Data Center Interconnect for Juniper Contrail (SDN Controller)

 

Juniper Contrail is Software Defined Networking (SDN) controller which automate the network provisioning in a Virtual Data Center. In traditionally server hyper-visor environment there is still need to configure and allow VLANs on Data Center switches ports connected with servers, which involves inordinate delays due to lengthy “Change Process” approval and dependency on many teams. But modern centers can not afford such delays for service provisioning as delay in service provisioning means lost of revenue.

The scope of this blog is to discuss:-

  1. How physical servers can talk with servers deployed inside SDN environment. .
  2. Layer 2 & Layer 3 Data Center Interconnect (DCI) solution between two enterprise Data Centers (DCs)

contrail

Above diagram shows architecture of  Contrail , quick overview of Contrail inner working described below, please follow the link for Contrail in depth reading (http://www.opencontrail.org/opencontrail-architecture-documentation/)

  1. Contrail  control node act as central brain.
  2. Contrail installs an instance of  vRouter on each compute node.
  3. Each vRouter on a compute node creates separate VRF (Virtual Routing and Forwarding table)  for each particular subnet for which a Virtual Machines are created.
  4. Full mesh MP-iBGP is configured by Contrail and all vRouters, Overlay tunnels (MPLS over GRE, MPLS over UPD or VXLAN used to Continue reading

How Long Before Burst Buffers Push Past Supercomputing?

Over the last couple of years, we have been watching how burst buffers might be deployed at some of the world’s largest supercomputer sites. For some background on how these SSD devices boost throughput on large machines and aid in both checkpoint and application acceleration, you can read here, but the real question is how these might penetrate the market outside of the leading supercomputing sites.

There is clear need for burst buffer technology in other areas where users are matching a parallel file system with SSDs. While that is still an improvement over the disk days, a lot

How Long Before Burst Buffers Push Past Supercomputing? was written by Nicole Hemsoth at The Next Platform.

How Long Before Burst Buffers Push Past Supercomputing?

Over the last couple of years, we have been watching how burst buffers might be deployed at some of the world’s largest supercomputer sites. For some background on how these SSD devices boost throughput on large machines and aid in both checkpoint and application acceleration, you can read here, but the real question is how these might penetrate the market outside of the leading supercomputing sites.

There is clear need for burst buffer technology in other areas where users are matching a parallel file system with SSDs. While that is still an improvement over the disk days, a lot

How Long Before Burst Buffers Push Past Supercomputing? was written by Nicole Hemsoth at The Next Platform.

Bankers plan to give Corda blockchain code to Hyperledger project

Corda, a distributed ledger platform developed by a finance industry consortium, will go open source next month when its developers donate the code to the Linux Foundation's Hyperledger Project.The move was reported by Reuters on Thursday and the story subsequently reposted to the websites of Corda backer R3 and the Hyperledger Project.A distributed ledger, sometimes referred to as a blockchain, is a database shared across a number of servers and that relies on a consensus among those servers to guarantee its integrity.To read this article in full or to leave a comment, please click here

75% off DKnight MagicBox II Bluetooth 4.0 Portable Wireless speaker, 10W Output Power with Enhanced Bass – Deal Alert

The DKnightMagicBox II Bluetooth speaker offers great quality sound with the latest Bluetooth 4.0 technology. It features two highly powerful 40mm total 10W acoustic drivers for excellent sound. With the ultra-compact size and the soft touch rubber design, it can be easily fitted into a backpack, suitcase, or a travel bag. The built-in 2000 mAh rechargeable battery enables an 10-12 hours of playtime on a single charge. This speaker is strong enough to fill up a kitchen, living room, or classroom. It is ideal for personal usage, indoor party or outdoor BBQ or picnic with friends and family. This portable speaker averages 4.5 out of 5 stars from over 8,700 people (read reviews). With a typical list price of $129.99, this 75% off deal is just $32.99. Check out buying options now at Amazon.To read this article in full or to leave a comment, please click here

Easy-to-exploit rooting flaw puts Linux computers at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS.The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. This means that many kernel versions that are used in a variety of computers, servers, routers, embedded devices and hardware appliances are affected.The Red Hat security team describes the flaw as a "race" condition, "in the way the Linux kernel's memory subsystem handles the copy-on-write (COW) breakage of private read-only memory mappings." This allows an attacker who gains access to a limited user account to obtain root privileges and therefore take complete control over the system.To read this article in full or to leave a comment, please click here

Easy-to-exploit rooting flaw puts Linux computers at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS.The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. This means that many kernel versions that are used in a variety of computers, servers, routers, embedded devices and hardware appliances are affected.The Red Hat security team describes the flaw as a "race" condition, "in the way the Linux kernel's memory subsystem handles the copy-on-write (COW) breakage of private read-only memory mappings." This allows an attacker who gains access to a limited user account to obtain root privileges and therefore take complete control over the system.To read this article in full or to leave a comment, please click here

Even more Docker Labs!

Since we launched Docker Labs back in May, we’ve had a lot of interest. So we keep adding more and improving the labs that we have. We now have 22 hands on labs for you to choose from, ranging from beginner tutorials to much more advanced ones. Here’s a peek at what we have:

So check out Docker Labs to learn more about using Docker. And as always, we really encourage contributions. So if you have a lab you want to get out there, or find a way to improve what we have, please contribute today.

The post Even more Docker Labs! appeared first on Docker Blog.

DNS provider Dyn gets DDoSed, takes out Twitter, GitHub and plenty others

Some of the biggest names on the internet – including Twitter, GitHub, Etsy, Shopify, the New York Times and the Boston Globe, among many others – were temporarily knocked offline by a DDoS attack that targeted DNS provider Dyn early Friday morning.DNS is the mechanism by which computers turn human-readable web addresses like www.networkworld.com into a numerical format that can be used to retrieve the actual web page. Dyn is a managed DNS provider – essentially, a phone book that computers use to correlate IP addresses to web page names.+ALSO ON NETWORK WORLD: Apple sues Amazon supplier over fake iPhone chargers + Technology confirms election ballot error is less than .001%To read this article in full or to leave a comment, please click here

DNS provider Dyn gets DDoSed, takes out Twitter, GitHub and plenty others

Some of the biggest names on the internet – including Twitter, GitHub, Etsy, Shopify, the New York Times and the Boston Globe, among many others – were temporarily knocked offline by a DDoS attack that targeted DNS provider Dyn early Friday morning.DNS is the mechanism by which computers turn human-readable web addresses like www.networkworld.com into a numerical format that can be used to retrieve the actual web page. Dyn is a managed DNS provider – essentially, a phone book that computers use to correlate IP addresses to web page names.+ALSO ON NETWORK WORLD: Apple sues Amazon supplier over fake iPhone chargers + Technology confirms election ballot error is less than .001%To read this article in full or to leave a comment, please click here

Apple sues Amazon supplier over fake iPhone chargers

In a federal lawsuit filed this week, Apple asserted that nearly all the iPhones, chargers and cables it surreptitiously purchased from online retailer Amazon were fakes."As part of its ongoing brand protection efforts, [Apple] has purchased well over 100 iPhone devices, Apple power products, and Lightning cables sold as genuine by sellers on Amazon.com and delivered through Amazon's 'Fulfillment by Amazon' program," Apple's complaint said of a nine-month operation. "Apple's internal examination and testing for these products revealed almost 90% of these products are counterfeit."Although Apple did not target Amazon in the lawsuit -- instead, Apple sued Mobile Star, a New York-based former supplier to Amazon -- the retailer came off poorly in the complaint.To read this article in full or to leave a comment, please click here

IBM says Macs save up to $543 per user

By the end of 2016, roughly one in four IBM employees will use a Macintosh computer. The tech giant, which employs 400,000 people, bought and provisioned 90,000 Macs since it started to support Apple laptops in June 2015. It expects to have at least 100,000 Macs deployed by 2017.IBM now has the largest enterprise Mac deployment in the world, and it is Apple's biggest business customer for Macs, according to Mac maker. Apple declined to provide details on the other leading enterprise Mac customers, but SAP, Kelly Services and Intuit are among the company's most recognizable clients. In total, IBM says it manages 217,000 Apple devices for its employees today, including those 90,000 Macs, 81,000 iPhones and 48,000 iPads. To read this article in full or to leave a comment, please click here