iWARP update advances RDMA over Ethernet for data center and cloud networks

The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.

The iWARP protocol is the open Internet Engineering Task Force (IETF) standard for RDMA over Ethernet, and offers an interchangeable, RDMA verbs-compliant alternative to specialized fabrics such as InfiniBand. iWARP adapters are fully supported within the Open Fabrics Alliance Enterprise software distribution (OFED), with typically no changes needed for applications to migrate from InfiniBand to Ethernet.

To read this article in full or to leave a comment, please click here

Community Podcast: 8xCCIE Neil Moore and Orhan Ergun – CCIE Preparation

Neil Moore is the first and only 8 x CCIE in the world. Neil shares his CCIE preparation tricks, study methodology and many other important points.

Author information

Orhan Ergun

Orhan Ergun, CCIE, CCDE, is a network architect mostly focused on service providers, data centers, virtualization and security.

He has more than 10 years in IT, and has worked on many network design and deployment projects. Host on the packetpushers community channel.
@OrhanErgunCCDE

The post Community Podcast: 8xCCIE Neil Moore and Orhan Ergun – CCIE Preparation appeared first on Packet Pushers Podcast and was written by Orhan Ergun.

4 Inevitable Questions When Joining a Monitoring Group, Pt.3

Leon Adato, Technical Product Marketing Manager with SolarWinds is our guest blogger today, with a sponsored post — the third in a four-part series on the topic of alerting. In the last two posts in this series, I described two of the four (ok, really five) questions that monitoring professionals are frequently asked: Why did […]

Author information

Sponsored Blog Posts

The Packet Pushers work with our vendors to present a limited number of sponsored blog posts to our community. This is one. If you're a vendor and think you have some blog content you'd like to sponsor, contact us via [email protected].

The post 4 Inevitable Questions When Joining a Monitoring Group, Pt.3 appeared first on Packet Pushers Podcast and was written by Sponsored Blog Posts.

Packet Flow with FirePower.

As I was going through some CiscoLive365 sessions (Remember CiscoLive365 is great!) just this last weekend I came across the slides for BRKSEC-2028 – Deploying Next Generation Firewall with ASA & Firepower services. Unfortunately there is no video for this session yet but the presentation slides are there and luckily the slides are detailed enough so […]

Ansible Makes Work Easier

Michael DeHaan, the founder of Ansible, gave a lightning talk at the Opensource.com event prior to the All Things Open conference in Raleigh, NC. He talks about how Ansible can make work easier, less stressful and more efficient.

Watch the video:

 

 

See the full post at OpenSource.com

DHCP Snooping – Filter those broadcasts!

I had a specific requirement recently and I wanted to test it’s behaviour. In particular the feature is DHCP snooping. Let’s quickly go over the DHCP process at a high level to see how it works: DHCP Let’s take the following simple diagram to show what’s going on. We have a switch with two hosts […]

The Network as a Complex Distributed System

Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is either drunk or lying, and possibly both”.

Networks are of course inherently distributed systems. Most everyone that has managed a good sized network before knows that like the example in the article, minor changes in traffic or connectivity can have huge implications on the overall performance of a network. In my time supporting some very large networks I have seen huge chain reactions of events based on what appear to be some minor issues.

Very few networks are extensively modeled before they are implemented. Manufacturers of machines, cars and many other things go through extensive modeling to understand the behaviors of what they created and their design choices. Using modeling they will look at all possible inputs and outputs, conditions, failure scenarios and anything else we can think of to see how their product behaves.

There are few if any true modeling tools for networks. We build networks with extensive distributed protocols to control connectivity Continue reading

Performance Tests and Out-of-Box Performance

Simonp made a perfectly valid point in a comment to my latest OVS blog post:

Obviously the page you're referring to is a quick-and-dirty benchmark. If you wanted the optimal numbers, you would have to tune quite a few parameters just like for hardware benchmarks (sysctl kernel parameters, Jumbo frames, ...).

While he’s absolutely right, this is not the performance data a typical user should be looking for.

Read more ...

InfluxDB and Grafana

Cluster performance metrics describes how to use sFlow-RT to calculate metrics and post them to Graphite. This article will describe how to use sFlow with the InfluxDB time series database and Grafana dashboard builder.

The diagram shows the measurement pipeline. Standard sFlow measurements from hosts, hypervisors, virtual machines, containers, load balancers, web servers and network switches stream to the sFlow-RT real-time analytics engine. Over 40 vendors implement the sFlow standard and compatible products are listed on sFlow.org. The open source Host sFlow agent exports standard sFlow metrics from hosts. For additional background, the Velocity conference talk provides an introduction to sFlow and case study from a large social networking site.
It is possible to simply convert the raw sFlow metrics into InfluxDB metrics. The sflow2graphite.pl script provides an example that can be modified to support InfluxDB's native format, or used unmodified with the InfluxDB Graphite input plugin. However, there are scaleability advantages to placing the sFlow-RT analytics engine in front of the time series database. For example, in large scale cloud environments the metrics for each member of a dynamic pool isn't necessarily worth trending since virtual machines are frequently added and removed. Instead, sFlow-RT tracks all the Continue reading

RPKI: BGP Security Hammpered by a Legal Agreement

Resource Public Key Infrastructure (RPKI) is a relatively new standard for establishing BGP route origination. I wrote a brief introductory article here. Apologies  for the self-promotion, but rather than rehash the basics here, I raise another issue that needs community attention: ARIN’s Relying Party Agreement (RPA: PDF link). Having said that, some basics are needed. […]

Author information

Andrew Gallo

Senior Information Systems Engineer

Andrew Gallo is a Washington, DC based Senior Information Systems Engineer
and Network Architect, responsible for design and implementation of the
enterprise network for a large university.

Areas of specialization include the University's wide area connections,
including a 150 kilometer DWDM ring, designing a multicampus routing
policy, and business continuity planning for two online datacenters.

Andrew started during the internet upswing of the mid to late 90s
installing and terminating fiber. As his career progressed, he has had
experience with technologies from FDDI to ATM, and all speeds of Ethernet,
including a recent deployment of several metro area 100Gbps circuits.

Focusing not only on data networks, Andrew has experience in traditional
TDM voice, VoIP, and real-time, unified collaboration technologies.

Areas of interest include optical transport, network virtualization and
software defined networking, and network science and graph Continue reading

Will I Be Blogging Again?

Dan wrote in with a question: Hey, I like your site as well… are you going to be doing any more posts? It just seems odd that your last blog post was the analyzation of the site and how it portends to your future work. anyway, good luck I know it's tacky to write a blog post about how you're not writing enough blog posts… but here goes.

Pioneers vs. Protectors in Cloud Networking Innovation

The innovation of hundreds of startup companies created the Internet, and the Internet has changed the world. Innovation continues to have a dramatic impact on networking in recent years. These new developments have changed the way applications, workloads and networks interact. Having been involved in this industry for more than three decades, I have witnessed and been part of these transformations from the 1980s to the 2015 era. Each phase of innovation has been characterized by new companies and entrants, as depicted below:

PHASES OF NETWORK INNOVATION
Epoch Vendors Network Technologies Trends
First
1980–1995
AT&T, Sun, 3Com, NET, Proteon,
UB, BBN, DEC, IBM
ARPANET, Circuits, Hubs,
SNA, Ethernet, Token
Ring, Routers
Terminal-Mainframes and
Minis, Channel Attach
Second
1995–2010
Cisco, Juniper, Nortel/Bay,
Alcatel, Lucent, Avaya
Switching, Multiprotocol
Routing, LAN-WAN,
TCP/IP
PC, Client-Server, Web,
North-South traffic
Third
2010–present
Arista, VMware, Facebook, Microsoft,
Splunk, Red Hat, Palo Alto, Aruba,
many others
The SDN Era of Open,
Programmable
Networking,
DevOps meets NetOps,
Universal Cloud Networks
Mobile Virtual Workloads
and Workflows,
Big Data,
Hyperscale Web,
Virtual Machines /
Containers

Traits of a Pioneering Innovator vs. Protector

Dominant companies often fall by the wayside when they do not anticipate and react to clear market trends as Continue reading

Ansible on AWS: Free Best Practices Webinar on December 17th!

Dualspark

We'd like to invite you to a free webinar on December 17th featuring Ansible and our friends at DualSpark, an expert Amazon Web Services consulting partner.

Register for the Webinar Here

Ansible Automation on AWS: Best Practices by Battle-Hardened Experts

- Using Ansible to manage infrastructure in multi-tier deployments 
- Using CloudFormation and Ansible to manage configuration for more complicated scenarios 
- How Tower adds visibility to systems at runtime
 
Register Now
Presenters: 

Patrick McClory (DualSpark) is a software engineer and architect who fell into 'ops by accident.' Through years of experience in multi-platform and multi-layered systems, he's honed his craft and learned how to build  systems at scale that both leverage the best of breed software solutions and frameworks as well as the flexibility of highly configurable infrastructure before it was cool to call it infrastructure-as-code. Today, Patrick helps to run the boutique consulting firm DualSpark Partners which focuses on helping clients make a move to the cloud using cloud-native strategies from infrastructure management through to application design and development. Follow Patrick and DualSpark on Twitter.

Dave Johnson (Ansible) started his career at Red Hat prior to its IPO, ultimately building and leading Continue reading

BGP hijack incident by Syrian Telecommunications Establishment

The Syrian national Telecommunications Establishment (STE) has been in the news numerous times over the last few years, mostly because of the long lasting large scale Internet outages in Syria. This morning however we observed a new incident involving the two Autonomous systems for STE (AS29386 and AS29256). Starting at 08:33 UTC we detected  that hundreds of new prefixes were being announced by primarily AS 29386. The new BGP announcements by STE (AS29386) were for prefixes that are not owned or operates by the Syrian Telco and as a result triggered ‘hijack / origin AS’ alerts for numerous BGPmon users. The announcements lasted for a few minutes only and we saw paths changing back to the original origin AS at about 08:37 UTC.

RIPE stat has some great tools that visualize the event, this example shows what happened to the youtube prefix 208.117.232.0/24

Youtube prefix hijack

Propagation
STE buys upstream connectivity to the rest of the Internet via three providers, AS3491 (PCCW Global), AS3320 (Deutsche Telekom AG) and AS6762 (Telecom Italia Sparkle). The ‘bad’ BGP updates from this morning were only seen via Telecom Italia. This is either because STE only announced it to Telecom Italia, or because the other two providers filtered Continue reading

Vendor Whitebox Switches – Better Together?

ChocoPeanut

Whitebox switching has moved past the realm of original device manufacturers and has been taken up by traditional networking vendors. Andre Kindness (@AndreKindness) of Forrester recently posted that he fields several calls from his customers every day asking about a particular vendor’s approach to whitebox switching. But what do these vendor offerings look like? And can we predict how a given vendor will address the whitebox market?

Chocolate In My Peanut Butter

Dell was one of the first traditional networking vendors to announce a whitebox switch offering that decoupled the operating system from the switching hardware. Dell offered packages from Cumulus Linux and Big Switch Networks alongside their PowerConnect lineup. This makes sense when you consider that the operating system on the switch has never been the strong suit of Dell. The PowerConnect OS is not very popular with network engineers, being very dissimilar from more popular CLIs such as Cisco IOS and its look-alikes.  Their attempts to capitalize on the popularity of Force Ten OS (FTOS) and adapt it or use on PowerConnect switches has been difficult at best, due to the divide been hardware architecture of the two platforms.

What Dell is very good at is Continue reading

The Big YANG Theory

The Big YANG Theory


by Hariharan Ananthakrishnan, Distinguished Engineer - December 9, 2014

At this point in the evolution of the network, we think it is important to outline the history, pros, cons, and future of YANG. The data model in YANG helps in managing configuration for both traditional and software defined networks (even SDN needs some persistent state). Standardized YANG models will help in managing true multi-vendor networks. 

What Is YANG Exactly?
As I outlined in “The Current State of SDN Protocols,” YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls and NETCONF notifications. YANG was developed by the NETMOD working group in the IETF and was published as RFC 6020

In the past few years, YANG gained a lot of traction with the open-source community. There are tools developed to validate YANG and transform YANG specification into other formats. Some tools can even generate JAVA code given a YANG specification. Router vendors noticed the traction and started contributing to model definitions, standardization and eventual support in their products. 

My Experience
I got involved with YANG when Continue reading