Hedge 126: George Michaelson on ISDN

ISDN, while an old technology, is still around in many parts of the world. When will it go away? George Michaelson joins Tom Ammon and Russ White to discuss the end of ISDN. The conversation then veers into old networking technologies, and the importance of ISDN in setting the terms and ideas we use today—ISDN is one of the key technologies around which network engineers built their mental maps of how to build and maintain networks.

download

Practical Python For Networking: 2.1 – Lab Topology – Video

This episode on Python for networking covers the lab topology we’ll be working with in VIRL, choosing a text editor, and basic lab configurations. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder […]

The post Practical Python For Networking: 2.1 – Lab Topology – Video appeared first on Packet Pushers.

The Key to Networking is First Getting a Good Night’s Sleep

Anyone who’s ever gone to a networking event knows that they can be exhausting. You’re constantly meeting new people, exchanging business cards, and trying to make a good impression. It’s no wonder that so many people end up burning out quickly.

The key to networking effectively is actually quite simple: getting a good night’s sleep beforehand.

How much sleep do you need to be at your best for networking events?

Most people need around eight hours of sleep per night to function at their best. However, if you know you have an upcoming networking event, it’s important to get even more sleep than usual. Try to get at least nine or ten hours of sleep the night before. This will help ensure that you’re well-rested and won’t be as likely to feel exhausted during the event.

How can you make sure you get enough sleep?

There are a few different things you can do to make sure you get enough sleep. First, avoid caffeine in the evening. Caffeine can stay in your system for up to eight hours, so it’s best to avoid it after lunchtime. 

Second, establish a bedtime routine and stick to it as much as possible. Continue reading

Day Two Cloud 142: OpenZiti Serves Up Zero Trust For Applications (Sponsored)

Today's Day Two Cloud episode bites into OpenZiti, an open-source project that brings zero trust principles to networks and applications. OpenZiti builds an overlay network to enforce zero trust. It has several moving parts including edge routers, a controller, and SDKs. OpenZiti was created by NetFoundry, our sponsor for this episode. Guest Clint Dovholuk takes us through the nitty-gritty of how it works.

Red Hat Insights for Ansible Automation Platform New Report : Modules

Red Hat Insights is a suite of cloud services available on the Red Hat Hybrid Cloud Console, powered by an expert system that is built upon years of data collected from across Red Hat’s worldwide customer base. For Red Hat Ansible Automation Platform customers, it provides predictive analytical reporting of your Ansible automation. 

This blog breaks down the new reports that analyze module usage within the Ansible Automation Platform.

In summary, module usage is really important because modules can contain security vulnerabilities and require updates to support new integrations of hardware or software. It is paramount to know which modules you are using in your automation.

Let's look at each report and what each of them can deliver for you.

 

Reports

Most used modules

Description: The number of job template and task runs, grouped by Ansible module usage.

Use Case: You can use this report to discover which modules are being used the most across your automation, helping you to check things like organization-wide adoption of purpose-built modules over potentially less performant, catch-all solutions.

Example:

This chart shows how the file and gather_facts modules are the most used, but also shows that over the past 6 Continue reading

Cloudflare partners with Kentik to enhance on-demand DDoS protection

Cloudflare partners with Kentik to enhance on-demand DDoS protection

We are excited to announce that as of today, network security teams can procure and use Magic Transit, Cloudflare’s industry-leading DDoS mitigation solution, and Kentik’s network observability as an integrated solution. We are excited to help our customers not just with technical simplicity, but business process simplicity as well.

Cloudflare partners with Kentik to enhance on-demand DDoS protection

Why monitoring and mitigation?

Distributed Denial of Service (DDoS) attacks are highly disruptive to businesses everywhere. According to the Cloudflare DDoS Attack Trends report, in the first half of 2021 the world witnessed massive ransomware and ransom DDoS attack campaigns that interrupted critical infrastructure, including oil pipelines, healthcare, and financial services. In the second half, we saw a growing swarm of attacks, including one of the most powerful botnets deployed (Meris), with record-breaking network-layer attacks observed on the Cloudflare network.

Along with an increase in severity, there is a proliferation of automated toolkits that make it simple and cheap for anyone to launch these attacks. Detecting and stopping these attacks manually is not effective, and network security engineers are increasingly turning to automated tools to help ensure network and application availability.

DDoS protection has evolved over the years from appliances to hybrid models to fully Internet-native solutions, like Continue reading

Cisco pushes for more recycling of its used gear

Cisco is introducing a new payment scheme to encourage customers to recycling its hardware, alongside a new partner incentive to repurpose or recycle its end-of-use products.The two schemes aim to help Cisco CEO Chuck Robbins build on the vendor’s 2018 sustainability pledge and a commitment to have 100% of hardware returned at the end-of-use.Building the circular economy The Cisco Green Pay payment scheme will see customers offered a 5% incentive on Cisco hardware at the outset of their purchase and a predictable payment strategy over five years. Once the term is up, the product is recovered by Cisco free of charge and the customer receives a certificate confirming that it has entered the circular economy.To read this article in full, please click here

Cisco further incentivizes circular consumption for customers and partners

Cisco is introducing a new payment scheme for customers to encourage the recycling of its hardware, alongside a new partner incentive to repurpose or recycle end-of-use products.The two schemes aim to help Cisco CEO Chuck Robbins build on the vendor’s 2018 sustainability pledge and a commitment to have 100% of hardware returned at the end-of-use.Building the circular economy The Cisco Green Pay payment scheme will see customers offered a 5% incentive on Cisco hardware at the outset of their purchase and a predictable payment strategy over five years. Once the term is up, the product is recovered by Cisco free of charge and the customer receives a certificate confirming that it has entered the circular economy.To read this article in full, please click here

HS021 The Great Realisation Not Great Resignation

Headlines about ‘great resignation’ tend to ignore that people are moving jobs not quitting work. We believe many people are making  choices about what work they want in their lives. We discuss four reasons:  1) toxic workplaces 2) lifestyle and remote work 3) downstepping and 4) early retirement. We note that recruiters are toxic arms […]

The post HS021 The Great Realisation Not Great Resignation appeared first on Packet Pushers.

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

AWS Automatic EC2 Instance Recovery

On March 30th 2022, AWS announced automatic recovery of EC2 instances. Does that mean that AWS got feature-parity with VMware High Availability, or that VMware got it right from the very start? No and No.

Automatic Instance Recover Is Not High Availability

Reading the AWS documentation (as opposed to the feature announcement) quickly reveals a caveat or two. The automatic recovery is performed if an instance becomes impaired because of an underlying hardware failure or a problem that requires AWS involvement to repair.

AWS Automatic EC2 Instance Recovery

On March 30th 2022, AWS announced automatic recovery of EC2 instances. Does that mean that AWS got feature-parity with VMware High Availability, or that VMware got it right from the very start? No and No.

Automatic Instance Recover Is Not High Availability

Reading the AWS documentation (as opposed to the feature announcement) quickly reveals a caveat or two. The automatic recovery is performed if an instance becomes impaired because of an underlying hardware failure or a problem that requires AWS involvement to repair.

With Aquila, Google Abandons Ethernet To Outdo InfiniBand

Frustrated by the limitations of Ethernet, Google has taken the best ideas from InfiniBand and Cray’s “Aries” interconnect and created a new distributed switching architecture called Aquila and a new GNet protocol stack that delivers the kind of consistent and low latency that the search engine giant has been seeking for decades.

With Aquila, Google Abandons Ethernet To Outdo InfiniBand was written by Timothy Prickett Morgan at The Next Platform.

Introduction to MPLS – Fundamentals of MPLS

MPLS Multiprotocol Label Switching is one of the most popular and commonly used technologies in today’s Service Provider and Enterprise networks. In this post, we will explain the most fundamental topics about MPLS. After reading this post, you will learn a lot about MPLS, why we should use MPLS to MPLS packet formats, USA cases of MPLS to MPLS advantages and MPLS disadvantages, some recommendations about MPLS books, MPLS training, some basics MPLS questions, and many other things will be covered. Sit tight and let’s enjoy!.

What is MPLS in Networking?

Multiprotocol Label Switching – MPLS, is a networking technology that switch the network traffic using the shortest path based on “labels,” rather than IP destination addresses, to handle forwarding over a private Wide Area Network.

MPLS is a scalable and protocol-independent solution, that can carry Layer 3 IP and Non-IP and Layer 2 traffic, PPP, HDLC, Frame-Relay, Ethernet, all are possible.

MPLS provides transport and can be considered one of the tunneling mechanisms.

MPLS transport protocols as of 2022, are LDP, RSVP, Segment Routing and BGP LU.

An MPLS network is Layer 2.5, meaning it falls between Layer 2 (Data Link) and Layer 3 (Network) of the OSI Continue reading

Cisco SD-WAN software gains broader application access, enhanced analytics

Cisco has tweaked its flagship SD-WAN software package to increase customer application flexibility and improve visibility into the performance of distributed resources.The company announced Cisco SD-WAN release 17.8, which adds support for new business and customized cloud applications, analytics and security features.SD-WAN buyers guide: Key questions to ask vendors Specifically, the company upgraded the SD-WAN Cloud OnRamp for SaaS service, which links branch offices or individual remote users to cloud applications such as Cisco’s Webex, Microsoft 365, AWS, Google, Oracle, Salesforce and more.To read this article in full, please click here