Italy Celebrates Internet Anniversary

On 30 April, the Internet Society Italy Chapter is scheduled to celebrate a major anniversary, marking 35 years since the country’s first connection to the Internet. On that day in 1986, at about 6 p.m., a network connection was established between the former CNUCE Institute of the National Research Council in Pisa, Italy, and a […]

The post Italy Celebrates Internet Anniversary appeared first on Internet Society.

Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video

Red Hat’s Stu Miniman chats with Day Two Cloud podcast hosts Ned Bellavance and Ethan Banks on why OpenShift is the right platform for some companies to consume Kubernetes. MORE PODCASTS FOR IT PROS? Why, yes, thanks for asking…packetpushers.net/subscribe. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. […]

The post Why Use OpenShift To Deliver Kubernetes? (Stu Miniman) – Video appeared first on Packet Pushers.

Network MOP’s as automated workflows

What does successful network automation look like? What are the metrics that can measure the effectiveness of this practice and its business value?

Some will say we should look at time and cost savings, but we should not forget about driving consistency and a simpler operation to reduce risk. In this context, what are the use-cases that will get us there?

Network MOP blog 1

https://pixabay.com/illustrations/bot-cyborg-automation-helper-robot-4877977/

 

While there are generic use-cases, the real value of automation is truly uncovered when you are able to translate your existing processes into automated workflows that need no human intervention in order to be executed.

If your current processes are too complex, you can start by breaking them down into smaller chunks of work that will become the building blocks of your workflows. The simpler these units of work are, the more reliable/reusable they become.  This blog post will walk through several use-cases for network automation, and show examples of data validation and functional testing to automate Methods of Procedure (MOP).  We can then combine these building blocks into an overall workflow to gradually increase our time savings and reap more benefits from our automation as we add more building blocks.

Do something Continue reading

Nokia Lab | LAB 6 RSVP-TE CSPF |


Hello everyone!

Today is the second RSVP-TE lab. So I will try to show the differences between TE LSP and non-TE LSP. And we will start to investigate the real traffic engineering features - hop limit and admin groups. I'm using topology and RSVP-TE infrastructure from the previous lab.

Please check my first lab for input information.

Topology example

Lab tasks and questions:
  • Comprasion TE LSP and non-TE LSP
  • create LSP from R1 to R6 with an "empty" path and CSPF option - name to_R6
  • create another LSP from R1 to R6 with an "empty" path and without CSPF option - name to_R6_no_CSPF
  • examine LSP signaling process
  • capture PATH messages for every LSP in the different point of our topology
  • Do PATH messages contain ERO?
  • describe the difference in signaling process - TE LSP/ non-TE LSP
  • So we can assume that both LSP have the same path R1 - R2 - R4 - R6
    • Try to increase link metric R2 - R4 and examine LSP behavior
    • Does Head-end resignal LSP to_R6? Why?
    • exec manual resignal (see useful debug commands for reference)
    • What is the default value of resignal timer?
    • examine Make-before-break process

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    COVID-19 upends disaster recovery planning

    The COVID-19 pandemic exposed gaps in enterprise disaster recovery and business continuity planning in areas such as remote access, networking, SaaS applications and ransomware. Over the past year, IT execs have been scrambling to plug those gaps and update DR plans on the fly.More significantly, the pandemic triggered fundamental IT changes at many organizations, including a hasty migration of applications to the cloud, an acceleration of digital transformation efforts, the emergency provisioning of new systems and services outside of traditional procurement procedures, and, in many industries, the emergence a new category of full-time, work-at-home employees who are handling mission-critical data on their personal devices.To read this article in full, please click here

    Arm talks 40% and 50% better performance from 2 new server chips

    Arm Holdings has disclosed details of its two new server-processor designs, Neoverse N2 and Neoverse V1, as well as an updated high-speed mesh to connect its processors.The two designs were introduced last September but Arm was mum on performance. Now it's talking numbers.The Neoverse V1 is designed for scale-up servers, especially high-performance computing (HPC). It supports for Scalable Vector Extension (SVE) and delivers more than a 50% performance increase over the N1 for HPC machine-learning workloads.To read this article in full, please click here

    Anatomy of how you get pwned

    Today, somebody had a problem: they kept seeing a popup on their screen, and obvious scam trying to sell them McAfee anti-virus. Where was this coming from?

    In this blogpost, I follow this rabbit hole on down. It starts with "search engine optimization" links and leads to an entire industry of tricks, scams, exploiting popups, trying to infect your machine with viruses, and stealing emails or credit card numbers.

    Evidence of the attack first appeared with occasional popups like the following. The popup isn't part of any webpage.




    This is obviously a trick. But from where? How did it "get on the machine"?

    There's lots of possible answers. But the most obvious answer (to most people), that your machine is infected with a virus, is likely wrong. Viruses are generally silent, doing evil things in the background. When you see something like this, you aren't infected ... yet.

    Instead, things popping with warnings is almost entirely due to evil websites. But that's confusing, since this popup doesn't appear within a web page. It's off to one side of the screen, nowhere near the web browser.

    Moreover, we spent some time diagnosing this. We restarted the webbrowser in "troubleshooting mode" with all Continue reading

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

    802.1X: What you need to know about this LAN-authentication standard

    When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. This article tells where it came from and how it works.802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs).How to deploy 802.1x for Wi-Fi using WPA3 enterprise It provides a mechanism by which network switches and access points can hand off authentication duties to a specialized authentication server, like a RADIUS server, so that device authentication on a network can be managed and updated centrally, rather than distributed across multiple pieces of networking hardware.To read this article in full, please click here

    Red Hat announces Red Hat Edge initiative

    During this week's Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud.The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies, the edge-ready technology stack uses Red Hat Enterprise Linux along with: Red Hat OpenShift – making it possible to deploy Kubernetes platform in both space- and resource-constrained locations Red Hat Advanced Cluster Management – adding Kubernetes management capabilities across the hybrid cloud Red Hat Ansible Automation Platform – automating workflows Red Hat Integration – connecting applications and data across edge and open cloud deployments Red Hat Data Services – storing, analyzing and distributing data across edge and data centers The company is also expanding its predictive analytics offering, Red Hat Insights, across the open hybrid cloud with the launch of Red Hat Insights for Red Hat OpenShift and Red Hat Ansible Automation Platform and with expanded capabilities for Red Hat Enterprise Linux (RHEL). Continue reading