<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3531572539467734322</id><updated>2026-02-02T13:38:18.882-08:00</updated><title type='text'>Bit Pilot</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.bitpilot.net/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>22</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-5312287926719600799</id><published>2018-06-21T07:42:00.002-07:00</published><updated>2018-06-21T07:42:22.233-07:00</updated><title type='text'>Splunk makes two key acquisitions</title><content type='html'>&lt;span style=&quot;color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 18px; letter-spacing: -0.1px;&quot;&gt;Now Splunk data and insights can be acted upon more quickly along with automated remediation and forensics.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
https://techcrunch.com/2018/06/11/splunk-nabs-on-call-management-startup-victorops-for-120-m/&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 18px; letter-spacing: -0.1px;&quot;&gt;&quot;With VictorOps, the company gets a system to alert the operations team when something from that muddle of data actually requires their attention.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 18px; letter-spacing: -0.1px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 18px; letter-spacing: -0.1px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Helvetica Neue, Helvetica, Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 18px; letter-spacing: -0.1px;&quot;&gt;https://seekingalpha.com/article/4151274-splunk-acquire-phantom-cyber-350-million&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Helvetica Neue, Helvetica, Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 18px; letter-spacing: -0.1px;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Verdana, Arial, helvetica, sans-serif; font-size: 16px;&quot;&gt;to bolster its data integration, security analysis and automation capabilities as it continues to build out its machine learning offerings.&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 18px; letter-spacing: -0.1px;&quot;&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/5312287926719600799/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2018/06/splunk-makes-two-key-acquisitions.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/5312287926719600799'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/5312287926719600799'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2018/06/splunk-makes-two-key-acquisitions.html' title='Splunk makes two key acquisitions'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-610342722472015701</id><published>2018-06-21T07:38:00.000-07:00</published><updated>2018-06-21T07:38:28.384-07:00</updated><title type='text'>The enemy of great</title><content type='html'>In the space between GOOD and PERFECT lies somewhere you occassionally want to be: &amp;nbsp;GREAT. &amp;nbsp;Very few things need to be perfect. &amp;nbsp;For many things we settle for good, and probably should. &amp;nbsp;We need a precious few to get GREAT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7_mqhyphenhyphen_C0VyIMxEFPveYRGAPPndnVX95OJM3Vs5WrUZZ6-p6iKSM5lFTxz4SB8dRp-TB176XVPEEikqCuZSI4ZMOIYppSEb82kIWsk8_nbYgSAjE2PY-4NNddg18wVtTYW4bGajcwtvU/s1600/File+Jan+08%252C+2+17+34+PM.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7_mqhyphenhyphen_C0VyIMxEFPveYRGAPPndnVX95OJM3Vs5WrUZZ6-p6iKSM5lFTxz4SB8dRp-TB176XVPEEikqCuZSI4ZMOIYppSEb82kIWsk8_nbYgSAjE2PY-4NNddg18wVtTYW4bGajcwtvU/s200/File+Jan+08%252C+2+17+34+PM.jpeg&quot; width=&quot;158&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdQMUK3UKnu8fOCL7vPuOC_qt16BIgTOokcm7Cw2t9psQD4o8qJxWvZ51ALQBIDbT715slRfpKwsrmwCYLUyFGhE01il8BK39sHtccy_HAB_3LJWlqxNCLXply9mhZ1CF1Dh37z29VxzQ/s1600/jimcollins-good.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;106&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdQMUK3UKnu8fOCL7vPuOC_qt16BIgTOokcm7Cw2t9psQD4o8qJxWvZ51ALQBIDbT715slRfpKwsrmwCYLUyFGhE01il8BK39sHtccy_HAB_3LJWlqxNCLXply9mhZ1CF1Dh37z29VxzQ/s320/jimcollins-good.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://sivers.org/hellyeah&quot;&gt;No more&lt;/a&gt;&lt;br /&gt;
&quot;Meaning: When deciding whether to commit to something, if I feel anything less than, “Wow! That would be amazing! Absolutely! Hell yeah!” - then my answer is no.&quot; &amp;nbsp;-&amp;nbsp;&lt;a href=&quot;http://www.twitter.com/sivers&quot;&gt;Derek Sivers&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
BUT MOST OF THE TIME:&lt;br /&gt;
&lt;br /&gt;
&quot;Better a diamond with a flaw than a pebble without.&quot; &amp;nbsp;-Confucius &amp;nbsp;via &lt;a href=&quot;http://www.entrepreneur.com/article/249676&quot;&gt;Entrepreneur&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
...but &quot;Obsession with perfection can paralyze&quot; - &lt;a href=&quot;https://www.psychologytoday.com/blog/happiness-in-world/201106/why-perfect-is-the-enemy-good&quot;&gt;Psychology Today&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
THEREFORE:&lt;br /&gt;
“Don&#39;t put off until tomorrow what you can do today.” ― Benjamin Franklin&lt;br /&gt;
&lt;br /&gt;
There are times when perfection is called for, of course, but allow me to suggest to you that most of the time, “good enough” will do. There’s a point where it takes more and more energy to achieve smaller and smaller gains. via &lt;a href=&quot;http://www.lifehack.org/articles/productivity/getting-to-good-enough.html&quot;&gt;LifeHack.org&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/610342722472015701/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2018/06/the-enemy-of-great.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/610342722472015701'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/610342722472015701'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2018/06/the-enemy-of-great.html' title='The enemy of great'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7_mqhyphenhyphen_C0VyIMxEFPveYRGAPPndnVX95OJM3Vs5WrUZZ6-p6iKSM5lFTxz4SB8dRp-TB176XVPEEikqCuZSI4ZMOIYppSEb82kIWsk8_nbYgSAjE2PY-4NNddg18wVtTYW4bGajcwtvU/s72-c/File+Jan+08%252C+2+17+34+PM.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-7020827139807963368</id><published>2015-08-20T15:07:00.003-07:00</published><updated>2015-08-20T15:07:31.572-07:00</updated><title type='text'>Network Device API intro &quot;Postman&quot;</title><content type='html'>Playing around with the basics on network device API calls again. &amp;nbsp;&lt;a href=&quot;https://www.getpostman.com/&quot;&gt;Postman&lt;/a&gt; is a great tool to try things out interactively. &amp;nbsp;Works great for me as a Chrome plugin.&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZA72uEH9vq5fluPJBSZq9sbX62ds-ltj0iBH-LY0SrQpsYWnmR-qe4nAvsjyxudFSKQvYeDLAmTGJUTFfcOabhbOMONiCBWxtD6yrpkb9O49jMwGJaXVwLAfGuq0Ij4W19nah-rkaT3Q/s1600/Screenshot+2015-08-20+15.51.43.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;355&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZA72uEH9vq5fluPJBSZq9sbX62ds-ltj0iBH-LY0SrQpsYWnmR-qe4nAvsjyxudFSKQvYeDLAmTGJUTFfcOabhbOMONiCBWxtD6yrpkb9O49jMwGJaXVwLAfGuq0Ij4W19nah-rkaT3Q/s640/Screenshot+2015-08-20+15.51.43.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Kudos to Matt Oswalt for a great post on&lt;a href=&quot;http://keepingitclassless.net/2014/02/cisco-aci-nexus-9000-nxapi/&quot;&gt; Nexus 9000 NX-API&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Finally, a little bit of super generic Python for getting &#39;show version&#39; from a switch:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;







&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s1&quot;&gt;import&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt; requests&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;import&lt;/span&gt;&lt;span class=&quot;s3&quot;&gt; json&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s3&quot;&gt;url=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&#39;http://YOURIP/ins&#39;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;switchuser=&lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&#39;USERID&#39;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;switchpassword=&lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&#39;PASSWORD&#39;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p4&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s3&quot;&gt;myheaders={&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&#39;content-type&#39;&lt;/span&gt;&lt;span class=&quot;s3&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&#39;application/json-rpc&#39;&lt;/span&gt;&lt;span class=&quot;s3&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;payload=[&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; {&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;jsonrpc&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;2.0&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;method&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;cli&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;params&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: {&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;cmd&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;show version&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;version&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;1&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;s2&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;&quot;id&quot;&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;: &lt;/span&gt;&lt;span class=&quot;s4&quot;&gt;1&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;s2&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/7020827139807963368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2015/08/network-device-api-intro-postman.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/7020827139807963368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/7020827139807963368'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2015/08/network-device-api-intro-postman.html' title='Network Device API intro &quot;Postman&quot;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZA72uEH9vq5fluPJBSZq9sbX62ds-ltj0iBH-LY0SrQpsYWnmR-qe4nAvsjyxudFSKQvYeDLAmTGJUTFfcOabhbOMONiCBWxtD6yrpkb9O49jMwGJaXVwLAfGuq0Ij4W19nah-rkaT3Q/s72-c/Screenshot+2015-08-20+15.51.43.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-2038879419253713802</id><published>2015-06-25T12:11:00.001-07:00</published><updated>2015-06-25T12:34:11.645-07:00</updated><title type='text'>DevOps for Network Engineers</title><content type='html'>Network Engineers need to not only think about network programmability and automation. &amp;nbsp;Take a higher look into reducing operations and moves/adds/changes into the smallest incremental steps first. &amp;nbsp;Here are some great references to give you some thoughts on this.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=_I94-tJlovg&quot;&gt;What is DevOps in Simple English&lt;/a&gt;&amp;nbsp;– Rackspace&lt;br /&gt;
&lt;br /&gt;
Ivan Pepelnjak&amp;nbsp;&lt;a href=&quot;http://twitter.com/ioshints&quot;&gt;@ioshints&lt;/a&gt;&amp;nbsp;describes how &quot;&lt;a href=&quot;http://blog.ipspace.net/2014/06/infrastructure-as-code-actually-makes.html&quot;&gt;Infrastructure as Code&lt;/a&gt;&quot; makes sense&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://twitter.com/dave_tucker&quot;&gt;@dave_tucker&lt;/a&gt;&amp;nbsp;gives a nice &quot;NetOps to DevOps&quot; &lt;a href=&quot;http://dtucker.co.uk/work/a-netops-to-devops-training-plan.html&quot;&gt;plan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=lC8YptCRZck&amp;amp;feature=youtu.be&amp;amp;list=UUd6MoB9NC6uYN2grvUNT-Zg&quot;&gt;Bimodal IT&lt;/a&gt;&amp;nbsp;– Lydia Leong of Gartner&lt;br /&gt;
&lt;br /&gt;
BONUS: &amp;nbsp;Familiarize yourself with revision control. &amp;nbsp;&lt;a href=&quot;http://twitter.com/DavidJohnGee&quot;&gt;@DavidJohnGee&lt;/a&gt; &lt;a href=&quot;http://ipengineer.net/2015/04/git-for-network-engineers/&quot;&gt;describes Git&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/2038879419253713802/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2015/06/devops-for-network-engineers_25.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2038879419253713802'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2038879419253713802'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2015/06/devops-for-network-engineers_25.html' title='DevOps for Network Engineers'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-9137600446952106680</id><published>2015-03-11T13:31:00.000-07:00</published><updated>2015-03-11T13:31:12.054-07:00</updated><title type='text'>Larger, quicker, mobile Networking as in IoT</title><content type='html'>I was wondering how thousands of new, tiny, mobile devices (such as sensor networks and the Internet of Things) might be assisted by IPv6. &amp;nbsp; Think about the obvious needs introduced:&lt;br /&gt;
&lt;br /&gt;
1) Many Addresses &amp;nbsp;- estimates range from 10&#39;s to 100&#39;s for every person&lt;br /&gt;
&lt;br /&gt;
2) Low Memory &amp;nbsp;- sensors will be small and somewhat cheap&lt;br /&gt;
&lt;br /&gt;
3) Mobile - &amp;nbsp;where are they going to be and will they be needed elsewhere tomorrow?&lt;br /&gt;
&lt;br /&gt;
4) Low-touch &amp;nbsp;- &amp;nbsp;by sheer numbers managing one-by-one is an impossibility&lt;br /&gt;
&lt;br /&gt;
The current Internet Protocol dominant on the Internet (IPv4) isn&#39;t so upstanding for this. &amp;nbsp;The newer version (IPv6) is looking much more handy! &amp;nbsp;Found this &lt;a href=&quot;http://iot6.eu/ipv6_advantages_for_iot&quot;&gt;article&lt;/a&gt; from a European Research project looking into just that. &lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-BXaLb_dNkdg/VQCltKE4yuI/AAAAAAABI3Y/hYDi_K2E3qs/s1600/iot6-eu-logo.png&quot; height=&quot;36&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; width=&quot;320&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;www.iot6.eu&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Check out all their material</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/9137600446952106680/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2015/03/larger-quicker-mobile-networking-as-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/9137600446952106680'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/9137600446952106680'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2015/03/larger-quicker-mobile-networking-as-in.html' title='Larger, quicker, mobile Networking as in IoT'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-BXaLb_dNkdg/VQCltKE4yuI/AAAAAAABI3Y/hYDi_K2E3qs/s72-c/iot6-eu-logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-2637988024210177127</id><published>2015-03-03T05:30:00.000-08:00</published><updated>2015-03-03T09:04:31.594-08:00</updated><title type='text'>IoT Links Feb-2015</title><content type='html'>This student paper gives a pretty decent lay of the land.&lt;br /&gt;
&lt;a href=&quot;https://sites.google.com/a/cortland.edu/the-internet-of-things/summary&quot;&gt;https://sites.google.com/a/cortland.edu/the-internet-of-things/summary&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Cisco&#39;s 2011 whitepaper framed things up nicely and is still very relevant.&lt;br /&gt;
&lt;a href=&quot;http://www.cisco.com/web/.../IoT_IBSG_0411FINAL.pdf&quot;&gt;www.cisco.com/web/.../IoT_IBSG_0411FINAL.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-PIfpOWKrsCk/VPE6czrM1dI/AAAAAAABIws/mXqeE5M0W44/s1600/connected-devices-2013.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-PIfpOWKrsCk/VPE6czrM1dI/AAAAAAABIws/mXqeE5M0W44/s1600/connected-devices-2013.jpg&quot; height=&quot;240&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Ecobee, Lyric, and Nest...oh my!&lt;br /&gt;
&lt;a href=&quot;http://smartthermostatguide.com/&quot;&gt;http://smartthermostatguide.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Big Data, analytics, and finding value in Internet of things.&lt;br /&gt;
&lt;a href=&quot;http://www.networkworld.com/article/2889975/careers/future-proof-your-it-career-8-tech-areas-that-will-still-be-hot-in-2020.html&quot;&gt;http://www.networkworld.com/article/2889975/careers/future-proof-your-it-career-8-tech-areas-that-will-still-be-hot-in-2020.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Sensor technology will be all the difference for IoT&lt;br /&gt;
&lt;a href=&quot;http://www.forbes.com/sites/tjmccue/2015/02/24/a-butterfly-wing-inspired-sensor-may-save-your-life/&quot;&gt;http://www.forbes.com/sites/tjmccue/2015/02/24/a-butterfly-wing-inspired-sensor-may-save-your-life/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Always wanted my cell phone mic right inside my mouth!&lt;br /&gt;
&lt;a href=&quot;https://wtvox.com/2014/10/top-10-implantable-wearables-soon-body/&quot;&gt;https://wtvox.com/2014/10/top-10-implantable-wearables-soon-body/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/2637988024210177127/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2015/03/iot-links-feb-2015.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2637988024210177127'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2637988024210177127'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2015/03/iot-links-feb-2015.html' title='IoT Links Feb-2015'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-PIfpOWKrsCk/VPE6czrM1dI/AAAAAAABIws/mXqeE5M0W44/s72-c/connected-devices-2013.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-6919633521974441835</id><published>2012-10-04T10:23:00.001-07:00</published><updated>2012-10-04T10:23:50.402-07:00</updated><title type='text'>Regional leadership in IPv6</title><content type='html'>Network World claims &lt;a href=&quot;http://www.networkworld.com/news/2012/092412-ipv6-side-262674.html&quot;&gt;&quot;The US is overtaking the world on IPv6&quot;&lt;/a&gt; , but I&#39;m not entirely convinced. &lt;br /&gt;
&lt;br /&gt;
Seems like when the numbers can support the claim such as overall traffic, North America vs. all of Asia numbers are shown. &amp;nbsp;When it&#39;s a bit closer, such as in number of addresses or vendor support the numbers are broken down by country to show the US is slightly ahead of China but not all of Asia.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpv4E83m2HEor9DhdHYVYXNw5UOJ7WKncf8GPJB3gxifMf7fLUBJfX8vHYG5EjEUMbPGK61N9H5j1UbhiXzGVFthe-qUgb1uM_GMnSyxZwDcOXDuzA1dS-nUxVwmnxTuO-eh3Oz1enVI/s1600/Screen+Shot+2012-10-04+at+11.17.44+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;123&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpv4E83m2HEor9DhdHYVYXNw5UOJ7WKncf8GPJB3gxifMf7fLUBJfX8vHYG5EjEUMbPGK61N9H5j1UbhiXzGVFthe-qUgb1uM_GMnSyxZwDcOXDuzA1dS-nUxVwmnxTuO-eh3Oz1enVI/s400/Screen+Shot+2012-10-04+at+11.17.44+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
It&#39;s nice to see that North America is no longer ignoring the protocol and the future of the Internet. &amp;nbsp;Now let&#39;s see how we are doing in percentage of bandwidth and percentage of total users!</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/6919633521974441835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/10/regional-leadership-in-ipv6.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/6919633521974441835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/6919633521974441835'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/10/regional-leadership-in-ipv6.html' title='Regional leadership in IPv6'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilpv4E83m2HEor9DhdHYVYXNw5UOJ7WKncf8GPJB3gxifMf7fLUBJfX8vHYG5EjEUMbPGK61N9H5j1UbhiXzGVFthe-qUgb1uM_GMnSyxZwDcOXDuzA1dS-nUxVwmnxTuO-eh3Oz1enVI/s72-c/Screen+Shot+2012-10-04+at+11.17.44+AM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-6293691578745511121</id><published>2012-09-20T09:23:00.000-07:00</published><updated>2012-09-25T06:40:14.588-07:00</updated><title type='text'>SSL and TLS - What do browsers use to encrypt?</title><content type='html'>I&#39;ll spare you all the gory details you can read on &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security&quot;&gt;wikipedia&lt;/a&gt;, but these are protocols used to encrypt data exchanged by browsers and web servers for keeping information private and unchanged. &amp;nbsp;Secure Sockets Layer (SSL) has been through versions 1, 2, and 3. &amp;nbsp;All by 1996 ! &amp;nbsp; Transport Layer Security (TLS) was released as version 1.0 in 1999. &amp;nbsp;(Also a !).&lt;br /&gt;
&lt;br /&gt;
You may often see references to &lt;b&gt;SSL3/TLS1.0&lt;/b&gt; because &quot;&lt;span style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px;&quot;&gt;TLS 1.0 does include a means by which a TLS implementation can downgrade the connection to SSL 3.0, &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.0&quot;&gt;thus weakening security&lt;/a&gt;.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
TLS1.1 was defined in 2006. &amp;nbsp; TLS1.2 was defined in 2008. &amp;nbsp;As of 2012, IE9 appears to be the only major browser to support it. &lt;br /&gt;
&lt;br /&gt;
In his great BlackHat 2010 &lt;a href=&quot;http://blog.ivanristic.com/Qualys_SSL_Labs-State_of_SSL_2010-v1.6.pdf&quot;&gt;presentation&lt;/a&gt;, Ivan Ristic presents great statistics on server support for these protocols discovered during surveying:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKEC60vpNfetUvV1Ofwv5Zc_n-Ao5SXgTbvyEJr3-_cCqQqnRW2CxhpwyUpJixj8rUZF7E_UFdRgo_y0Rxs60bwI4KEGcFp94af2x8gn2VDLve9dearrVPl-NaBflCZZ-sPOfxku2HVdc/s1600/Screen+Shot+2012-09-20+at+10.07.24+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;331&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKEC60vpNfetUvV1Ofwv5Zc_n-Ao5SXgTbvyEJr3-_cCqQqnRW2CxhpwyUpJixj8rUZF7E_UFdRgo_y0Rxs60bwI4KEGcFp94af2x8gn2VDLve9dearrVPl-NaBflCZZ-sPOfxku2HVdc/s640/Screen+Shot+2012-09-20+at+10.07.24+AM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/6293691578745511121/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/09/ssl-and-tls-what-do-browsers-use-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/6293691578745511121'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/6293691578745511121'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/09/ssl-and-tls-what-do-browsers-use-to.html' title='SSL and TLS - What do browsers use to encrypt?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKEC60vpNfetUvV1Ofwv5Zc_n-Ao5SXgTbvyEJr3-_cCqQqnRW2CxhpwyUpJixj8rUZF7E_UFdRgo_y0Rxs60bwI4KEGcFp94af2x8gn2VDLve9dearrVPl-NaBflCZZ-sPOfxku2HVdc/s72-c/Screen+Shot+2012-09-20+at+10.07.24+AM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-1731815101295290898</id><published>2012-08-13T11:24:00.001-07:00</published><updated>2012-08-15T11:57:48.927-07:00</updated><title type='text'>nping, a ping for more protocols</title><content type='html'>&lt;a href=&quot;http://nmap.org/nping/&quot;&gt;Nping&lt;/a&gt; is really handy when you suspect that ping or traceroute aren&#39;t giving you clear results. &amp;nbsp;I really like it for a TCP Connect to a website:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;$ nping --tcp-connect -c 3 --delay 2s www.google.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Starting Nping 0.6.01 ( http://nmap.org/nping ) at 2012-08-13 12:09 MDT&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (0.0067s) Starting TCP Handshake &amp;gt; www.google.com:80 (74.125.225.176:80)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RECV (0.0209s) Handshake with www.google.com:80 (74.125.225.176:80) completed&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (2.0086s) Starting TCP Handshake &amp;gt; www.google.com:80 (74.125.225.176:80)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RECV (2.0250s) Handshake with www.google.com:80 (74.125.225.176:80) completed&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (4.0113s) Starting TCP Handshake &amp;gt; www.google.com:80 (74.125.225.176:80)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RECV (4.0244s) Handshake with www.google.com:80 (74.125.225.176:80) completed&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Max rtt: 16.390ms | Min rtt: 13.108ms | Avg rtt: 14.507ms&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;TCP connection attempts: 3 | Successful connections: 3 | Failed: 0 (0.00%)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Tx time: 4.00581s | Tx bytes/s: 59.91 | Tx pkts/s: 0.75&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Rx time: 4.01892s | Rx bytes/s: 29.86 | Rx pkts/s: 0.75&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Nping done: 1 IP address pinged in 4.02 seconds&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
You can also scan MAC addresses on your local subnet:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;$ sudo nping --arp-type ARP 172.16.16.1-10 --count 1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;








&lt;br /&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (4.8530s) ARP who has 172.16.16.1? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RCVD (4.8546s) ARP reply 172.16.16.1 is at 1C:DF:DF:53:91:91&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (5.8538s) ARP who has 172.16.16.2? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RCVD (5.8548s) ARP reply 172.16.16.2 is at 00:26:9F:37:33:33&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (6.8556s) ARP who has 172.16.16.3? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RCVD (6.9364s) ARP reply 172.16.16.3 is at A4:EF:57:E3:EA:EA&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (7.8575s) ARP who has 172.16.16.4? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (8.8582s) ARP who has 172.16.16.5? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (9.8587s) ARP who has 172.16.16.6? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (10.8600s) ARP who has 172.16.16.7? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (11.8612s) ARP who has 172.16.16.8? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (12.8621s) ARP who has 172.16.16.9? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;RCVD (12.8656s) ARP reply 172.16.16.9 is at 00:21:CF:BD:1F:1F&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;SENT (13.8634s) ARP who has 172.16.16.10? Tell 172.16.16.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Raw packets sent: 10 (420B) | Rcvd: 4 (184B) | Lost: 6 (60.00%)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Tx time: 9.01162s | Tx bytes/s: 46.61 | Tx pkts/s: 1.11&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Rx time: 10.01221s | Rx bytes/s: 18.38 | Rx pkts/s: 0.40&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: x-small;&quot;&gt;Nping done: 10 IP addresses pinged in 14.86 seconds&lt;/span&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/1731815101295290898/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/08/nping-ping-for-more-protocols.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/1731815101295290898'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/1731815101295290898'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/08/nping-ping-for-more-protocols.html' title='nping, a ping for more protocols'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-3351089356135803357</id><published>2012-07-13T08:15:00.000-07:00</published><updated>2012-07-13T08:15:13.950-07:00</updated><title type='text'>Integrating routing with CDN</title><content type='html'>&lt;span style=&quot;color: #222222; font-family: arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 15px;&quot;&gt;A content delivery network (&lt;a href=&quot;http://en.wikipedia.org/wiki/Content_delivery_network&quot;&gt;CDN&lt;/a&gt;) is a large distributed system of servers deployed in multiple data centers in the Internet.[citation needed] The goal of a CDN is to serve content to end-users with high availability and high performance.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 15px;&quot;&gt;Uniform Resource Identifier (URI) is a string of characters used to identify a name or a resource on the Internet.&amp;nbsp;-&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: arial, sans-serif; font-size: x-small; line-height: 15px;&quot;&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;en.wikipedia.org/wiki/URI&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #009933; font-family: arial, sans-serif; font-size: x-small; line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;Border Gateway Protocol&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;&amp;nbsp;(&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;BGP&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;) is the protocol which is the core routing decisions on the&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet&quot; style=&quot;background-image: none; color: #0b0080; font-family: sans-serif; font-size: 13px; line-height: 19px; text-decoration: none;&quot; title=&quot;Internet&quot;&gt;Internet&lt;/a&gt;&lt;span style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;. It maintains a table of IP networks or &#39;prefixes&#39; which designate network reach-ability&amp;nbsp;-&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; line-height: 19px;&quot;&gt;&lt;span style=&quot;color: #38761d; font-family: sans-serif; font-size: x-small;&quot;&gt;en.wikipedia.org/wiki/BGP&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;The &lt;a href=&quot;http://www.ietf.org/rfc/rfc2858.txt&quot;&gt;multiprotocol extensions&lt;/a&gt; of BGP has been used to carry many types of information. &amp;nbsp;I stumbled across a great progression on the idea from this NANOG &lt;a href=&quot;http://www.nanog.org/meetings/nanog55/presentations/Tuesday/Field.pdf&quot;&gt;presentation&lt;/a&gt; from the guys at Comcast.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;Here&#39;s their packet capture screenshot. &amp;nbsp;Notice the Address Family - &amp;nbsp;URI.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVX-0nqTbZsnoUZ3TolE7XopLBfe3qXhbtZBqRogbt6nC8h70Bz7rweLIMa6_HaeJp08vnGFXUHcAlssh8U7LS13cz4KLwz0Aq5YThc-tCmjOqz6R4xnJd4CFU8CIhpYzYGffXWDn64TI/s1600/Screen+Shot+2012-07-13+at+9.12.00+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVX-0nqTbZsnoUZ3TolE7XopLBfe3qXhbtZBqRogbt6nC8h70Bz7rweLIMa6_HaeJp08vnGFXUHcAlssh8U7LS13cz4KLwz0Aq5YThc-tCmjOqz6R4xnJd4CFU8CIhpYzYGffXWDn64TI/s400/Screen+Shot+2012-07-13+at+9.12.00+AM.png&quot; width=&quot;375&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/3351089356135803357/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/07/integrating-routing-with-cdn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3351089356135803357'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3351089356135803357'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/07/integrating-routing-with-cdn.html' title='Integrating routing with CDN'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVX-0nqTbZsnoUZ3TolE7XopLBfe3qXhbtZBqRogbt6nC8h70Bz7rweLIMa6_HaeJp08vnGFXUHcAlssh8U7LS13cz4KLwz0Aq5YThc-tCmjOqz6R4xnJd4CFU8CIhpYzYGffXWDn64TI/s72-c/Screen+Shot+2012-07-13+at+9.12.00+AM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-9131154853377352084</id><published>2012-06-22T11:25:00.001-07:00</published><updated>2012-06-22T11:33:35.364-07:00</updated><title type='text'>IPv1 , v2, and v3</title><content type='html'>I always hear &quot;What happened to IP version 5?&quot; But we&#39;ve seen the answer many times. &amp;nbsp;&quot;Some experimental testing version&quot;.&lt;br /&gt;
&lt;br /&gt;
While reading Charles Kozierok&#39;s excellent &lt;a href=&quot;http://www.nostarch.com/tcpip.htm&quot;&gt;TCP/IP Guide&lt;/a&gt;, I found the history of&lt;a href=&quot;http://www.tcpipguide.com/free/t_IPHistoryStandardsVersionsandCloselyRelatedProtoco.htm&quot;&gt; why IPv4 was actually the first version of IP&lt;/a&gt; as in a Layer 3 on it&#39;s own. &amp;nbsp;The addressing layer was part of the original Network Control Program and then Transmission Control Program combined into a single Layer3 and 4 functionality. &amp;nbsp; TCP became Transmission Control Protocol by its &#39;fourth iteration&#39;.</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/9131154853377352084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/06/ipv1-v2-and-v3.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/9131154853377352084'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/9131154853377352084'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/06/ipv1-v2-and-v3.html' title='IPv1 , v2, and v3'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-3468979703594143938</id><published>2012-06-19T08:46:00.001-07:00</published><updated>2012-06-19T08:46:55.815-07:00</updated><title type='text'>Why hasn&#39;t networking followed Moore&#39;s Law ?</title><content type='html'>Andy Bechtolsheim&#39;s &lt;a href=&quot;http://www.nanog.org/meetings/nanog55/abstracts.php?pt=MTk0MSZuYW5vZzU1&amp;amp;nm=nanog55&quot;&gt;keynote at NANOG55&lt;/a&gt; in Vancouver looks into what&#39;s been going on with networking versus Moore&#39;s Law:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqRHZo0-KRXGK3Umf0MOYdw8joWtN3QzOQtA6SOIoCcqat8yya2ULsq9a6qzqSqWBMPVRNgUNuFKIBiBM_I3EJlejOz-68cGEZUk-_gUs-f-3wH5EUpETSiMmAlA9LjBxVaJqgwfonIk/s1600/moores-networking.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqRHZo0-KRXGK3Umf0MOYdw8joWtN3QzOQtA6SOIoCcqat8yya2ULsq9a6qzqSqWBMPVRNgUNuFKIBiBM_I3EJlejOz-68cGEZUk-_gUs-f-3wH5EUpETSiMmAlA9LjBxVaJqgwfonIk/s320/moores-networking.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Follow the link to his slides in PDF. &amp;nbsp;There are some fantastic graphs on:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Server 10/40/100G Adoption Cycle&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Total Datacenter Switch Revenue by Protocol &amp;amp; Speed&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
Today&#39;s custom switch silicon support 64 10G ports on a single chip but forecast to scale by 4X in the next 3 years. &amp;nbsp;He wraps up the presentation looking into ways to alleviate the current high cost of optics slowing down 40G/100G adoption.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/3468979703594143938/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/06/why-hasnt-networking-followed-moores.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3468979703594143938'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3468979703594143938'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/06/why-hasnt-networking-followed-moores.html' title='Why hasn&#39;t networking followed Moore&#39;s Law ?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqRHZo0-KRXGK3Umf0MOYdw8joWtN3QzOQtA6SOIoCcqat8yya2ULsq9a6qzqSqWBMPVRNgUNuFKIBiBM_I3EJlejOz-68cGEZUk-_gUs-f-3wH5EUpETSiMmAlA9LjBxVaJqgwfonIk/s72-c/moores-networking.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-5196415912725921559</id><published>2012-06-06T09:55:00.001-07:00</published><updated>2012-06-06T09:55:44.902-07:00</updated><title type='text'>IPv6 Day</title><content type='html'>Early today, major web sites enabled their DNS &#39;quad A&#39; or AAAA entries.  &lt;br /&gt;
&lt;br /&gt;
These include google.com, bing.com, facebook.com, yahoo.com, youtube.com and aol.com.&lt;br /&gt;
&lt;br /&gt;
I especially like Facebook&#39;s IPv6 address:&lt;br /&gt;
&lt;br /&gt;
2A03:2880:2110:3F03:FACE:B00C::&lt;br /&gt;
&lt;br /&gt;
It looks like traffic to Google over one backbone immediately doubled... Albeit up to almost 2% of total traffic.&lt;br /&gt;
&lt;br /&gt;
I&#39;m told that unlike last year, these updates are planned to be permanent. Sure is a step in the right direction!</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/5196415912725921559/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/06/ipv6-day.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/5196415912725921559'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/5196415912725921559'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/06/ipv6-day.html' title='IPv6 Day'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-2557312716957004924</id><published>2012-05-31T09:38:00.005-07:00</published><updated>2013-11-07T06:39:41.275-08:00</updated><title type='text'>A Brief History of SDN</title><content type='html'>&lt;a href=&quot;https://www.opennetworking.org/&quot;&gt;Software Defined Networking&lt;/a&gt;&amp;nbsp;is a new and &lt;a href=&quot;http://blog.ioshints.info/search/label/OpenFlow&quot;&gt;exciting development&lt;/a&gt; in networking. &amp;nbsp;However, it&#39;s been a long time coming:&lt;br /&gt;
&lt;br /&gt;
1985 &amp;nbsp; &amp;nbsp;&lt;a href=&quot;http://docwiki.cisco.com/wiki/Interior_Gateway_Routing_Protocol&quot;&gt;IGRP&lt;/a&gt;&amp;nbsp; planned to take into count metrics beyond hop count to include reliability and load&lt;br /&gt;
&lt;br /&gt;
1991 &amp;nbsp; &amp;nbsp;&lt;a href=&quot;http://tools.ietf.org/html/rfc1247&quot;&gt;OSPF&lt;/a&gt;&amp;nbsp; specified calculating paths to deliver better throughput, lower latency, etc. &amp;nbsp;John Moy&#39;s excellent &lt;a href=&quot;http://www.amazon.com/OSPF-Anatomy-Internet-Routing-Protocol/dp/0201634724&quot;&gt;book&lt;/a&gt;&amp;nbsp;remains one of my very favorites.&lt;br /&gt;
&lt;br /&gt;
1996 &amp;nbsp; &amp;nbsp;Cisco &lt;a href=&quot;http://www.cisco.com/en/US/products/ps6637/products_ios_protocol_option_home.html&quot;&gt;Policy Based Routing&lt;/a&gt;&amp;nbsp;was introduced with IOS 11.0 and &quot;&lt;span style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 11px;&quot;&gt;provides a flexible mechanism for network administrators to customize the operation of the routing table and the flow of traffic within their networks.&lt;/span&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
2006 &amp;nbsp; &amp;nbsp;Cisco &lt;a href=&quot;http://www.netcraftsmen.net/resources/archived-articles/443.html&quot;&gt;OER&lt;/a&gt;&amp;nbsp; became &lt;a href=&quot;http://docwiki.cisco.com/wiki/PfR:Home&quot;&gt;PfR&lt;/a&gt;&amp;nbsp;sometime around 2010. &amp;nbsp;It allows the traffic forwarding decision to be based on delay, packet loss, and link loading. &amp;nbsp;Arguably the closest precursor to &lt;a href=&quot;http://www.networkcomputing.com/data-networking-management/240000171&quot;&gt;SDN &lt;/a&gt;(at least from Cisco) in that it has a &#39;separation of control plane&#39;, &#39;a centralized controller&#39; and possibly &#39;programmability by external applications.&lt;br /&gt;
&lt;br /&gt;
Please send me other examples!</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/2557312716957004924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/05/brief-history-of-sdn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2557312716957004924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2557312716957004924'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/05/brief-history-of-sdn.html' title='A Brief History of SDN'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-8793966193072319727</id><published>2012-05-24T11:04:00.000-07:00</published><updated>2012-05-24T11:04:27.079-07:00</updated><title type='text'>Slow TCP but no packet loss</title><content type='html'>Many times I&#39;ve heard the claim &quot;out-of-order packets&quot; wreak havoc with your application. &amp;nbsp;Many interpretations conclude that must be because of poor application coding. &amp;nbsp;Blaming others can flow both ways, it seems. &amp;nbsp;&lt;a href=&quot;http://ask.wireshark.org/questions/2133/triple-duplicate-acks&quot;&gt;My favorite comment&lt;/a&gt; in all threads about Duplicate ACKs and Fast Retransmit concludes with &quot;&lt;span style=&quot;background-color: white; color: #444444; font-family: sans-serif; font-size: 12px; line-height: 16px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #444444; font-family: sans-serif; font-size: 12px; line-height: 16px;&quot;&gt;how the network performance is improved by a server reboot.&amp;nbsp;&lt;/span&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
Back to our main concern here. &amp;nbsp;When a receiver gets TCP datagrams 1,2,3 and 5 it will immediately send an ACK expecting 4 as it already did to confirm receipt of datagram 3. &amp;nbsp;Ding. &amp;nbsp;First &#39;duplicate ACK&#39;.&lt;br /&gt;
&lt;br /&gt;
Now, listen closely as I don&#39;t plan to get in this habit. &amp;nbsp;The &lt;a href=&quot;http://tools.ietf.org/html/rfc2581&quot;&gt;RFC for TCP Congestion Control&lt;/a&gt; is a moderately pain-free read and gives the authoritative fundamentals on how TCP should behave. &amp;nbsp;Give it a look!&lt;br /&gt;
&lt;br /&gt;
The key to dig out is somewhere around page 6. &amp;nbsp;Duplicate ACKs cause sender to reduce window size. &amp;nbsp;The whole mechanism and scenarios for &lt;u&gt;SLOWING&lt;/u&gt;&amp;nbsp;down transmission rates of the TCP flow are detailed. &lt;br /&gt;
&lt;br /&gt;
MORAL: &amp;nbsp;nothing has to be lost and TCP can still determine congestion has been encountered and slow down. &amp;nbsp;Sometimes significantly. &amp;nbsp;Also came across these &lt;a href=&quot;http://www.borella.net/content/MITP432/TCP/09tcp.html&quot;&gt;great course slides&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/8793966193072319727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/05/slow-tcp-but-no-packet-loss.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8793966193072319727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8793966193072319727'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/05/slow-tcp-but-no-packet-loss.html' title='Slow TCP but no packet loss'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-8547495309745294632</id><published>2012-05-17T09:44:00.003-07:00</published><updated>2012-05-17T09:47:24.120-07:00</updated><title type='text'>Two missing but vital Cisco Nexus vPC commands</title><content type='html'>So you come across a pair of Nexus 5548 switches and dive right into setting up a Virtual PortChannel following the configuration guides. &amp;nbsp;You&#39;ll wind up with something like this:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6rYO_F8FYP9KSLQsf3NmAnXUVjffPpDrx28_s4XUoJjqO-U-rLf-3oAKgEkkxI5wnrVhyqNsI06ZMnVX1QxSNs2q1gJ0x6wy4w0xJXBAzZlexfM20QThgqbgxzbxCx5ldN6hiv_JBim4/s1600/vpc-basics.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6rYO_F8FYP9KSLQsf3NmAnXUVjffPpDrx28_s4XUoJjqO-U-rLf-3oAKgEkkxI5wnrVhyqNsI06ZMnVX1QxSNs2q1gJ0x6wy4w0xJXBAzZlexfM20QThgqbgxzbxCx5ldN6hiv_JBim4/s640/vpc-basics.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Things go swimmingly! &amp;nbsp;That is until you want to upgrade or have to power cycle one of the switches. &amp;nbsp;Your server can&#39;t get anywhere nor be reached for quite a few seconds. &amp;nbsp;Odd, you think. &amp;nbsp;Surely frames can happily flow along the remaining active link. &amp;nbsp;Isn&#39;t that what vPC is for? &amp;nbsp;As one switch comes back online, you then get ANOTHER period of lost connection to your server. &lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The following two commands come to the rescue.&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;auto-recovery &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;delay restore [sec]&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
The first allows a switch to either takeover as primary or re-enable a vpc during loss of keepalive. &amp;nbsp;A great description of the history behind this is posted by &lt;a href=&quot;http://www.fragmentationneeded.net/2010/10/vpc-failure-scenario.html&quot;&gt;Chris Marget&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The second helps prevent the vpc disruption when a vpc member switch comes back online. &amp;nbsp;The delay gives time to join the vpc domain and learn information before trying to forward frames.&lt;br /&gt;
&lt;br /&gt;
conf t&lt;br /&gt;
&amp;nbsp; vpc domain 1&lt;br /&gt;
&amp;nbsp; &amp;nbsp; auto-recovery&lt;br /&gt;
&amp;nbsp; &amp;nbsp; delay restore 120&lt;br /&gt;
&lt;br /&gt;
Have at it! &amp;nbsp;Some great Cisco operations guides are &lt;a href=&quot;http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/operations/n5k_vpc_ops.html&quot;&gt;here&lt;/a&gt;&amp;nbsp;and &lt;a href=&quot;http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/operations/n5k_L3_w_vpc_5500platform.html&quot;&gt;here&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/8547495309745294632/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/05/two-missing-but-vital-cisco-nexus-vpc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8547495309745294632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8547495309745294632'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/05/two-missing-but-vital-cisco-nexus-vpc.html' title='Two missing but vital Cisco Nexus vPC commands'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6rYO_F8FYP9KSLQsf3NmAnXUVjffPpDrx28_s4XUoJjqO-U-rLf-3oAKgEkkxI5wnrVhyqNsI06ZMnVX1QxSNs2q1gJ0x6wy4w0xJXBAzZlexfM20QThgqbgxzbxCx5ldN6hiv_JBim4/s72-c/vpc-basics.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-4052954198013046623</id><published>2012-05-08T13:04:00.002-07:00</published><updated>2012-05-08T13:04:55.586-07:00</updated><title type='text'>TCP Throughput across the Internet</title><content type='html'>After reading Brad Hedlund&#39;s &lt;a href=&quot;http://bradhedlund.com/2008/12/19/how-to-calculate-tcp-throughput-for-long-distance-links/&quot;&gt;excellent overview&lt;/a&gt;&amp;nbsp;and digging into the great &lt;a href=&quot;http://www.switch.ch/network/tools/tcp_throughput/index.html&quot;&gt;tools&lt;/a&gt;&amp;nbsp;at SWITCH, I ran some quick numbers for what transfers might see across the Internet.&lt;br /&gt;
&lt;br /&gt;First, taking low packet loss of 0.01% and checking across various delays from 5 to 60ms, I get:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5JCCso3LWPhfedX5DHxwj6OU-QOlY6hpfsjdX8NXZQk38Hfm3XiqWpoahukbfIALS925F1VhPD3PjOA6DIiP8fEihtCht2TNpgelsoXtNH50oDVEyIDgodQ_4XGjxT_JmHqNpvyzP738/s1600/tput-vs-rtt.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5JCCso3LWPhfedX5DHxwj6OU-QOlY6hpfsjdX8NXZQk38Hfm3XiqWpoahukbfIALS925F1VhPD3PjOA6DIiP8fEihtCht2TNpgelsoXtNH50oDVEyIDgodQ_4XGjxT_JmHqNpvyzP738/s400/tput-vs-rtt.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Then, using 60 ms as a rather normal round-trip time (RTT) across the Internet, I tried values for packet loss increasing to a very normal 0.1% :&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmUfzu8Fb049vuRTNBK52xABhkHkOEHQwssJNTE9us5imABKfXRnS_idWgtwvXG8E1En-LtcbvfLNn_nhNpK7qTTlHQS3aWv8rO-3sGepqiLMa32RSvjHG2V0ohdJm6Gu3U_XQFNlPNc/s1600/tput-vs-loss.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmUfzu8Fb049vuRTNBK52xABhkHkOEHQwssJNTE9us5imABKfXRnS_idWgtwvXG8E1En-LtcbvfLNn_nhNpK7qTTlHQS3aWv8rO-3sGepqiLMa32RSvjHG2V0ohdJm6Gu3U_XQFNlPNc/s400/tput-vs-loss.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Looks like it&#39;s pretty hard to fill that 25Mbps DSL. &amp;nbsp;In the future, I will look at tuning options for improving that. &amp;nbsp;Comments welcome!&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/4052954198013046623/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/05/tcp-throughput-across-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/4052954198013046623'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/4052954198013046623'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/05/tcp-throughput-across-internet.html' title='TCP Throughput across the Internet'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5JCCso3LWPhfedX5DHxwj6OU-QOlY6hpfsjdX8NXZQk38Hfm3XiqWpoahukbfIALS925F1VhPD3PjOA6DIiP8fEihtCht2TNpgelsoXtNH50oDVEyIDgodQ_4XGjxT_JmHqNpvyzP738/s72-c/tput-vs-rtt.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-175350531550559292</id><published>2012-05-04T10:20:00.000-07:00</published><updated>2012-05-04T10:20:29.215-07:00</updated><title type='text'>Response Time Composition</title><content type='html'>Waaaay back in 2006, I used a network monitoring appliance from Network Physics whom I&#39;d lost touch with. &amp;nbsp;It delivered this graph that quickly became my best friend:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvjiimAuorsvyLWqx6HSb97lkb_63R69KUvhdA1kq2Gj9Im2nA4FQ1QLh0NNxUSE6InvxWgSZlrsS-lM9PXvK-4OkwtqMDJlV3jWjyr4WtzeRanoM7aoZdwiSpEM4c2824gK0FCDMFN9U/s1600/arx_response-time-comp-chart_s.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvjiimAuorsvyLWqx6HSb97lkb_63R69KUvhdA1kq2Gj9Im2nA4FQ1QLh0NNxUSE6InvxWgSZlrsS-lM9PXvK-4OkwtqMDJlV3jWjyr4WtzeRanoM7aoZdwiSpEM4c2824gK0FCDMFN9U/s320/arx_response-time-comp-chart_s.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
One glance at the Response Time Composition and I could see what had changed from a baseline. &amp;nbsp;I could also see where to dig in further as to the cause of reported &#39;slowness&#39;. Of course it was never the network and quite often the server or sheer massiveness of application chattiness.&lt;br /&gt;
&lt;br /&gt;
I&#39;m pleased to say my old friend lives on and has been seriously enhanced by the folks at OPNET in their &lt;a href=&quot;http://www.opnet.com/solutions/application_performance/appresponse-xpert.html&quot;&gt;AppResponse Xpert&lt;/a&gt;&amp;nbsp;tool. &amp;nbsp;Even more super-cool is the SaaS edition that fires up right in your &lt;a href=&quot;https://twitter.com/#!/search/%23cloud&quot;&gt;#cloud&lt;/a&gt;&amp;nbsp;-running application via a sweet bit of JavaScript.</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/175350531550559292/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/05/response-time-composition.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/175350531550559292'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/175350531550559292'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/05/response-time-composition.html' title='Response Time Composition'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvjiimAuorsvyLWqx6HSb97lkb_63R69KUvhdA1kq2Gj9Im2nA4FQ1QLh0NNxUSE6InvxWgSZlrsS-lM9PXvK-4OkwtqMDJlV3jWjyr4WtzeRanoM7aoZdwiSpEM4c2824gK0FCDMFN9U/s72-c/arx_response-time-comp-chart_s.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-2689040504667133848</id><published>2012-04-27T13:46:00.000-07:00</published><updated>2012-04-27T13:46:37.162-07:00</updated><title type='text'>10Gig options within the rack</title><content type='html'>This is a roundup of my preliminary look into the current state of 10 Gigabit Ethernet cabling within a rack. &amp;nbsp;While 10GBASE-SR was the common compatibility choice, it&#39;s also one of the more expensive. &amp;nbsp;I&#39;ve seen it commonly supported in devices ranging from firewalls to storage.&lt;br /&gt;
&lt;br /&gt;
While a bit dated now, Lisa Huff gives a great analysis of the copper lay of the land in &lt;a href=&quot;http://www.datacenterstocks.com/2010/09/more-on-10g-cabling-in-data-center.html&quot;&gt;10GBASE-T vs 10GBASE-CR&lt;/a&gt; :&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 16px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &quot;Both SFP+ DAC and 10GBASE-T products will be needed in the long term – 10GBASE-T for inexpensive connections &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; and 10GBASE-CR (SFP+ DAC) for lower latency and lower power consumption.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
Howard Marks gives a great update on what&#39;s happening with the previous power-hog champion, originally weighing in at 8W PER PORT :&lt;br /&gt;
&lt;a href=&quot;http://www.networkcomputing.com/next-gen-network-tech-center/232301042#.T5b4xvdK5tg.blogger&quot;&gt;All I Want For Christmas Is 10Gbase-T - Network Computing&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
..which is partially in response to the original (and convincing) &lt;a href=&quot;http://etherealmind.com/size-cat6-cables-data-center-reliability-problems/&quot;&gt;attack on 10GBASE-T&lt;/a&gt; by the illustrious Mr. Ferro</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/2689040504667133848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/04/10gig-options-within-rack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2689040504667133848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/2689040504667133848'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/04/10gig-options-within-rack.html' title='10Gig options within the rack'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-8979486995878751845</id><published>2012-04-23T13:19:00.001-07:00</published><updated>2012-04-27T13:32:07.528-07:00</updated><title type='text'>DIY Router or Switch Management port</title><content type='html'>Say you&#39;ve become very fond of that dedicated management port on your &lt;a href=&quot;http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/data_sheet_c78-618603.html&quot;&gt;Cisco Nexus switch&lt;/a&gt;. Now how to connect your Catalyst 6500 into that out-of-band management network?&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://supportforums.cisco.com/thread/4798&quot;&gt;Local policy&lt;/a&gt; to the rescue! &amp;nbsp;This works like a champ and is not to be confused with &lt;a href=&quot;http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpbr_ps1835_TSD_Products_Configuration_Guide_Chapter.html&quot;&gt;Policy-based Routing&lt;/a&gt;. (Although PBR does have a great ring to it!).&lt;br /&gt;
&lt;br /&gt;
A local policy is triggered by packets involving the device itself. &amp;nbsp;Not traffic being routed through. &amp;nbsp;Here&#39;s a sample:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;ip local policy route-map local-mgmt&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;ip access-list extended mgmt&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;&amp;nbsp;permit icmp host 10.2.3.4 10.161.161.0 0.0.0.255&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;route-map local-mgmt permit 10&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;&amp;nbsp;match ip address mgmt&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;&amp;nbsp;set ip next-hop 10.2.161.1&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;end&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Where 10.2.3.4 is a loopback or other management-related interface on your switch and 10.2.161.1 is the next hop router that gets you to your management networks. &amp;nbsp;Of course you could just alternately make your OOB management a single, large, flat subnet. &amp;nbsp;Connected routes for the win!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For more information, &lt;a href=&quot;https://plus.google.com/114050454021687473940&quot;&gt;Petr Lapukhov&lt;/a&gt;&amp;nbsp;has several other &lt;a href=&quot;http://blog.ine.com/2008/02/13/tricks-with-local-policy-routing/&quot;&gt;examples&lt;/a&gt;, his fourth coinciding with mine above.</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/8979486995878751845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/04/diy-router-or-switch-managment-port.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8979486995878751845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/8979486995878751845'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/04/diy-router-or-switch-managment-port.html' title='DIY Router or Switch Management port'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-3352061956004404342</id><published>2012-04-18T14:01:00.001-07:00</published><updated>2012-05-04T12:46:19.921-07:00</updated><title type='text'>Brief Netflix analysis</title><content type='html'>&lt;img height=&quot;112&quot; src=&quot;https://encrypted-tbn3.google.com/images?q=tbn:ANd9GcTq_jU8snxPMEc7_6LFAbqY9bn0TJIucyMM--8aWiKZpF9aiXSblg&quot; width=&quot;200&quot; /&gt;
&lt;br /&gt;
Firing up &lt;a href=&quot;http://www.netflix.com/&quot;&gt;Netflix &amp;nbsp;&lt;/a&gt;in a browser, I decided to see what could be found. &amp;nbsp;Wireshark was my main cohort in this exercise. &amp;nbsp;Selecting &#39;Statistics...Conversations&#39; and then sorting by Bytes gave me these:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkCBGNxNUaAyRne8BSkIYc0PotKjTvCjuwuQetlRs8md2OzzvR-e6b0b3n8aAnGhpGiFw7NHgVUGhuT83Gv55VCapQj42qXptjAfP296017EjiHwzSGpGTArwJMJJTQbmzZcAVtyRw1aY/s1600/top-conv.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkCBGNxNUaAyRne8BSkIYc0PotKjTvCjuwuQetlRs8md2OzzvR-e6b0b3n8aAnGhpGiFw7NHgVUGhuT83Gv55VCapQj42qXptjAfP296017EjiHwzSGpGTArwJMJJTQbmzZcAVtyRw1aY/s1600/top-conv.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Back in the main capture, I looked at what order these remote IP&#39;s were referred and then tried a reverse DNS lookup:&lt;br /&gt;
&lt;br /&gt;
&amp;gt;nslookup 50.19.81.73&lt;br /&gt;
Name: &amp;nbsp; &amp;nbsp;ec2-50-19-81-73.compute-1.amazonaws.com&lt;br /&gt;
Address: &amp;nbsp;50.19.81.73&lt;br /&gt;
&lt;br /&gt;
&amp;gt;nslookup 65.126.84.9&lt;br /&gt;
Name: &amp;nbsp; &amp;nbsp;a65-126-84-9.deploy.akamaitechnologies.com&lt;br /&gt;
Address: &amp;nbsp;65.126.84.9&lt;br /&gt;
&lt;br /&gt;
&amp;gt;nslookup 65.126.84.11&lt;br /&gt;
Name: &amp;nbsp; &amp;nbsp;a65-126-84-11.deploy.akamaitechnologies.com&lt;br /&gt;
Address: &amp;nbsp;65.126.84.11&lt;br /&gt;
&lt;br /&gt;
&amp;gt;nslookup 65.126.84.18&lt;br /&gt;
Name: &amp;nbsp; &amp;nbsp;a65-126-84-18.deploy.akamaitechnologies.com&lt;br /&gt;
Address: &amp;nbsp;65.126.84.18&lt;br /&gt;
&lt;br /&gt;
So it seems the main &#39;logic&#39; of the website such as account login, pulling up my favorites, and searching for movies is hosted on Amazon. &amp;nbsp;My guess is that the movie poster images are hosted on Akamai. &amp;nbsp;The HTTP content of that field confirms:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
GET /en_us/boxshots/166/60020865.jpg HTTP/1.1\r\n&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Host: cdn-5.nflximg.com\r\n&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Keep-Alive: 115\r\n&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Connection: keep-alive\r\n&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Referer: http://movies.netflix.com/WiHome\r\n&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Finally, I pulled out the TCP stream for the top flow based on Bytes. &amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibApnlFI9v-dk_TD04NbN9q4YYbHe35dJ_CRNqxntsk81f-jOvWIhPlG8GD6Wnjx-qA2Iylo8FOIGQSvWV12gdjQRv-Mnh_fwpbBjq8GNHWbB4qDDjSqxLwbxYJ-a0vKZyQ9f_wq-6Z-0/s1600/apply-as-filter.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;54&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibApnlFI9v-dk_TD04NbN9q4YYbHe35dJ_CRNqxntsk81f-jOvWIhPlG8GD6Wnjx-qA2Iylo8FOIGQSvWV12gdjQRv-Mnh_fwpbBjq8GNHWbB4qDDjSqxLwbxYJ-a0vKZyQ9f_wq-6Z-0/s320/apply-as-filter.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&amp;nbsp;A &#39;whois&#39; on the IP reveals it is from Level3:&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;NetRange: 8.0.0.0 - 8.255.255.255&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;CIDR: 8.0.0.0/8&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;NetType: Direct Allocation&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;OrgName: Level 3 Communications, Inc.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;text-align: left;&quot;&gt;&amp;nbsp; The Wireshark decode shows an HTTP/1.1 stream (&lt;/span&gt;Content-Type: application/octet-stream\r\n ,&amp;nbsp;Server: Level-3 Origin Storage/1.5\r\n)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFS457fplOEo8ntkFQm8ZdbamI3qX_pJLjuONiHa2z5DXNIhXfWCYjbLdr-Rru5M3YfMHpc1-KaS5GIutOksx1HqBKRom2I1SZQX3wh4qnGaricLU7QhravH9sx9HiZx5lUe8I0qmsn_Q/s1600/moviehash.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;123&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFS457fplOEo8ntkFQm8ZdbamI3qX_pJLjuONiHa2z5DXNIhXfWCYjbLdr-Rru5M3YfMHpc1-KaS5GIutOksx1HqBKRom2I1SZQX3wh4qnGaricLU7QhravH9sx9HiZx5lUe8I0qmsn_Q/s640/moviehash.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;text-align: left;&quot;&gt;&amp;nbsp;A little bit of packet capture tells us they use Amazon Web Services for the front-end and account logic, Akamai for static content, and Level3 Storage for the media streams. &amp;nbsp;Some to-do items: check browser data for the application type that plays the media and look for TCP header data to learn more about flow control and media streaming.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #f2f1f1; font-family: Verdana, Arial, Helvetica, San-Serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/3352061956004404342/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/04/brief-netflix-analysis.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3352061956004404342'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/3352061956004404342'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/04/brief-netflix-analysis.html' title='Brief Netflix analysis'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkCBGNxNUaAyRne8BSkIYc0PotKjTvCjuwuQetlRs8md2OzzvR-e6b0b3n8aAnGhpGiFw7NHgVUGhuT83Gv55VCapQj42qXptjAfP296017EjiHwzSGpGTArwJMJJTQbmzZcAVtyRw1aY/s72-c/top-conv.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3531572539467734322.post-1099698321859440810</id><published>2012-04-16T10:02:00.000-07:00</published><updated>2012-04-16T13:54:46.689-07:00</updated><title type='text'>North American IPv6 Summit</title><content type='html'>Last week, Denver hosted the &lt;a href=&quot;http://www.rmv6tf.org/IPv6Summit.htm&quot;&gt;2012 North American IPv6 Summit&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The keynote by &lt;a href=&quot;https://twitter.com/jcurranarin/&quot;&gt;John Curran&lt;/a&gt; of ARIN kicked things off nicely. &amp;nbsp;My favorite points were:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&amp;nbsp;A few years ago, NAT was sounding the death knell for IPv6 adoption.&lt;/li&gt;
&lt;li&gt;Today, media providers are hindered by NAT. (Think tracking and targeting...) &amp;nbsp;Follow the money people - IPv6 is gaining support.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
Other interesting tidbits overheard:&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Enable a client for IPv6 and see content come in that way as much as 10% of the time.&lt;/li&gt;
&lt;li&gt;Enable a web server for IPv6 and only get &amp;lt;1% traffic over it.&lt;/li&gt;
&lt;li&gt;Over 30% of DNS domains are IPv6-enabled largely due to efforts of &lt;a href=&quot;http://www.eweek.com/c/a/IT-Infrastructure/Go-Daddy-Major-Driver-in-IPv6-Growth-Survey-Finds-481227/&quot;&gt;Godaddy &lt;/a&gt;and other leading registrars.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
I learned from Oracle&#39;s Paul Zawacky that &#39;dual stack&#39; is becoming the transition method of choice. &amp;nbsp;&lt;a href=&quot;http://owend.corp.he.net/&quot;&gt;Owen Delong&lt;/a&gt; from Hurricane Electric advised to stick with a /64 per VLAN and stay away from &quot;IPv4 thinking&quot; when considering alternate subnet masks. &amp;nbsp;Finally,&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/NAT64&quot;&gt;NAT64 &lt;/a&gt;is a very interesting method for moving all hosts to a pure-IPv6 environment and maintaining v4 Internet access.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://twitter.com/scotthogg&quot;&gt;@scotthogg&lt;/a&gt; organized and &lt;a href=&quot;http://www.networkworld.com/community/blog/ipv6-summit-recap&quot;&gt;summarized &lt;/a&gt;the event quite nicely. &amp;nbsp;Thanks!&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.bitpilot.net/feeds/1099698321859440810/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.bitpilot.net/2012/04/north-american-ipv6-summit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/1099698321859440810'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3531572539467734322/posts/default/1099698321859440810'/><link rel='alternate' type='text/html' href='http://www.bitpilot.net/2012/04/north-american-ipv6-summit.html' title='North American IPv6 Summit'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/07877953056448670815</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>