IS-IS, a link state routing protocol, requires careful attention during network design in order to avoid traffic blackholing. In the topology below, IS-IS routing protocol is used. The primary path is the blue link. Using IS-IS, the overload bit signals the BGP. If the overload bit is set on Router B, Router A does not use router B as […]
The post IS-IS Design: Avoiding Traffic Blackholing appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
IS-IS, a link state routing protocol, requires careful attention during network design in order to avoid traffic blackholing. In the topology below, IS-IS routing protocol is used.
The post IS-IS Design: Avoiding Traffic Blackholing appeared first on Network Design and Architecture.
Driving your market back to the earliest age possible is a tried and true marketing technique — and technology companies are no different in this regard. Getting people hooked on a product at an early age is a sure fire way to build a lifelong habit of preference for that one brand, and for usage in general. Perhaps, though, we should be concerned when it comes to social media. As “edtech” makes its way into our schools, should we be concerned about the privacy of our children? Via CDT:
How effective is anonymization, anyway? A good bit of research is showing Continue reading
While external perimeter protection requirements will most likely command hardware acceleration and support for the foreseeable future, the distributed nature of the services inside the data center calls for a totally different set of specifications.
Some vendors have recently claimed they can achieve micro-segmentation at data center scale while maintaining a hardware architecture. As I described in my recent article in Network Computing, this is unlikely because you have to factor in speed and capacity.
To quickly recap the main points describing the model in the article:
In this post I’ll show how to build REST SDK to authenticate, create labs and nodes in UnetLab. I’ll briefly cover the difference between composition and inheritance design patterns and demonstrate how to use test-driven development.
Continue readingIEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active. In sum, it supports layer 2 multipath. SPB is used in the datacenter; however, it can also be used in the local area network. In this article, Figure-1 will be used to […]
The post Datacenter Design: Shortest Path Bridging appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
IEEE 802.1aq Shortest Path Bridging (SPB) uses IS-IS as an underlying control plane mechanism that allows all the links in the topology to be active.
The post Datacenter Design: Shortest Path Bridging appeared first on Network Design and Architecture.
BT deploys three kinds of Cisco security to defend itself.
The theme question is actually quite a good one, because it may seem like the fight has already been won by IS-IS in the Service Provider segment, and by OSPF on the enterprise market. So why ask it then? Well, because I got the following answer one too many times: “IS-IS is awesome, OSPF not so much. I have no idea how IS-IS works but it’s great. OSPF is so complicated and offers so little flexibility…”.
Well, that’s really wrong from my point of view. No protocol can be neither awesome nor despicable. They both offer you advantages and disadvantages, and knowing how they both work will help you make the best decision based on the needs of the network, not just because people say one is “great” and the other is not.
So, I am going to follow the steps I took to come to terms with IS-IS, and then we’ll see together, even though you’ll probably figure it out for yourselves by then, the comparative analysis of the two IGPs.
Step 1: Understanding CLNS & CLNP
Often network engineers freak out when they hear about the OSI stack, CLNP (Connectionless Network Protocol) and CLNS (Connectionless Network Service). Continue reading
How many bits does the VLAN ID have in the 802.1Q header ?
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.