You don’t hear much about successful “Private Clouds” because they aren’t done in public. Two takeaways. People are talking a lot about public cloud because its good business not necessarily because its good technology [1] Private Clouds are being successfully deployed in vast numbers and no one is talking about them. This is also good […]
The post Blessay: Successful Private Clouds Aren’t Spoken Of In Public appeared first on EtherealMind.
They're claiming 200 customer engagements in just 11 weeks.
There are two common methods for transporting multicast packets within an MPLS-based Layer 3 VPN:
There’s also a third method which uses Resource Reservation Protocol—Traffic Engineering (RSVP-TE) but I’m not going to get into that one.
In this first post in a series on LSM, I’ll describe how draft-rosen works, how LSM works, and then compare and contrast the two. Subsequent posts will focus solely on LSM.
At the end of this post, you will be able to describe conceptually how the control and data planes work with LSM and what the pros and cons are of LSM as compared to draft-rosen.
I will not be covering any theory on multicast or MPLS and will instead recommend that you be familiar with both topics before reading further.
Here we go!
All in all, draft-rosen is not all that different from running PIM-Sparse Mode (SM) in a non-MPLS network.
Draft-rosen requires that the MPLS network — the P and PE routers — all be multicast enabled and all run PIM. Each PE that is participating in the draft-rosen multicast network will form a Continue reading
Ten years ago, using VMware vMotion to migrate a Virtual Machine from one server to another, even in the same rack without interruption, was considered black magic, prompting raised eyebrows and a flurry of questions. Today, it takes quite a bit more than just a standard host-to-host vMotion to solicit a similar response.Recently however, we received a reaction similar to the days of old, rich with the nostalgia of the early days of vMotion. Continue reading
You should assess your network’s capacity and capabilities before deploying new functionality.
These young companies are making the hardware and software enabling tomorrow's connected devices and systems.
One of the engineers watching the vSphere 6 Networking Deep Dive found it particularly useful:
There were pearls of knowledge in there which expanded my understanding of ESX and gave me more than a few "aha!" moments […] The course is worth the money and time for sections "uplink redundancy & load balancing" and "VLAN based virtual networks" alone.
Not convinced? Check out other reviews and survey results.
There are two common methods for transporting multicast packets within an MPLS-based Layer 3 VPN:
There's also a third method which uses Resource Reservation Protocol-Traffic Engineering (RSVP-TE) but I'm not going to get into that one.
In this first post in a series on LSM, I'll describe how draft-rosen works, how LSM works, and then compare and contrast the two. Subsequent posts will focus solely on LSM.
At the end of this post, you will be able to describe conceptually how the control and data planes work with LSM and what the pros and cons are of LSM as compared to draft-rosen.
I will not be covering any theory on multicast or MPLS and will instead recommend that you be familiar with both topics before reading further.
Here we go!
Network Break weighs in on the Apple/FBI controversy to discuss technical, legal, and even moral implications. Plus, hospital ransomware, shy private clouds, SD-WAN deals, and more.
The post Network Break 75: Apple Vs. FBI; Private Clouds appeared first on Packet Pushers.
Network Break weighs in on the Apple/FBI controversy to discuss technical, legal, and even moral implications. Plus, hospital ransomware, shy private clouds, SD-WAN deals, and more.
The post Network Break 75: Apple Vs. FBI; Private Clouds appeared first on Packet Pushers.