Azure Networking Fundamentals: Virtual WAN Part 2 – VNet Segmentation

VNets and VPN/ExpressRoute connections are associated with vHub’s Default Route Table, which allows both VNet-to-VNet and VNet-to-Remote Site IP connectivity. This chapter explains how we can isolate vnet-swe3 from vnet-swe1 and vnet-swe2 using VNet-specific vHub Route Tables (RT), still allowing VNet-to-VPN Site connection. As a first step, we create a Route Table rt-swe12 to which we associate VNets vnet-swe1 and vnet-swe2. Next, we deploy a Route Table rt-swe3 for vnet-swe3. Then we propagate routes from these RTs to Default RT but not from rt-swe12 to rt-swe3 and vice versa. Our VPN Gateway is associated with the Default RT, and the route to remote site subnet 10.11.11.0/24 is installed into the Default RT. To achieve bi-directional IP connectivity, we also propagate routes from the Default RT to rt-swe-12 and rt-swe3. As the last step, we verify both Control Plane operation and Data Plane connections. 


Figure 12-1: Virtual Network Segmentation.

IPv6 Buzz 120: Revisiting IPv6 Address Allocation – What’s The Right Size For Your Organization?

Today's podcast episode revisits the subject of IPv6 address allocation along with how changes in network planning and Regional Internet Registry (RIR) policy are influencing allocation size requests. We also look at how network trends around IoT, cloud, and SD-WAN might affect allocation size and how to overcome "IPv4 thinking."

The post IPv6 Buzz 120: Revisiting IPv6 Address Allocation – What’s The Right Size For Your Organization? appeared first on Packet Pushers.

How Many Spines Should a Leaf-and-Spine Fabric Have?

One of my readers sent me a question along these lines:

How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?

There are at least two factors to consider:

How Many Spines Should a Leaf-and-Spine Fabric Have?

One of my readers sent me a question along these lines:

How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?

There are at least two factors to consider:

Nvidia To Build DGX Complexes In Clouds To Better Capitalize On Generative AI

GPU computing platform maker Nvidia announced its financial results for its fiscal fourth quarter ended in January, which showed the same digestion of already acquired capacity by the hyperscalers and cloud builders and the same hesitation to spend by enterprises that other compute engine makers for datacenter computing are also seeing.

Nvidia To Build DGX Complexes In Clouds To Better Capitalize On Generative AI was written by Timothy Prickett Morgan at The Next Platform.

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Inflation Up, Economy Jittery, And IT Spending Consequentially Slows

The increasing cost of goods and services is making everyone a little crazy, and corporate IT departments are not immune from the effects of the dual concerns of rising inflation and the desire by central banks to use interest rates to curb our economic enthusiasm and slow that inflation to a much more sane level.

Inflation Up, Economy Jittery, And IT Spending Consequentially Slows was written by Timothy Prickett Morgan at The Next Platform.

Chatbot Attack Vectors And Failure Modes In Networking And IT

With the release of ChatGPT as a product, Microsoft brought Machine Learning (ML) and Artificial Intelligence (AI) back into focus for millions of users—including network operators, coders, and other folks in information technology. People are once against asking if this technology will make them redundant or how it might change their day-to-day jobs. As always, […]

The post Chatbot Attack Vectors And Failure Modes In Networking And IT appeared first on Packet Pushers.

Cisco: Maybe stop yanking on that Ethernet cable

Cisco issued field notices this week outlining what has apparently become a persistent issue: failed Ethernet connections due to a connected Webex device being moved around too much by pulling on its Ethernet cable.The product involved is the Cisco Webex Room Navigator, a small touchscreen device that combines on-screen, controls, sensors and a power-over-Ethernet port used as a controller for Webex conferencing devices and scheduling conference spaces.The problem, as the field notice describes, is that  “the Ethernet port might fail when the Cisco Room Navigator is pulled across the table by the Ethernet cable frequently over a period of several months.”To read this article in full, please click here

Consistent hashing algorithm

 

This is a guest article by NK. You can view the original article Consistent hashing explained on systemdesign.one website.

At a high level, consistent hashing performs the following operations:

  1. The output of the hash function is placed on a virtual ring structure (known as the hash ring)
  2. The hashed IP addresses of the nodes are used to assign a position for the nodes on the hash ring
  3. The key of a data object is hashed using the same hash function to find the position of the key on the hash ring
  4. The hash ring is traversed in the clockwise direction starting from the position of the key until a node is found
  5. The data object is stored or retrieved from the node that was found