Kelly Ahuja Will Be the Latest to Leave the Cisco Management Team
Yvette Kanouff takes the service provider group amid a reportedly huge Cisco reorg.
Yvette Kanouff takes the service provider group amid a reportedly huge Cisco reorg.
Interop is one of the few remaining independent tech conferences, which makes it a unique opportunity for IT professionals to get training, education, and insights that aren’t driven by a vendor’s agenda. The conference stretches over five days, you’ll want to plan ahead because there’s so much to choose from, including multi-day workshops, individual sessions, […]
The post How To Get The Most Out Of Interop appeared first on Packet Pushers.
Interop is one of the few remaining independent tech conferences, which makes it a unique opportunity for IT professionals to get training, education, and insights that aren’t driven by a vendor’s agenda. The conference stretches over five days, you’ll want to plan ahead because there’s so much to choose from, including multi-day workshops, individual sessions, […]
The post How To Get The Most Out Of Interop appeared first on Packet Pushers.
Cisco’s newly released HyperFlex extends Cisco’s strategy of software-defined, policy-driven infrastructure to hyperconvergence to overcome the limitations of early hyperconverged infrastructure solutions.
It’s not like they’re asking for a back door for every device.
If the world goes dark through encryption, we’ll be back to the wild west!
After all, if it were your daughter who had been killed in a terrorist attack, you’d want the government to get to that information, too.
While sitting on a panel this last week, I heard all three reactions to the Apple versus FBI case. But none of these reactions ring true to me.
Let’s take the first one: no, they’re not asking for a back door for every device. Under the time tested balance between privacy and government power, the specific point is that people have a reasonable expectation of privacy until they come under suspicion of wrongdoing. However, it’s very difficult to trust that, in the current environment, that such power, once granted, won’t be broadened to every case, all the time. The division between privacy and justice before the law was supposed to be at the point of suspicion. That wall, however, has already been breached, so the argument now moves to “what information should the government be able to trawl through in order to find crimes?” They are asking for Continue reading
In the previous post (Label Switched Multicast – An Introduction) in this series on Label Switched Multicast (LSM) I introduced the concepts behind LSM and draft-rosen, the two most poplar methods for transporting multicast traffic through MPLS Layer 3 VPNs.
In this article I will talk through the configuration of LSM on the PE and P routers and get to the point where two CEs are successfully passing multicast traffic via the MPLS network. All of the configuration examples will be relevant to Cisco IOS.
As was the case in the introduction article in the series, it’s best if you already have a good understanding of multicast and MPLS before reading this article.
At the end of this article you’ll be able to start configuring your own LSM environment using the configuration samples here as a template.
To the CLI!
In order to keep this post on point, I’m going to start on the basis that basic routing, LDP and MP-BGP are already configured and that unicast traffic is successfully flowing between all CEs.
The basic topology being used here is the same as the one in the introduction post:
Within the Continue reading
How can mobile networks reduce bottlenecks and buffering to meet user needs?
Network functions virtualization may be in its infancy now, but it's sure to make an impact on your enterprise network.