NFV MANO Mania Has Run its Course
NFV must move beyond that familiar, ubiquitous ETSI diagram.
NFV must move beyond that familiar, ubiquitous ETSI diagram.
The hosting firm's security tools start reaching into Azure, with other clouds to follow.
Software Defined Networking, and it’s latest incarnation SD-WAN seem to be all the rage at the moment. Having seen presentations from vendors large and small on the subject recently at Networking Field Day 10 I am still given to thinking there are a few things that get glossed-over by the vendors quite often. Foremost in my mind, is this (potentially heretical thought):
It is all very well creating virtual or ‘overlay’ networks which run over other networks to suit your purposes, but as someone famous once said, you can’t change the laws of physics. Packets must ultimately flow across a medium – wires, fibres or waves. The media doesn’t give a flying fart whether the packet is naked, or clothed in layers of MPLS or GRE headers – if that medium is congested and doesn’t support any form of packet prioritisation, your data is down the dunny.
There’s a trade-off here that perhaps not many people understand when they are shown smooth presentations by manufacturers. It seems to me that:
Software Defined Networking, and it’s latest incarnation SD-WAN seem to be all the rage at the moment. Having seen presentations from vendors large and small on the subject recently at Networking Field Day 10 I am still given to thinking there are a few things that get glossed-over by the vendors quite often. Foremost in my mind, is this (potentially heretical thought):
It is all very well creating virtual or ‘overlay’ networks which run over other networks to suit your purposes, but as someone famous once said, you can’t change the laws of physics. Packets must ultimately flow across a medium – wires, fibres or waves. The media doesn’t give a flying fart whether the packet is naked, or clothed in layers MPLS or GRE headers – if that medium is congested and doesn’t support any form of packet prioritisation, your data is down the dunny.
There’s a trade-off here that perhaps not many people understand when they are shown smooth presentations by manufacturers. It seems to me that:
Brad Smith will be a big voice in the future of cloud security policies, globally.
Come join Brocade for their DemoFriday on October 16th at 10:00am PT to discover a new and easy way to manage application growth that can significantly reduce your current cost structures.
Cisco ACI offers an elegant new approach to microsegmentation that makes it a powerful tool for security or network administrators.
Co-founder Umesh Mahajan takes the CSO role as the L4-7 startup braces for growth.
Join major industry thought leaders for an exciting conversation surrounding some of the hottest topics in SDN.
Reportedly Uber has grown an astonishing 38 times bigger in just four years. Now, for what I think is the first time, Matt Ranney, Chief Systems Architect at Uber, in a very interesting and detailed talk--Scaling Uber's Real-time Market Platform---tells us a lot about how Uber’s software works.
If you are interested in Surge pricing, that’s not covered in the talk. We do learn about Uber’s dispatch system, how they implement geospatial indexing, how they scale their system, how they implement high availability, and how they handle failure, including the surprising way they handle datacenter failures using driver phones as an external distributed storage system for recovery.
The overall impression of the talk is one of very rapid growth. Many of the architectural choices they’ve made are a consequence of growing so fast and trying to empower recently assembled teams to move as quickly as possible. A lot of technology has been used on the backend because their major goal has been for teams to get the engineering velocity as high as possible.
After a understandably chaotic (and very successful) start it seems Uber has learned a lot about their business and what they really need to Continue reading
Network Break 53 bites into Apple's latest announcements, wonders at Intel abandoning a science competition, ponders FireEye's reaction to vulnerability research, and opines on OpenFlow's rise in the network.
The post Network Break 53: Apple At Work, OpenFlow Rising appeared first on Packet Pushers.
Learn why CSPs should architect NFV implementation to maximize agility and profit while minimizing cost and risk.