.2, and explore Anne’s solution on GitHub.
I always love to hear about real-life netlab use cases, and try to make them even easier to implement with new netlab features – that’s how netlab got custom Vagrant configuration templates and per-node configuration templates.
When Anne Baretta sent me his initial DMVPN solution, we quickly figured out we could make it even cleaner if netlab supported tunnel interfaces; you can enjoy the results in release 1.5.2, and explore Anne’s solution on GitHub.
As a network engineer, I’ve made heavy use of the [crayon-6458f26173405144816985-i/] and [crayon-6458f2617340b267906839-i/] commands to discover the physical topology of a network without having to physically trace cables. While these are very useful commands, their output is not very human-readable. I built neighborparser.com as a quick-and-easy tool to turn the semi-structured data from these commands […]
The post CDP and LLDP Neighbor Parser – neighborparser.com appeared first on Packet Pushers.
Ever since I first saw VPP - the Vector Packet Processor - I have been deeply impressed with its performance and versatility. For those of us who have used Cisco IOS/XR devices, like the classic ASR (aggregation service router), VPP will look and feel quite familiar as many of the approaches are shared between the two.
I’ve deployed an MPLS core for IPng Networks, which allows me to provide L2VPN services, and at the same time keep an IPng Site Local network with IPv4 and IPv6 that is separate from the internet, based on hardware/silicon based forwarding at line rate and high availability. You can read all about my Centec MPLS shenanigans in [this article].
Ever since the release of the Linux Control Plane [ref] plugin in VPP, folks have asked “What about MPLS?” – I have never really felt the need to go this rabbit hole, because I figured that in this day and age, higher level IP protocols that do tunneling are just as performant, and a little bit less of an ‘art’ to get right. For example, the Centec switches I deployed perform VxLAN, GENEVE and GRE all at Continue reading
In case you ever wondered how old the “keep network simple and do complex stuff at the endpoints” approach is, read the End-to-End Arguments in System Design article from 1981.
For whatever reason (hint: profits), networking vendors keep ignoring those arguments, turning the network into a kitchen sink of complexity.
Fun tidbit: the article describes a variant of relying on layer-2 checksums will corrupt your data. Some things never change.
In case you ever wondered how old the “keep network simple and do complex stuff at the endpoints” approach is, read the End-to-End Arguments in System Design article from 1981.
For whatever reason (hint: profits), networking vendors keep ignoring those arguments, turning the network into a kitchen sink of complexity.
Fun tidbit: the article describes a variant of relying on layer-2 checksums will corrupt your data. Some things never change.