IEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active. In sum, it supports layer 2 multipath. SPB is used in the datacenter; however, it can also be used in the local area network. In this article, Figure-1 will be used to […]
The post Datacenter Design: Shortest Path Bridging appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
IEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active.
The post Datacenter Design: Shortest Path Bridging appeared first on Network Design and Architecture.
BT deploys three kinds of Cisco security to defend itself.
The theme question is actually quite a good one, because it may seem like the fight has already been won by IS-IS in the Service Provider segment, and by OSPF on the enterprise market. So why ask it then? Well, because I got the following answer one too many times: “IS-IS is awesome, OSPF not so much. I have no idea how IS-IS works but it’s great. OSPF is so complicated and offers so little flexibility…”.
Well, that’s really wrong from my point of view. No protocol can be neither awesome nor despicable. They both offer you advantages and disadvantages, and knowing how they both work will help you make the best decision based on the needs of the network, not just because people say one is “great” and the other is not.
So, I am going to follow the steps I took to come to terms with IS-IS, and then we’ll see together, even though you’ll probably figure it out for yourselves by then, the comparative analysis of the two IGPs.
Step 1: Understanding CLNS & CLNP
Often network engineers freak out when they hear about the OSI stack, CLNP (Connectionless Network Protocol) and CLNS (Connectionless Network Service). Continue reading
How many bits does the VLAN ID have in the 802.1Q header ?
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
In this exciting webinar Q&A, experts from Cisco answer post webinar questions & elaborate on how to capture the huge business opportunity of virtual services.
Nutanix reveals huge losses; HPE gets ousted from Telefónica’s NFV project.
The post Worth Reading: Data Center Vanity appeared first on 'net work.
The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.
Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.
To read this article in full or to leave a comment, please click here
In my last article, I talked about how Fibre Channel, as a technology, has probably peaked. It’s not dead, but I think we’re seeing the beginning of a slow decline. Fibre Channel’s long goodbye is caused by a number of factors (that mostly aren’t related to Fibre Channel itself), including explosive growth in non-block storage, scale-out storage, and interopability issues.
But rather than diss Fibre Channel, in this article I’m going to talk about the advantages of Fibre Channel has over IP/Ethernet storage (and talk about why the often-talked about advantages aren’t really advantages).
Fibre Channel’s benefits have nothing to do with buffer to buffer credits, the larger MTU (2048 bytes), its speed, or even its lossless nature. Instead, Fibre Channel’s (very legitimate) advantages are mostly non-technical in nature.
When you build a Fibre Channel-based SAN, there’s no optimization that needs to be done: Fibre Channel comes out of the box optimized for storage (SCSI) traffic. There are settings you can tweak, but most of the time there’s nothing that needs to be done other than set port modes and setup zoning. The same is true for the host HBAs. While there are some Continue reading
ETSI NFV descends on the Big Apple for NFV #12