What You Might Not Understand About NFV, But Need to Know
The who, what, where, when and why.
The who, what, where, when and why.
As a mainframer, I belong to a number of organizations and groups that focus on this technology. And when I read message boards, Web sites, magazines, and blogs about big iron one theme always comes through loud and clear: my peers are overwhelmingly negative about their jobs.
In fact, some recent polls highlighting employee job dissatisfaction paint a fairly grim picture. A recent Gallup Poll is here. The Washington Post poll is here. And a Forbes poll is here.
To read this article in full or to leave a comment, please click here
A look at the role each group is playing in the evolution of NFV.
In this "nominal 15 minute analysis" I"m looking at technology convergence and how it needs standards for the market to operate.
The post Convergence & Standards in IT Infrastructure appeared first on EtherealMind.
According to the Data Center Journal:
What’s the problem with IT resumes? They’re useless.
The real problem with IT resumes, though, is we want to see a long list of technologies, because we want to find the specific technology we want to implement (or are implementing) — rather than a good engineer. The hiring process is a fishing expedition rather than a search for solid talent and personality fit. If we want to fix this problem we can. The question is — do we want to?
Bruce Schneier has some wise thoughts on airport security this week —
We don’t need perfect airport security. We just need security that’s good enough to dissuade someone from building a plot around evading it. If you’re caught with a gun or a bomb, the TSA will detain you and call the FBI. Under those circumstances, even a medium chance of getting caught is enough to dissuade a sane terrorist
Replace “airport” with “network,” and you get the drift of where network security is going, I think. Of course, there’s the reality that you can’t stop insane attackers… Worth remembering. The same point can be made for network uptime, by the way. Perfection is Continue reading
If you liked this post, please do click through to the source at The IOS XR CLI and give me a share/like. Thank you!
Earlier today a massive route leak initiated by Telekom Malaysia (AS4788) caused significant network problems for the global routing system. Primarily affected was Level3 (AS3549 – formerly known as Global Crossing) and their customers. Below are some of the details as we know them now.
Starting at 08:43 UTC today June 12th, AS4788 Telekom Malaysia started to announce about 179,000 of prefixes to Level3 (AS3549, the Global crossing AS), whom in turn accepted these and propagated them to their peers and customers. Since Telekom Malaysia had inserted itself between these thousands of prefixes and Level3 it was now responsible for delivering these packets to the intended destinations.
This event resulted in significant packet loss and Internet slow down in all parts of the world. The Level3 network in particular suffered from severe service degradation between the Asia pacific region and the rest of their network. The graph below for example shows the packet loss as measured by OpenDNS between London over Level3 and Hong Kong. The same loss patterns were visible from other Level3 locations globally to for example Singapore, Hong Kong and Sydney.
At the same time the round trip time between these Continue reading
How does Internet work - We know what is networking
Flowing text is a project done as a part of academic work that I am involved with for last few years at the University of Rijeka – Department of Informatics. It’s a short overview at latest achievements in the field of network automation with some lab experiments done to test different paths across the network. The work was presented at 6th International Conference on Information Technologies and Information Society (ITIS2014). The scope of ITIS events are the applications of IT, particularly in social sciences. The conference also covers a wider range of topics related to IT and computational modeling and
This post discusses about design considerations when interconnecting two tightly coupled fabrics using dark fibers or DWDM, but not limited to Metro distances. If we think very long distances, the point-to-point links can be also established using a virtual overlay such as EoMPLS port x-connect; nonetheless the debate will be the same.
Notice that this discussion is not limited to one type of network fabric transport, but any solutions that use multi-pathing is concerned, such as FabricPath, VxLAN or ACI.
Assuming the distance between DC-1 and DC-2 is about 100 km; if the following two design options sound quite simple to guess which one might be the most efficient, actually it’s not as obvious as we could think of, and a bad choice may have a huge impact for some applications. I met several networkers discussing about the best choice between full-mesh and partial-mesh for interconnecting 2 fabrics. Some folks think that full-mesh is the best solution. Actually, albeit it depends on the distances between network fabrics, this is certainly not the most efficient design option for interconnecting them together.
Partial-Mesh with transit leafs design (left) Continue reading