Infiniband and it’s unique potential for Storage and Business Continuity

It’s one of those technologies that many have only had cursory awareness of. It is certainly not a ‘mainstream’ technology in comparison to IP, Ethernet or even Fibre Channel. Those who have awareness of it know Infiniband as a high performance compute clustering technology that is typically used for very short interconnects within the Data Center. While this is true, it’s uses and capacity have been expanded into many areas that were once thought to be out of its realm. In addition, many of the distance limitations that have prevented it’s expanded use are being extended. In some instances to rather amazing distances that rival the more Internet oriented networking technologies. This article will look closely at this networking technology from both historical and evolutionary perspectives. We will also look at some of the unique solutions that are offered by its use.

Not your mother’s Infiniband

The InfiniBand (IB) specification defines the methods & architecture of the interconnect that establishes the interconnection of the I/O subsystems of next generation of servers, otherwise known as compute clustering. The architecture is based on a serial, switched fabric that currently defines link bandwidths between 2.5 and 120 Gbits/sec. It effectively resolves the Continue reading

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

CCIE Flyer and the TS workbook

Just finished our Troubleshooting labs, I partnered with a VERY GOOD FRIEND OF MINE CALLED Dan Shechter, what a gentleman, a Triple CCIE with unbelievable amount of knowledge. ... We thought that each lab was going to take 5.5 hours to complete but they will take 8 hours each. ... They cover all aspect of CCIE R&S, and ALSO the NEW, YES the NEW “CCIE 2.0 Protocol specific Mock labs” hahahaha, these labs are really tough, I should put a warning and a disclaimer on the bottom of each page, guaranteed to frustrate the best of us.

Ticket #06

Please follow the instructions found here about how to use the lab file. ...R2 can't ping both R1's Lo11 and R4's Lo44 at the same time from all its interface. ...For the solution Click here

Ticket #03

Please follow the instructions found here about how to use the lab file. ... R2 has two BGP paths to R4's Lo0 IP address, however only one route is installed in it's routing table. ...For the solution Click here

Soon…

I have been working on a new project, so the blog was a little delayed. I have tons of trouble shooting cases/tickets to share with you, so stay tuned. I’ll publish the next Ticket on Monday.

Data Storage: The Foundation & potential Achilles Heel of Cloud Computing

In almost anything that you read about Cloud Computing, the statement that it is ‘nothing new’ is usually made at some point. The statement then goes on to qualify Cloud Computing as a cumulative epiphenomenon that more so serves as a single label to a multi-faceted substrate of component technologies than it does to a single new technology paradigm. All of them used together comprise the constitution of what could be defined as a cloud. As the previous statement makes apparent the definition is somewhat nebulous. Additionally, I could provide a long list of the component technologies within the substrate that could ‘potentially’ be involved. Instead, I will filter out the majority and focus on a subset of technologies that could be considered ‘key’ components to making cloud services work.

If we were to try to identify the most important component out of this substrate, most would agree that it is something known as virtualization. In the cloud, virtualization occurs at several levels. It can range from ‘what does what’ (server & application virtualization) to ‘what goes where’ (data storage virtualization) to ‘who is where’ (mobility and virtual networking). When viewed as such, one could even come to the conclusion Continue reading