#let them give me the BGP!
Explore tagged Tumblr posts
respectthepetty · 17 days ago
Text
Since Jack & Joker is giving me little YinWar crumbs, can the show also give me little PromMark ones too? Can I get Aran x Tattoo arguing about clothes and auspicious colors. Please! Aran's mom is superstitious, so this would be easy to slide in. PLEASE!
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Mark had to wear Prom's clothes, so Aran would have to wear Tattoo's, which would also make sense since Aran is now living with Tattoo.
Tumblr media Tumblr media Tumblr media
Sidenote: They matched.
Tumblr media
They always match.
Tumblr media
I'm begging you, Jack & Joker. PLEASE!
Tumblr media
51 notes · View notes
lurkingshan · 11 months ago
Note
You know I’m loopy, so here goes: top 5 things that were bad about Only Friends, with a bonus of one good thing that stood out.
Oh I see you decided to work out your travel frustrations by choosing violence. I approve and will absolutely play along. Only Friends lovers (is that still a thing?) look away, I am not gonna be nice!
The Casting
This show should not have been cast with branded pairs, full stop, and in fact the original intention was that it wouldn't be. But as a result of the pairs being added, the writing became hamstrung by the need to protect their BGP and deliver fanservice instead of a good story. It sucked all the life out of the show.
That Theme Song
Terrible. Y'all stans can lie to yourselves if you want but I know good music and that was absolutely not it. And don't even get me started on them letting First sing in this show, my ears may never recover.
Confusion in the Writers Room
It was often evident that the different writers on this show did not share the same interpretation of the characters, which resulted in a lot of confused characterization and wobbly story arcs. Even before the finale pissed everyone off, these cracks had been showing for weeks, and only one of the three main arcs was actually holding together (until the finale blew that one too), with some of the characters feeling like completely different people from week to week. Part of the reason we had so much back and forth in the discourse about how to interpret the characters is because the show itself did not have a clear handle on most of them.
The Politics
SIGH. I have already written about this a bunch so I will not belabor the point, but the fact that this show turned out to be such a sex shaming, monogamy pushing, weirdly prudish and anti-queer story is one of the biggest disappointments of the year, and really cooled my trust in Jojo's future projects.
A Truly Egregious Waste of Jennie Panhan
Why would you put her in this show only to give her so little to do?? Yo was a hell of a lot more interesting than whatever that was they did with Boeing, and I wish they'd given her better material.
BONUS: One Good Thing
It was really fun to have a big ensemble show like this with different characters and relationships for people to latch onto, and the fandom discourse was mostly a fantastic time. I wish the show had lived up to the hype so it didn't have to end on a sour note, but I still had a lot of fun for the three months it was airing.
Oh and of course, their ending not withstanding, we'll always have Paris.
Tumblr media
Ask my top 5 anything in bl
42 notes · View notes
zombiepineapple · 4 years ago
Text
IPv6 Explained
Please note that most of these screen shots are coming from the Cisco Networking Academy's IPv6 Addressing and Subnetting Workbook, 1st edition, pages 1–12. Some of the screen shots I’ve inserted are simply text, because I felt I couldn’t have said some parts of this any better or more succinctly. That workbook was such an amazing resource for me and I hope it helps you too.
First, a short historical story:
From 1973 to 1978, TCPv1-3 were rolled out. IP was apart of TCP until 1978, when they were split, so we then had IPv3 and TCPv3. In 1980, RFC 760 defined IPv4, thought it wasn’t defined as we know it today until a year later. Currently you can find that under RFC 791 through 793. Then:
Tumblr media
Ipv5 was an experiment in 1990 never released to the public. In 1992 hosts (the people using the internet) were over a million in number and we were running out of addresses to give them so they’d all be identified uniquely. Something had to be done! First introduced as “IP Next Generation” and defined in RFC 1883, IPv6 swept onto the scene in 1995. For reference, so far every 3 years the number of people using the internet has gone up times 10%, but true to exponential fashion, by 1997, the number jumped times 19%. By 1998, IPv6 had been fully developed and it’s current definition can be read in RFC 2460.
Version 4 and 6 work in much the same way but there are many more possible version 6 assignments. They both have multicast and loop back addresses. IPv6 can translate and transition a host from IPv4 using what’s called an IPv4 Embedded Address. The low order 32-bits of the IPv6 address have the IPv4 in them. So a user may be using IPv6 already and not know it because the internet protocols do all the translation for them!
Here is more information from the workbook that helped me a lot when I was first introduced to IPv6:
Tumblr media Tumblr media
IPv6 can use the following routing protocols:
RIPng (RIP New Generation) - This routing protocol uses “hop” counts to determine how to route a packet. A hop is like a jump to a device. So if my packet went from the server to a router to a tablet, it “hopped” twice. As the packet “hops” it’s hop count will go down. If a packet runs out of hops, it will get dropped. RIPng updates every 30 seconds and uses UDP to route. It’s multicast address is FF02::9.
OSPFv3 – Open Shortest Path First was made to replace RIP. It’s classless, link-state routing, supports VLSMs, and works off a hierarchical domain segregated into areas. We talked about this a lot last discussion, with the Border Routers, the backup border routers, “cost” being numerically assigned to routes to decide paths for packets, etc.
EIGRP – Enhanced Interior Gateway Routing Protocol, an improvement on IGRP, and is classless, so it supports VLSMs. This protocol uses some distance vectors and some link-state components to route. It automatically “summarizes” a boundary, though that can be turned off. EIGRP has neighbor tables, topology tables, routing tables, and each routed protocol gets each of those three for itself! This way, all the routers can keep track of all the routes. EIGRP can handle lots of different kinds of protocols, including IPX and AppleTalk.
IS-IS - This was made for the OSI suite to route connectionless network protocol data. It works sort of like OSPF, in that it has domains and areas, but how it sets up the routing between them all is a bit different. It’s got the areas connecting to a “backbone” of routers, and all routers in the network have a level assigned to them. “OSI defines Level 1, Level 2, and Level 3 routing. Level 1 (L1) ISs (routers) communicate with other L1 ISs in the same area. Level 2 (L2) ISs route between L1 areas and form a contiguous routing backbone. L1 ISs only need to know how to get to the nearest L2 IS. Level 3 routing occurs between domains.” (Camput Network Design Fundamentals, 2017.)
Tumblr media
MP-BGP4 (multiprotocol BGP-4) - This protocol uses path vectors, based off of a sort of hop count called “Autonomous System” or AS number to route addresses. It’s the exterior routing protocol, EGP, for the internet! You can use it inside your network if you wish as well, but anything leaving your domain will use this out in the wilds. BGP uses TCP to find its “peers”, which are the same as “neighbors”. It also supports VLSMs and CIDR addressing.
Like IPv6, IPv4 can also use EIGRP, OSPF, IS-IS, and BGP4, but uses RIPv1 or 2, and IGRP as well.
There are a few different types of IPv6 addresses: global unicast, uniquely local, and link-local IPv6 addresses. To explain them, let’s define these terms with their examples.
Tumblr media
Global unicast: these addresses are only for ports or a public address. So a website can have one. They are made up of two parts: the subnet ID and the interface ID. The subnet ID is going to have the site prefix in it, along with, obviously, any subnet identification from that site. The Interface ID will be the interface MAC address. These addresses can time out.
Tumblr media
Uniquely local: As the name implies, these addresses aren’t meant to leave their domain. They’re internal addresses. You make one by adding a random 40-bit hexadecimal string to the end of “FD00::/8”. It’s got a subnet and interface ID the same way a global IPv6 does.
Tumblr media
Link-local: These never time out. This is used to single-link actions, like discovering a neighbor, or automatically configuring an address. If IPv6 is enabled for an interface, it’ll have a link-local address. Like the uniquely local addresses, they can’t leave the domain.
One more important thing you'll need to know: How to compress and shorten IPv6 addresses. There are only two rules to keep in mind when condensing IPv6 addresses.
Rule 1: you don't have to write “leading zeroes" in each hextet. So a hextet that’s :0065: could just be written as :65:
Rule 2: you may choose one group on zeroes to be written as double colons “::”. Pick the largest string of zeroes to do this to.
Here are some examples:
Tumblr media
Need some videos to help you through? Try these:
https://www.purevpn.com/blog/what-is-ipv6-address-scty/
https://whatismyipaddress.com/ip-v6
https://www.pcworld.com/article/257037/ipv6_five_things_you_should_know.html
Internet Protocol - IPv4 vs IPv6 as Fast As Possible
IPv6 Introduction - What is IPv6? Why do we need it? How to get IPv6 addresses?
---------------------------------------------------
Sources
IPv4 Routing Protocols | Campus Network Design Fundamentals. (2017). Flylib.com. https://flylib.com/books/en/3.293.1.31/1/
IPv6 routing protocols. (2016, January 26). Study-Ccna.com. https://study-ccna.com/ipv6-routing-protocols/
Jones, R. (n.d.). IPv6 Addressing and Subnetting Workbook (1st ed., pp. 1–12) [Review of IPv6 Addressing and Subnetting Workbook]. Cisco Networking Academy.
Understanding IPv6 Link-Local Address. (2011, December 13). Community.cisco.com. https://community.cisco.com/t5/networking-videos/understanding-ipv6-link-local-address/ba-p/3103152
upravnik. (n.d.). IPv6 global unicast addresses. Retrieved February 26, 2021, from https://study-ccna.com/ipv6-global-unicast-addresses/
upravnik. (n.d.). IPv6 unique local addresses. Retrieved February 26, 2021, from https://study-ccna.com/ipv6-unique-local-addresses/
upravnik. (n.d.). RIPng. Retrieved February 26, 2021, from https://study-ccna.com/ripng/
0 notes
zombierunfiction · 7 years ago
Text
Season 2 Mission 8: Chicken Payback
A few weeks had past and Abel was beginning to look more back to normal.  Walls had been reconstructed and buildings had been repaired.  Charlotte was in Sam's coms room helpping him get some new tech that Jody had brought in attached to the scanners.  
Charlotte was getting the cords under the desk set up while Sam checked the scanners to make sure the tech was accepted.  Sam had been uncharacteristically quiet all morning which made Charlotte a little worried.
"Penny for your thoughts love?"  Charlotte asked as she tightened a zip tie around a bundle of cords.
"Just... uh... thinking about something."  Sam said nervously.
"And that something is?"  Charlotte probed again.
Sam sighed softly then squated down so he could look at her.  "You know I love you right?"
That made her incredibly worried.
Charlotte sits up on her elbows looking at her.  "Of course.  I love you too.  What's wrong?"
"Nothing's wrong... just... I was talking to the Major yesturday... and she told me and I agree with her but I don't know how you would feel about it because I know how private you are-"  Sam rambled on.
"Sam."  Charlotte said making him stop.  "What did you and the Major talk about?"
Sam took a slow breath before looking at her.  "I know beds are rather limited so the Major suggested that... we share living area together."
Charlotte felt her heart flutter and a smile moved over her lips.  "Your asking if I would move in with you.  Essentially."
"Well uh... considering we're already living together in the township I guess it wouldn't change much but we would be sharing one bed-"
"I'd like that."  Charlotte said making Sam stop.
"R-really?  You would?"  Sam asked smiling brightly.
Charlotte laughs softly.  "Yes.  I'd love to live with you."
Sam smiled even more as he crawled under the desk kissing her deeply.  Charlotte happily returned the kiss running her fingers through his hair.  She hummed as he laid completely on top of her carding his fingers into her hair.
A cleared throat broke them apart making Sam slam his head into the desk.  "Ah!  Ow ow ow ow!"  He whined holding his head.
"Are you ok Sam?" Maxine asked with a small laugh.
"Yeah. I'm fine."  Sam said tensely as he got off Charlotte standing up still rubbing his head.
"Didn't mean to get you hurt but I figured Charlotte would like to hear about a mission that is needing to be done quickly."  Maxine said.
Charlotte got up from under the desk and gently checked Sam's head.  "Sure what's going on?"  She said once she was done with Sam.
"We need barbed wire for the perimeter wall and you will be running with a New Canton runner."  Maxine said somewhat carefully.
Charlotte's smile fell instantly as Sam took his hands away from his head.  "After what Nadia tried to pull I don't like the idea of Charlotte being put with someone who might try and hurt her again."
"I get it, Sam, really, I do. But the Major's been explaining how important working together with New Canton is.  We've got that summit coming up - peace discussions!"  Maxine countered before looking at Charlotte.  "For the survival of the human race, we have to share resources and expertise, and not keep on with this backbitting, childish tit for tat."
Charlotte glared at MAxine.  "Childish tit for tat?  Are you saying that deliberately trying to get me killed is just what?  A game?"
"Charlotte relax... I didn't mean it like that.  Look we've got a larger enemy, here.  Van Ark is the one who attacked us.  He's the one who fired that rocket launcher at Five's chopper.  He's the one who keeps sending his zoms against us.  He's got Paula!"  Maxine said trying to push the issue.
Sam and Charlotte both sighed heavily as Charlotte kisses Sam's cheek.  "I'm going to go get ready."  She moved past Maxine and headed to the packs.  She put on her bag, grabbed the axe she used since her outing with Simon to clear their path, and her head set with the headcam attached.  "Can you two hear me?"  She asked.
"Loud and clear Five."  Maxine said.  
"So how are you?  Since we found out Paula's, um... working with Van Ark?  How are you?" Sam asked softly.
"Fine.  Yeah, I'm fine."  Maxine said softly.
"Okay, yeah, fine.  Hearing that.  Raise the gates!  I guess, well... open the gate."  Once the gate was raised Sam spoke again.  "And go!"  Gun shots rang out taking out a few zoms as Charlotte took off down the path sighing softly.
"New Canton have put that operator Nadia under house arrest.  They know what she did was wrong.  They're trying to make amends in all ways they can."  Maxine said as Charlotte looked up seeing Archie running over to her with a smile.
"They've sent me!"  Archie said happily as they met in the middle and headed down a connecting path.
"Yeah... I, uh..."  Sam started before whispering.  "Is that amends, exactly?  It's not quite-"
"It's going to be lots of fun, today!"  Archie said happily.  "We need barbed wire to make your township secure so you can come to the meeting.  And maybe we'll find some apples?  I love apples!  So crunchy!  Well, the old ones are soft and sweet."  Archie snorts almost angry about it.  Suddenly her smile returns.  "All apples are good apples!"  
Charlotte looked at her oddly as Maxine whispered softly.  "Can you believe she has a PhD in protein crustallography, Sam?  From Cambridge."  Suddenly Charlotte did a double take on Archie.
This girl's head was so far in space that she could be passing Jupiter!
"I still think she might stop dead in the middle of a zom attack to look at an interesting cloud."  Sam whispers back.  "'Dead' being the operative word."  
Archie smiles looking at Charlotte.  "Come on!  There's barbed wire around one of the Rofflenet transmitter stations that way.  We can cut it off for now.  Borrowing is okay!"
"Right.  Let's make it a good one.  Mission to retrieve barbed wire from Rofflenet station: go!"  Sam said as they continued down the path.
A while later Charlotte had a thought.  "Who put up these Rofflenet stations, anyway?  I mean, it's rather foreward thinking to have set them up prior to the outbreak."  
"I think it was mostly done piecemeal by survivors, using old transmissions stations, that kind of thing?  Some dedicated radio and communications people left transmitters powered by solar or wind generators to be a repeater stations."  Maxine explained.
Charlotte raised an eyebrow but before she could say something Archie jumpped in.  "How would they do it?  Hmm... I expect any old Linksys router would do.  Just grab two APs with microwave dishes, flash the router with DD-WRT, simple BGP routing table, and hook the whole thing up to a car battery, and it would work just fine!  If you would put on a wind turbine, the LEDs would probably keep on blinking for years.  Very clever of them."  She said seriously.
"Ok... that's just went 35,000 feet over my head."  Charlotte said as Archie giggled.
"I... uh, yeah.  Um.  That sounds about right, yeah..."  Sam said slowly.
Soon enough they came upon a tall radio tower with a small building below it.  There was a wire fence with the barbed wire wrapped around the top of it a good 6 yards away from the building.  
Something about this seemed odd to Charlotte.  
Why would they put so much space between the fence and the building?
"This one's very well looked after.  A fence, and barbed wire.  Like a little bird in a nest!  It won't mind if we take some of the wire for now.  And then you can come and visit New Canton, because you'll know Abel will be..."  Archie stopped for a moment looking around before gasping.  "chickens!"
Charlotte blinked looking at her then following her line of sight.
"Abel will be... chickens?  Is... is that some kind of tech jargon?"  Sam asked very confused.
"Look, she's right!  On our cams, just to the north of the repeat station.  It looks like a small flock of chickens!"  Maxine said.
"They must have come from some farm."  Charlotte said seeing the half a dozen chickens clucking softly and pecking at the ground.
"Now, I don't know how to, um, flash a router with a WD-40 or whatever it was, but I am pretty sure that chickens produce eggs?"  Sam suggests.
"And sometimes baby chickens!"  Archie said gleefully.
"Which makes more eggs?"  Sam offers again.
"Her graps of biology is really impressive."  Maxine whispers sarcasticly.
"So, if you're thinking what I'm thinking..."  Sam starts.  
"Come on, Charlotte, with me!  After the chickens!"  Archie said as the two of them ran towards the chickens.  Archie tried to dive for one only for it to jump away.  Charlotte couldn't help but laugh as she ran to the side of the now running chicken and cut off it's escape by scooping it up.  "Come here chickie chickie chickie."  Archie said as she dived for another missing again.  
Charlotte laughed again smiling.  "Archie just stay there and I'll herd one over to you."  She said as she held onto her chicken chasing one then jumpped close to it making it leap right up into Archie's arms making her squeal.
"That's okay, little chicken, we're going to take you back to Abel and give you a nice life, with grain and things to peck!"  Archie said happily petting her chicken as Charlotte took of fher pack and gently put the chicken inside with only it's head sticking out.
"At least until we roast you with a wild mushroom sauce."  Sam whispers before humming happily.
"Hmm, but how are we going to cut the barbed wire around the transmission station?"  Archie asked.
"Put it under your arm, wings folded so it's not uncomfortable."  Maxine started before obviously recieving an odd look for Sam.  "What?  I grew up on a farm, okay?"
"I didn't say anything."  Sam replied.
"You didn't have to say anything."  Maxine countered.
The chicken in Archie's arms clucked softly as they walked back over to the fence.  "Oh, she's so happy now!  I'm going to give her a name!"
"Oh, don't do that!  We might want to, well, you know, eat it!"  Sam stressed.
"I will call her Mildred!"  Archie said happily.  "Or maybe Van de Graaff?  Do you think she's more of a Mildred or a Van de Graaff, Charlotte?"
Charlotte looks at her.  "Mildred Van de Graaff sounds good to me."
"Me too!"  Archie said happily.
"Yeah, okay.  Uh, so, with the chicken under that arm, and Five's chicken rather more sensibly nestled in a back pack, off to get that barbed wire now?  To defend Abel against attack by zombies?  You remember the zombies?"  Sam prodded.
"Come on, Mildred!  Let's go for a run!"  Archie said as they headed for a section of the fence they could start to take from.  "Okay, I see.  There are strips of barbed wire attached around the fence keeping zombies from the transmission hut.  So if I stand here, and-"
"Yes.  You stand there, with the chicken in your hand, and snip the barbed wire, and Five, you run around the fence and reel it in.  You've got gloves, yeah?"  Sam asked as Charlotte reached in the side pocket of the bag trying to get her gloves.  "We sent Runner Five out with gloves to get barbed wire, year?"
"I'm pretty sure."  Maxine said softly.
Charlotte pulled out her gloves and slipped them on.  "We have gloves."
"Good for getting chickens too!  Not so good for stroking chickens.  Hm... I wonder if chickens like to be stroked.  Do you think they do?"  Archie asked as she started to snip the barbed wire while Charlotte started rolling it up.  After the first roll was done she set it on the ground near them.  
"Good job with the barbed wire, Runner five!"  Sam said as Archie cried out suddenly.
"Ow, ugh!  Ew!"  Archie whimpered.
"What is it?"  Charlotte asked.
"Mildred Van de Graaff has gone poo poo all over my hand!"  Archie cried out as Charlotte snorted looking at the horrified look on Archie's face.  "Oh, it's coming out of her bottom!"  She  tried to knock it off before the chicken hit the ground with a loud cluck.  "Oh!  I dropped her!"  She said as Mildred took off away from her.  "Come here, Mildred, come here!"  Archie said chasing after her.
"Five what's going on?"  Sam asked.
"Archie is now chasing Mildred around.  I have to say this is a the funniest mission I've been on bar none."  Charlotte said as she followed after Archie.
"Mildred! Van de Graaf!  You naughty girl, come here!  ?No, don't, don't!"  Archie cried as Mildred ran through a break in the fence and into the area between the fence and the transmission station.  "No..."  Archie whined as she looked at the chicken walking around.
"The chicken has gone under the fence. I repeat, the chicken has gone under the fence."  Sam said half serious half bored.
Charlotte and Archie both looked through the fence at Mildred.  "Van de Graaff, come here!"  Archie said.
Charlotte looked around then walked over to the spot they had started to unwrap the barbed wire.  She took Archie's dropped shears and cut the remaining barbed wire and pushed them away.  "Here a bit of fence that you could climb over and get it Archie."  She said as Archie ran over.
"Okay, I'm going to climb over."  Archie said as she grabbed onto the top of the fence as Charlotte cupped her hands letting Archie step on it slowly getting up.  "Come here, Mildred Van de Graaff!  There's nothing for you in that transmission hut!  When I get over this fence, I'm going-"  As Archie's leg got over the fence Mildred took a step and the ground around her exploded up in a flash of orange light.  Charlotte and Archie gasped closing their eyes as debris flew at them  After a moment the two of them looked over seeing Mildred had been obliderated.  "Oh..."  Archie said softly.
"What was that?!"  Sam asked.
"Mildred Van de Graaff has exploded."  Charlotte said as Archie pulled her leg back over and hopped down.
Archie and Charlotte walked over to where they could see the hole that was left trying to see what happened.  "So, what, we're thinking - spontaneous chicken combustion?  Chicken, uh, destruction rays from space?"  Sam asked.
"Landmines."  Charlotte said simply.  
"Yeah, I was pretty much thinking landmines."  Maxine said.
"Yeah, yea, well that was my first thought, too.  We should send someone back to put up warning signs, in case anyone else thinks of scaling the fence."  Sam said as Archie was visibly deflated.
"I'm sad... Mildred Van de Graaff is dead."  Archie said as Charlotte wrapped her arm around Archie who laid her head on Charlotte's shoulder.
"And she didn't even end up a supper."  Sam sighed softly.
"Sam!"  Charlotte and Maxine snapped.
"Listen, um, I didn't make a joke about an 'egg'splosion, did i?"  Sam justified as he chuckled softly.  "Don't say I'm not respectful."
Maxine laughed softly.  "Yeah, well, that's a 'poultry' excuse."  She said laughing as Charlotte shook her head as she grabbed the barbed wire heading back towrads Abel.  "Oh well, it looks like we got enough barbed wire to patch that hole.  Come on home."
"I will miss Mildred Van de Graaf.  She was so rebellious and naughty."  Archie said with a smile.  "And why would someone put landmines around this little hut in the middle of nowhere?  Why have they nought thought of chicken safety?"  
"Yeah, it is a bit weird. Whoever designed the protection aorund this little comms hut did a... 'bang up' job?"  Sam started as Charlotte pursed her lips.
"Did you honestly just say that?"  She asked as she chuckled dryly.  
"I think I did, yeah.  I mean, I started, and I just couldn't make it stop."  Sam laughed as they continued back down the path.
"It is sad about Mildred.  But I will come back another day to find a new chicken.  I will call it Hubert Vexillology.  Or... no, that's a silly idea.  Hubert is a boy's name.  Instead... Ramona Newton!"  Archie said back to her excitable self.
There was a long pause before Sam spoke up.  "For the first time, probably ever, I think I have nothing to say to that.  Come on home, runners."  He said softly as the chicken in Charlotte's bag clucked softly.
*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~
<     40     >
Season 1 Beginning
Season 2 Beginning
5 notes · View notes
stephenlibbyy · 5 years ago
Text
Should I use Cisco OTV for the Datacenter Interconnect ?
Should I use Cisco OTV for the Datacenter Interconnect? This question comes from not only from my students but also the companies which I provide consultancy.
I will not go through the OTV details, how it works, design recommendations etc. But let me remind you what is OTV and why OTV is used , Where it makes sense very briefly. 
OTV (Overlay Transport Virtualization) is a tunnelling mechanism which provides to carry Layer 2 ethernet frame in IP. (As I indicated in other articles, when I say MAC in IP, it is the same thing with MAC over IP).
So, OTV is Layer 2 in Layer 3 tunnelling mechanism. You can hear it is an encapsulation mechanism as well, which is true although there is small difference.
You don’t need to have MPLS underlay to create OTV tunnels. It uses IS-IS for the MAC address reachability and stops layer 2 protocol PDUs at the OTV Edge device where encapsulation happens.
This is good because, you don’t want to extend Layer 2 protocol PDUs such as Spanning Tree if you have multiple datacenters. Failure stays and affects only one datacenter, not all. (Failure domain boundary concept)
Another datacenter interconnect requirement is ARP proxy. Not a mandatory but it is good that your tunnelling mechanism (I should say Layer 2 extension mechanism probably) provides a way to reply ARP messages locally. OTV provides this functionality as well.
Should I use Cisco OTV for the Datacenter Interconnect ?
There are some problems and I will highlight two most obvious ones and especially one of them might stop many networks to use OTV.
Since MAC reachability information is carried through IS-IS, you can have scalability problems to carry MAC addresses through IS-IS. BGP allows to scale up to millions MAC or IP prefixes. (EVPN, PBB-EVPN)
Also I think there are some implementation limit for OTV. Up to some amount of locations can participate in overlay. But here we should be fair and say that although VPLS doesn’t have this limitation, it doesn’t make sense to use VPLS for 10 or more datacenter interconnection due to data plane learning and we all know the problems of data plane learning I guess.
By the way 10 is not a calculated number at all, I just used as an example. If the number of MAC addresses are more per datacenter probably even less number of datacenter interconnection can cause a problem.
So, OTV and IS-IS, for the large number of MAC addresses per datacenter can be a problem but definitely this is not the case for many networks today. If we are talking about Massive Scale Datacenters, they don’t use layer 2 extension, and in fact they don’t use layer 2 protocol inside the datacenter either. (BGP, specifically EBGP they use and there are many reasons for it, let’s talk about them in a separate article)
Another problem with OTV of course is it is Cisco Preparatory. If you want to use different devices at the DC-Edge of your network, you cannot. OTV is not interoperable with the other overlay technologies. You cannot use OTV together with VPLS for example. I intentionally compared VPLS with OTV throughout the post, because VPLS is one of the most commonly used Datacenter interconnect mechanism in today networks.
Tumblr media
Again, let’s think the real networks. Do you really care using multiple vendors ? Or if Cisco gives you better price, better support and good documentation, most importantly best sales engineers ( ??  ), do you still consider not to be vendor lock-in ? Or do you think decision is taken for the political reasons in your company. Let me hear your thoughts in the comment section below.To have a great understanding of SP Networks, you can check my new published “Service Provider Networks Design and Perspective” Book. It covers the SP network Technologies with also explaining in detail a factious SP network.  Click here
Should I use Cisco OTV for the Datacenter Interconnect ? published first on https://wdmsh.tumblr.com/
0 notes
vitmelbourne · 6 years ago
Text
The Value Of Microsoft Certification Courses Sydney. How Beneficial Is The Microsoft Certification Course ?
Tumblr media
The information technology sector is incredibly competitive, but one of the fastest growing sectors today. As new technologies evolve and replace traditional technologies, IT staff need to keep abreast of changes and new practices. One of the best ways to stand out and prove your credentials is to take Microsoft Certification Courses Sydney. Microsoft certifications are widely recognized in the computer and computer industries, providing employees with an excellent opportunity to advance their careers.
Microsoft Certification Courses Sydney are the norm for the IT industry
There are a number of Microsoft Certification Courses Sydney in the IT field, but many consider that Microsoft certifications are the gold standard for IT professionals. By participating in these certification courses, people have access to a wealth of information and training that they can be sure will be recognized by employers. As these training courses are recommended by Microsoft, users can be certain that the courses they will take will be practical. In addition, employers can be sure that people with Microsoft certifications are up-to-date with the latest technology because Microsoft requires recertification every two or three years.
Important Points to Know About Microsoft Certification Courses Sydney
If you choose Microsoft Certification Courses Sydney, you may encounter a number of problems that cause you to rethink your decision. Even though a Microsoft certification can add value to your resume and help you prepare for a career, you can seriously doubt that it is worth it. Let us clarify some doubts here.
The value of the course : Some people think that the choice of Microsoft Certification Courses Sydney may not be successful. In fact, some people think that Microsoft certification training is a waste of time and money. Some of my friends advised me to prepare myself rather than opt for such a program because they are not better. However, it's a very bad idea. you will certainly get much better results with the practical knowledge and finer details you will surely miss when you study yourself. This turns out to be more pronounced, especially if you work full time full time. A training program not only helps you focus on a mission, but also helps you clarify your doubts.
And if you thought you could do it yourself, there is a lot of food for thought. Microsoft certifications are recognized around the world and give your profile a great value. If it were as easy to pass the aptitude test, everyone would be a Microsoft Certified Professional, which would reduce the value of the credentials.
That's why Microsoft has set high standards for certification testing. Although it is not impossible to pass the test alone, it would require a lot of effort on your part and can still be very difficult. Consider all of these points to understand the true value of a Microsoft Certification Courses Sydney Program for best results.
Microsoft Course - Make your future shine
To give your career the right direction and get the first place in your job, you must have the latest technology and emerging software. Receiving Microsoft certifications can improve your skills and talent. It is more likely that a person will get a job if they are trained in all Microsoft courses.
Get certified with Microsoft to stand out from the competition! Develop your talent to create new quality job opportunities. You can prove your abilities in all courses and programs, provided you identify them. This can lead to a correct selection of the course and the improvement of these skills.
Almost all reputable companies and companies cite Microsoft certifications in the section relating to their business requirements. Microsoft courses are considered some of the most valuable software leaders.
You can choose one of the courses:
- Microsoft Certified System Engineer
- Microsoft Certified Professional Developer
- Microsoft Certified Database Administrator
- Microsoft Certified Enterprise Application
- Microsoft Certified System Administrator
 Employers believe that Microsoft courses are much more creative and more aware of the use of all available Microsoft products. Users who can access Microsoft software can easily reach the management level and have more promotional opportunities. Just pass some tests to run the program effectively.
By going through the list of varied courses, choose the course that best suits your current preferences and abilities. Go on the road to success by certifying your talent with the latest Microsoft courses. Develop your skills and talent with Microsoft courses and pave the way for better job opportunities!
It is a normal process that students do not check something extremely important - the way their company divides training materials and into which parts. Most companies sell you a program, which usually takes 1 to 3 years, and transport the material in pieces at the end of each exam. If you think this makes sense, consider the following: Students often find that the company's usual training path is not as good as the other. You may find it more useful to use a different study order. And what happens if they do not finish in the allotted time?
To be in the best case, you must have every element of your learning module in stock right from the start. each thing! In this way, nothing can happen in all areas that could affect your ability to close.
Remember that a course or an accreditation does not mention it; The specific task you want to accomplish is. Far too many training organizations give priority to the document. Imagine, you only train for a year before ending your days. Make sure you avoid the serious mistake of choosing a program that interests you, and then spend decades enjoying something you do not like!
You must also consider your penchant for earning potential, changing your career and your ambition. You need to know what the industry expects of you, what specific certifications are required and how you can develop your experience. Ask an experienced industry consultant who knows the industry you want to join and can give you "a day in a lifetime" to indicate the tasks you perform each business day. Before starting a recycling program, it makes sense to determine if this action is the right one. What is the reason you need to start your training and realize that you are wrong?
Overview of Cisco Certifications :
General certifications and targeted certifications
Cisco offers three levels of certification that gain expertise: Associate, Professional and Expert (CCIE). Different tracks of these levels are adapted to different career needs. A variety of specialized certifications from Cisco qualified specialists are also available to demonstrate knowledge of specific technologies, solutions or roles.
CCNA : The Cisco Certified Network Associate Certification (CCNA) indicates a strong and networked teacher training. CCNA Certified Experts can install, configure and operate LAN, WAN and Remote Access services for small networks (100 nodes or less), including using the following protocols: VLAN, RIP, Ethernet.
CCNP : Cisco Certified Network Professional (CCNP) certification indicates advanced networking or team networking. With a CCNP, a network professional can install, configure, and troubleshoot local and extended enterprise networks with networks from 100 to over 500 nodes. Content focuses on topics such as security, converged networks, quality of service (QoS), virtual private networks (VPNs), and broadband technologies.
CCSP : Cisco Certified Security Professional Certification (CCSP) demonstrates advanced knowledge of Cisco network protection. With a CCSP, a network expert can secure and manage network infrastructures to protect productivity and reduce costs. The content addresses issues such as perimeter security, virtual private networks, intrusion prevention, and the combination of these technologies in a single integrated network security solution..
CCIP : The Cisco Certified Internetwork Professional (CCIP) enables employees working in service provider organizations to acquire infrastructure IP network solutions. CCIP experts have in-depth knowledge of network technologies in the area of ​​service providers, including IP routing, IP quality of service, BGP and MPLS.
CCIE - R&S : CCIE certification for routing and switching indicates in-depth knowledge of networks between different LAN and WAN interfaces, as well as various routers and switches. R & S experts solve complex connectivity issues and deploy technology solutions to increase bandwidth, improve response times, optimize performance, improve security, and support global applications. Applicants must be able to install, configure, and manage LAN, WAN, and Dial-up services.
To become a CCIE, you must pass a series of exams
There are no formal requirements for CCIE certification. Other professional certifications and / or specific training are not necessary. Candidates should be familiar with the intricacies, subtleties and challenges of an ongoing network. It is strongly recommended to have 3 to 5 years of professional experience before being certified. To receive your CCIE, you must first pass a written aptitude test and then a corresponding practical laboratory test.
CCIE security : The CCIE certification for security highlights expertise in IP and IP routing, as well as specific protocols and security components.
To become a CCIE, you must pass a series of exams
There are no formal requirements for CCIE certification. Other professional certifications and / or specific training are not necessary. Candidates should be familiar with the intricacies, subtleties and challenges of an ongoing network. It is strongly recommended to have 3 to 5 years of professional experience before being certified. To receive your CCIE, you must first pass a written aptitude test and then a corresponding practical laboratory test.
For getting  more information visit here VIT -  Victorian Institute of Technology.
14/123 Queen St, Melbourne VIC 3000, Australia
1300 17 17 55 (or) [email protected]
0 notes
sand1128 · 8 years ago
Text
FanFic: The Fall of Friar
Tumblr media
A/N: This was a very tough chapter for me. I struggled with trying to keep Lucas in character as much as possible while he was behaving badly. 
Chapter 1- Only The Name Remains
Chapter 2- The Man in the Mirror
 Tired of watching Riley just standing there, Matthew grabs her by the hand and drags her out onto the dance floor.  The first minute she was out there, she refused to move at all but soon the rhythm of the music took over. In no time at all, she and Matthew were dancing in perfect sync. The smile on their faces told of the fun they were having.
Glaring at them from his place in the corner, Lucas could feel his temper rising. Logically, he knows he doesn't have the right to be upset but he's not interested in logic.  All he knows is Riley is out on that dance floor, smiling, laughing and dancing with someone other than him. He thought he was doing a good job of keeping his temper in check... until her partner dipped her and then gave her a quick kiss on the cheek. He was livid. She was his damn it. At that moment, he didn't care that they had broken up... that he had ended it. He watched Riley give her partner a quick hug before she headed off to the ladies’ room.
He knew this was likely his only chance. He stormed over to Matthew
"You know she's off-limits, right?" Lucas snarls
"Pardon me?" Matthew is taken aback by the confrontation and a little perturbed to realize how handsome is confronter was...
"She... is.... off.... limits."
"Who Riley? You've got it all wrong mate. She's a swinging single" Matthew explains with a wide grin and a mischievous wink.
Lucas saw red. He pushed Matthew up against the wall and held him there using his forearm across his chest.
"Riley is off limits"
"Well someone needs to tell her that" Matthew doesn't know who is holding him against his will but he'll be damned if someone is going to accuse either him or Riley of any wrongdoing. "Obviously, this moron doesn't know her that well. She would never dance with anyone else if she was spoken for..." he thinks before deciding to have a little fun with the hottie.
"She is a gorgeous woman, isn't she? Can you believe someone was dumb enough to walk away from a woman like that?"
"I never meant to walk away" Lucas snaps in response  
"Ah... so you're the asshole?" Matthew realizes that this piece of man-candy was Riley’s ex.
"Look pal, I'm as strong as a horse"
"And for her sake Pookie? I hope you’re hung like one."
The two stare each other down until Lucas feels a jolt of electricity zing through his body when he looks down Riley has her hand on his arm.
"Matthews you minx... you didn't tell me that this caveman was your ex!" Matthew admonishes with a grin.
"Lucas put him down. Matthew, he's just someone I used to know" Riley sounds exhausted as she responds.
Lucas simultaneously drops Matthew and whips around to face Riley. The pain is etched on his face in a tortured grimace...
"How did I go from someone you loved to just someone you used to know?" Lucas grinds out as his temper cools.
Riley was stunned "How? You are seriously asking me how? You did it to yourself!!! You and only you decided that you didn't need me anymore. That we were done. That's how you jackass!" Her eyes wide and her hands covering her mouth in shock, she storms from the room before she lets the tears fall. She couldn’t believe that she lashed out at him. She knew, beyond a shadow of a doubt, that he was now fully aware of how much he had hurt her.
   Lucas is stunned. His mind is racing while his heart breaks. How did he let this become his life? How did he let things get so bad?  How does he get her back? He knows now that a life without Riley isn't a life at all.
"So, you're the idiot who threw her away," Matthew states as he stands next to Lucas.
"Idiot is an understatement," Lucas mumbles in return.
"Lucas? I think that's what she called you"
"Yes. Lucas Friar. Idiot extraordinaire at your service" Lucas replies with a sardonic smile. 
"I’d like to say I'm pleased to meet you but I'm not going to lie. You hurt Riley which means I'm anything but pleased."
There is nothing to say at this point so Lucas just waits.
"I'm Matthew Thompson. Riley's current BGP and confidant. I've heard a lot about you. Well, you being a relative term. I didn't know it was you that we were discussing. So, tell me.... why on earth you would throw away a sweetheart like Riley?! Farkle said that she has always been full of hope... until a few months ago."
"You know Farkle?" 
"Oh yeah. I know his adorable loveisis Izzy too. And I can't forget my man,Zay."
"Who else have you met?"
"Her family. Auggie & Uncle Josh are cuties. Her dad is a bit strange, though, kept trying to steal my shoes. Does he have a shoe fetish or something? Bitch these are Ferragamos! The only way you are getting them off my feet is to shoot me dead, cut my feet off but if fate steps in and they fall off while I'm jumping on a naked Hugh Jackman? They're yours"
Lucas heard nothing after hearing that Cory was trying to steal his shoes. 
"Lucas? Yoo-hoo...Lucas?!" Matthew tries to get Lucas's attention.
It takes a minute before Lucas snaps out of it "Sorry Matthew. I was thinking about something"
"No worries mate. So... you gonna tell me what evil demon possessed you & made you tell Riley to walk away? That you didn't need her?! No one in their right mind would walk away from someone like her... a love like that."
"Just stupidity I guess. I got so caught up in everything that I stopped thinking. All of the guys were single. Out partying every night...."
"Ahhh.... Riley gave you a hard time about going out with the Boys?"
"No... not at all"
"Was she jealous? You going out, eyeballing the ladies?" Matthew asks with an exaggerated wink.
"What?! No. She is the only one I've ever eyeballed. She's had my attention since we were in middle school."
"Huh. So, if you weren't going out trolling, & she didn't give you a hard time about going out with the guys.... what the hell is wrong with you?"
Lucas thinks back to the night in question.
He was tired. So damn tired. His classes were a lot harder than he expected. He knew they would be tough but never thought they would be so consuming. Felt like all he ever did was go to class and study. He couldn't remember the last time he took Riley out. Couldn't remember the last time they spent any real time together.  He loathed to admit it but he was scared. He was afraid of failing his classes, of failing her, of not fulfilling his dream of being a vet, that she would tire of him & he would never be Mr. Riley Matthews. He and Riley were supposed to meet for a late dinner. He had high hopes that they would be able to spend some quality time together. Had hoped that they would be able to spend hours talking, loving before falling asleep wrapped up in each other. He missed everything about her. 
It started out simple enough. His roommate offered him a shot of Jack. After initially turning it down, he caved when he was reminded that it would help take the edge off. He was no stranger to alcohol but had always stopped at one. He had gotten drunk once in his life. At 15, he & Zay hid in Pappy Joe’s barn with a few beers that they had taken from their garages. He was sick for 2 days and grounded for 14. He swore then that he wouldn’t get drunk again. He absolutely hated the loss of control. Knew that too much alcohol mixed with his temper could only lead to bad,bad things. Knew too that Riley wasn’t a fan of drinking.  Looking back now, had he stopped at one? He never would've gone off the rails.
One shot became a few rather quickly. Few became more even faster and before he knew it, he was drunk. He was so completely involved in the here and now that the time nor Riley ever occurred to him. It wasn't until she was standing before him that he remembered.
"Heeeeyyyyyy Bean" he slurred
"Lucas! I've been sitting in that restaurant for over an hour waiting for you! I've been worried that something was wrong!"
"I'm good babe.... realllllll good"
"Babe? Ugh. I'm out of here. Sleep it off and we will talk tomorrow" There was no way she was going to deal with him when he was like this. As far as she knew, he had only gotten drunk one other time in his life.
"No don't go, baby.  Stay here and let me rock your world" he tries to throw his arm over her shoulder but misses.
"Oh ick. This is not who you are Lucas. This is not who we are."
“Maybe this is the real me. Maybe I've only been pretending to be Lucas the Good."
"That's the alcohol talking. Call me when you wake up" Riley heads for the door, shaking her head. This was so out of character for Lucas that she feared there was a really serious issue that caused him to drink that night. She knew that he despised getting drunk. That he didn’t like the loss of control.
"Rileeeeyyyyyyy don't go! I need you." She kept walking toward the door.
"You walk out that door- we're done." She didn't slow her stride at all. She refused to let him see her break down. This was not her Lucas. Once he was sober they would talk it all out. She would find out what caused him to drink. They would talk about everything. It was one of the things they did best. It stopped her in her tracks for a brief moment when she realized that she couldn’t remember the last time they really talked about anything important.
"Fine! Go then! There's the door... who needs you anyway?"
She walked out the door, head held high, tears silently streaming down her cheeks. As she settled into her bed, she knew that their next phone call/visit was going to be tough. What she didn't know at the time? That the phone wouldn't ring. 
  When a hungover Lucas finally woke up on his dorm room floor with a sore jaw and a box of his belongings at his side. It took him more than a few minutes to piece together what happened. 
He had every intention of seeing Riley that day or at minimum calling her. He could just imagine how hurt she must be. He was embarrassed and mad at himself for his behavior. She was the last person on earth he would ever want to hurt. He had every intention but they all went away when he and his roommate indulged in a little "hair of the dog" to help his hangover. One day turned to two, to a week, to weeks and finally to months. He never called her and she never made the attempt to see him. Which according to his frat brothers meant that she didn't really care. Had he been of sound mind he would've known that was BS.... but he wasn't of sound mind. Seemingly overnight alcohol had become his mistress. Before he knew it, he would need a quick nip to get him up and moving. Need one to get him through his first class, then another and another.... 
Before too long, it was the ONLY way he could get through his day. He became the very type of guy he despised.
Not only did he not talk to Riley... he stopped talking to their friends. He was equal parts embarrassed and defiant. He knew his friends would be judgmental and not understand what he was going through. His only friends were his frat brothers. They would go to the gym for a few hours every day and then party all night. Working out, partying and skipping class became his new norm. Since his frat brothers behaved the same way, there wasn’t any judgment passed. Wasn’t anyone to explain himself to, wasn’t anyone to point out that this was NOT who he was.
The night he knew he was in deep trouble was the night he accidentally listened to a few of the messages Auggie left him. 
They were full of concern and pleading for a return phone call... until the last one. Lucas was certain that he would remember that message for the rest of his life.
"It's Auggie...again... this might be my 15th or so message but it will be my last one. I don't know what's gotten into you Lucas but I don't like it. You stopped talking to everyone who cared about you. I don't get it. What upsets me the most? I looked up to you. I thought I wanted to be like you when I grew up...boy was I wrong. You promised me, Lucas. Damn you! You promised me that you wouldn't hurt my sister. You told me that you loved my sister. You're right you son of a Bitch... you didn't hurt her... you destroyed her.  My parents & I trusted you, Lucas. We believed in you. You better hope I don't run into you anywhere... Josh may have gotten the first punch but you can bet I'll get the last. I'm not scared of you or your "Texas" side. I can honestly say that right now? I despise you...." the message trailed off with Cory's voice telling Auggie "that's enough Bubba." And then very faintly he could hear Cory's voice "he hurt all of us son" followed by a dial tone.  After deleting the message, Lucas got up, grabbed a bottle and took a picture frame off the wall. One side of the picture frame was Lucas with Auggie on his shoulders. The other side was a picture of him with Riley, taken at their senior prom. That night, Lucas fell asleep drunk, the picture frame clutched tightly to his chest. 
 Matthew waited patiently for Lucas to finish his trip down memory lane. He could only imagine what was running through his mind but if his facial expressions were any indications? They were painful memories. 
“Lucas?”
“Sorry”
“I’m not the one you should be apologizing too” Matthew responds with a pointed look at the balcony.
“I know. I owe a ton of apologies to a lot of people” Lucas answers woodenly.
“I only know her side of the story. I must say that it doesn’t paint you in the greatest light. That being said, as her best BGP, I must ask…. how do you feel about her?”
Lucas isn’t admitting anything yet “How do you feel about her? Am I going to have to fight you for her? I will and I will win”
“I love her but I’m not in love with her. Pookie, don’t you get it? I’d rather hit on you.” Shaking his head Matthew continues “Gorgeous but not very observant, are you? I’m her BGP. Her best gay pal.”
Lucas rubbed the back of his neck and frantically thought of something to say
“I’m sorry for what happened before. While I don’t have any rights where she is concerned, at least now I don’t, I can’t handle her being happy with someone other than me.”
“Selfish bastard, aren’t you? You gave her up.”
“I didn’t mean to. I’m going to fix things. I need her back. I’ve never stopped loving her and I don’t think I ever will.”
Matthew looked Lucas in the eye and remarked “Lucas, you have a lot of explaining to do. You may also want to consider one major thing…”
“Which is?”
“To love her fully? You need to stop hating yourself.”
“What?”
“Look, she told me the Rucas story. All of it. The brother zone, your “indecision”, your senior prom, your anger issues, all of it”
Lucas refused to drop Matthew’s gaze as he continued “You guys have been through a lot over the years and in each instance, Rucas emerged stronger. Sometimes a bit battered but always stronger. This time? When you should have been pulling her close? You pushed her away.  Did you ever talk to her about whatever issues were bringing you down? Did you tell her what your fears were? No, you didn’t. You made a monumental mistake by not talking to her. You internalized everything and didn’t give her any indication that you were struggling. You want her back?”
“Yes, more than anything.”
“I suggest you start now. Go out there and tell her that you miss her. Tell her you were wrong. Fair warning. This isn’t something that is going to be fixed tonight. You are going to have to work for it.”
“I know it won’t and I will do everything she asks.”
“Even if it means walking away?” Matthew asks
The pain that flashes across Lucas’s face is enough to drive anyone to their knees “If that’s what she wants? Then yes…even if it means walking away.”
Matthew reaches out and gives Lucas a hug.
“Chin up Pookie. I don’t think she will tell you to walk away. Despite everything, I’m certain she still loves you.”
“Thanks, Matthew. Anyone who is important to her is important to me.  I hope that you and I can be friends one day”
“Long as you make things right with her? I’d love to be your BGP too. Now get out there, tell her that you know you are the biggest jackass in the world but you hope she loves you anyway.” 
Lucas pats Matthew on the back and heads for the door that he hopes will lead him on the path back to his heart.  He pauses for a second as he watches her wipe her eyes. He takes a deep breath, sends up a silent prayer and opens the door.
Lucas quietly closes the door behind himself as he joins Riley on the balcony.
Riley tenses as she hears him but doesn’t turn her head.
He joins her at the railing and quietly murmurs “Hi”
Silence reigns for a moment before she replies “Hey”
“Riley, can you please look at me?” Lucas implores.
Taking a deep breath and steeling herself so she doesn’t react, she turns to look at him.
“There they are. There are the eyes I’ve missed.” Lucas smiles widely.
“What do you want Lucas?” Riley asks on a sigh
“You.”
“What?”
“I want you back Riley.”
“Why now? Did you decide that once you saw me with someone else?”
“No. I’ve known it all along. I never meant to let things go this long. As soon as I was sober enough to realize what I did, I should have been on my hands and knees begging you to take me back.  Begging you for forgiveness.”
“Yet, you did nothing. It wasn’t enough that you told me goodbye but you stopped talking to our friends too. You even stopped talking to Zay!”
“I know. I can’t make any excuses. I was wrong. Wrong on so many levels about so many different things. I promise you, Riley. I never intended to hurt you.
“But you did & you didn't just hurt me, Lucas. You hurt all of them too. IF I let you back into my life, I'm also letting you back into theirs. You want back in?”
“Absolutely” 
“Then you need to make amends. With our friends and with my family. Fair warning? I think you are going to have the toughest time with...”
“Josh, right? I was sore for a week after that hit...”
“No... Auggie is going to be the toughest. Not only did you promise to never hurt me? You were supposed to be like brothers. You destroyed that.... destroyed his belief in you. It wasn't enough that you hurt me but by completely cutting him out of your life without a word? You hurt him. You let him down on both levels."
"I'll make things right Riley."
"I'm not making any promises Lucas. I must do what's best for me. At one time, I would've sworn that was you but now I don't know."
"I know I don't have the right to ask you for anything anymore.  I know it's all my fault. Just please promise me that you will think about everything we've been through. Not just the last few months. I'm not asking you to forget all the crap I put you through, I'm just asking that you remember that it wasn't all crap. We were over the moon happy once and I know we can get there again."
"You're right we were happy once upon a time. But the fact remains that I missed the signs that you weren't happy. Part of me can’t help but wonder if you resent me on some level.”
“Why would I resent you?”
“Because I know you’re not Mr. Perfect. But truth be told, I loved you more because of your flaws. In my eyes? They made you perfect. I just didn’t know that you weren't happy. Whether it was with school, your friends, me...."
"It was never you Riley. I wasn't happy with ME. I'm going to fix this. I want to be worthy of you again even if I don't get another chance with you. I was the asshole that pushed you away. I get that but if I'm going down? I'm going down swinging. I need to be able to look myself in the mirror every day. I can't do that unless I do everything in my power to fix us.  I swear on everything I hold dear Ri, I was never unhappy with you. God, for the longest time? You were the only good thing I had. " Lucas grabs her hand and places it on his chest, holding it over his rapidly beating heart. "Do you feel that? That's how it is when you are near me.  You know it’s the Riley rhythm. I've missed it...almost as much as I've missed you."
She takes her hand down slowly "You don't get to say these things to me now Lucas. You are the one who ended things. The one who decided I wasn't enough..."
Lucas places his fingers over her mouth "Ri. You have always been enough. I will fix everything and I will show you once and for all? You are everything." 
“Riley, I need things to get to the point where you can look at me with something other than pain in your eyes. Somehow, some way, I will make you smile again.... even if it's only as you wave goodbye.”
Riley removes his fingers from her mouth and with a shy smile, leans forward and presses her lips to his cheek. Just as she opens her mouth to say something, Matthew calls her name.
“I have to go Lucas. Call our friends. They miss you.” Riley heads for the door
“Bean?” He asks quietly.
“Yes, Lucas. I’ve missed you too” she answers as she steps through the door.
As he watched her rejoin Matthew, he knew that he would stop at nothing to get her back.
This is the image that inspired parts of this story.  Thank you @drizzyyjayy for sharing it with me. 
Tumblr media
56 notes · View notes
victoriagloverstuff · 7 years ago
Text
The crypto alternative – TechCrunch
Tumblr media
Suppose, just for a moment, just for argument’s sake, that (some) cryptocurrencies are not a giant scam, and what’s more, they’re not just another kind of financial asset. Come on. Don’t look at me like that. Work with me here. Imagine, just for a moment, that there exist plausible futures in which they matter.
An interesting question to ask is: what exactly do those futures look like? Because if we can’t come up with any compelling answers, then we may conclude, by reductio ad absurdum, that a cryptofuture is awfully unlikely. So let’s walk through a few scenarios, shall we? And then judge how likely each one is.
1. The Crypto Maximalist Future
Situation: Bitcoin is the global currency. Except for “System D,” of course, and transactions hidden for reasons of tax avoidance, which run on ZCash, which is (ineffectively) banned by governments who fear the loss of their tax revenue from earned income hidden by zk-SNARKs. All retail transactions run through Lightning hubs, constantly watched and verified by AIs.
People maintain their own private keys, without which all of their life savings effectively vanish. These keys also maintain all of their own personal data, which they approve for usage by dapps on the Ethereum “world computer,” which performs billions of transactions per second courtesy of Plasma and (again) AIs monitoring the system with fraud proofs at the ready.
Fiat currencies died of hyperinflation. Banks died with them. Nation-states are on life support., and the new generation prefers statelessness to any citizenship. The world is increasingly controlled by a weird combination of libertarian Bitcoin seasteaders and communal Ethereum hacker collectives, who name themselves “phyles” after Neal Stephenson’s The Diamond Age, but call this The Crypto Age.
Likelihood: essentially nil, for many, many reasons, such as: The overwhelming majority of people don’t want to maintain their own private keys, and if you don’t maintain your own private keys, cryptocurrencies are essentially no different from fiat money held in banks, except for the many ways (such as the irrevocability of transactions) in which they are wildly inferior. Credit and cryptocurrencies play poorly together. Most people want strong governments, and strong governments want to control their own currencies, meaning, with only one small logical remove, that most people want fiat currencies. Deflation is actually bad. Etcetera etcetera etcetera etcetera etcetera. I mean come on people.
2. The Wall Street Crypto Future
Situation: Ordinary people don’t use cryptocurrencies. Why would they? But the financial world has gone full crypto; you always go full crypto. Stocks live only on the Ethereum blockchain. Bonds, too. Anyone who can qualify for a “security token” — a proof of your identity and valid investordom — can trade any stock, and any bond, in any market, from any country, anywhere in the world, in near real time, without asking for permission. Mostly via fully decentralized exchanges, though in certain markets centralized ones still have their advantages. Few people do it directly, though; their stock AIdvisors handle it for them.
Bitcoin is the global settlement and reserve currency; nobody cares about gold any more. Your credit card may be charged in dollars but that money is promptly converted to Bitcoin, and some satoshis are sent to the card issuer and the merchant bank (in a single transaction) before being converted back to dollars and sent to the vendor — the Lightning fees are so tiny, courtesy of the volume being so immense, that this is cheaper than the alternative. Ordinary people still don’t even know what Lightning is but the payment channels which connect banks, both within and between nations, pulse with hundreds of millions of dollars every single day.
Likelihood: slim to none. I personally see the irrevocability of crypto transactions, and the awkward “how do you provide cryptocurrency credit” issues as twin dealbreakers here — but I’m an engineer not a financier, so you could maybe persuade me that I’m wrong. We can at least see some of the advantages of cryptocurrencies here; why squander fortunes on running and maintaining hundreds to thousands of various financial databases and messaging buses around the world, when in theory we could have … well … one?
3. The Dapper Dapp Future
Situation: Financially, cryptocurrencies are just an asset class and a counterculture, but tokenized “fat protocols” powering decentralized apps have conquered the Internet. Facebook, Twitter, and increasingly even Google have been replaced by vast peer-to-peer networks in which processing and data are coordinated and optimized in real time by token transfers orchestrated by AI proxies. The rules of these systems are determined by frequent votes, which, again, are tokenized.
All of your personal data is packetized in many redundant tranches scattered across the Internet, protected by your private key(s) and various aspects of it are made available to services that wish to use it only as and when you or your proxies approve that access. You are rewarded with tokens for this access, which can then spend on other services. You maintain a portfolio of hundreds, sometimes thousands, of different kinds of tokens, and your AI proxy frequently trades between them so as to optimize this portfolio for your behavior.
Similar tokenized protocol infrastructures are beginning to creep offline and to organize meatspace projects, too, ranging from hardware development to massive-scale art collectives to urban planning and the transformation of entire cities. Token economics increasingly govern all of human behavior.
Likelihood: Yeah I don’t think so. I concede that in its way it’s an inspiring notion, but: most people want and like centralized solutions, which give them an authority to complain to, and to introduce and enforce rules, without having to vote on every single administrative detail of every network they connect to. (California ballot propositions are bad enough; imagine having to deal with their equivalent every day.) Dapps are by their very nature more complex, more fragile, and harder/slower to evolve than capps. (Imagine having to fork every time a feature changes. Now imagine some of those being hard forks.) Rewards to decentralized users are trivial — Facebook makes maybe $10/user/quarter, which is, to understate, not enough reward for the hassle of decentralization. Centralized solutions also have the advantages of things like “economies of scale” and “data centers which are more efficient than personal computers” and “databases which are vastly more efficient than blockchains.” And nobody wants to have to keep track of a portfolio of hundreds of different kinds of tokens no matter how useful their AI assistant may become.
4. The Global Crypto South Future
Situation: North America and Europe still use dollars and euros. Wall Street still uses its own systems, though it dabbles some in crypto assets. Facebook still rules the social media of the wealthy world. Cryptocurrencies are an afterthought, a curiosity, a fringe investment.
But the global South is different. Venezuela and Zimbabwe were the first to replace their currencies with cryptocurrencies that literally cannot hyperinflate. (I.e. a real cryptocurrency, not Venezuala’s what-even-is-that recent grotesquerie) Others soon followed; it was an easy and natural evolution from M-Pesa, Orange Money, and the like. There were some catastrophic failures in the early days, eg the BGP attack that took out most of the miners / validators of the Ethiopian cryptobirr and enabled a successful 51% attack that made a few hackers very wealthy at the expense of Addis Ababa’s treasury, but a few hard forks and version 2.0s later, stable prosperity was achieved.
The local stock and bond markets followed. As did the local Internet, where bandwidth costs far greater than those of the USA, plus the relatively greater size of potential dapp rewards, led to efficient local dapps, mostly using national cryptocurrencies (which can be traded for one another in real time on a vast decentralized exchange of atomic cross-chain payment channels), which have all but replaced centralized Western local services. Nowadays when Zimbabweans visit London and New York they’re taken aback by how backward those legacy financial systems seem.
Likelihood: I’m going to go out on a limb here and suggest that this is actually plausible. Not likely, necessarily, but plausible. In New York and London and Toronto and Paris, deflationary cryptocurrencies and real-time cross-country payment channels are basically solutions looking for a problem; I’d rather just use any one of my several no-international-usage-fees credit cards in Paris, and get the bonus miles / points, the ability to contest and reverse charges, the credit float, the extended warranty and other card bonuses, etc., rather than transact with the “global currency” Bitcoin over a Lightning payment channel, as cool as that sounds. But when you don’t have the mature, rewards-laden international payment system to hand, when you’re treated as suspicious and denied credit just because you’re from the most populous country in Africa, when your national currency’s inflation rate crosses double digits heading for triple … then, suddenly, the calculation looks very different indeed.
5. The Crypto Counterculture Future
Situation: Bitcoin did not conquer. Ethereum did not conquer. Tezos did not, EOS did not, Hashgraph did not. People around the world use credit cards, US dollars, euros, reals, yuan, etc., just as they always did. Wall Street might use some private / permissioned blockchains, as may some supply-chain enterprises, but their effect consists of an uptick in enterprise efficiency and a decrease in some costs, not the global revolution we were promised.
…That is, for 98% of the population. 2% however, are different. Maybe because they’re libertarians who mistrust the government, or hackers fascinated by the technology, or because they believe in the prospect of a better world. They’re willing to go through the struggle of dealing with private keys, funding payment channels, acquiring tokens to set up and pay for dapps and federate their data, and so forth. Only 2% of the population. But worldwide, that means 140 million people.
Only 140 million people use uncensorable, independent, decentralized social media. But that’s a big enough number that it means censorship doesn’t really fly on centralized media, either, because it can be transposed to the decentralized alternative. Only 140 million use cryptocurrencies for their day-to-day expenses and long-term savings. But that’s a big enough alternative to keep national currencies honest, because they know that if they start to degrade, a viable alternative already exists, and if the pain of centralized fiat money grows great enough, people can and will move to that alternative. Only 140 million people use permissionless systems; but that’s enough that if you get locked out of or kicked out of your nation’s permissioned infrastructure, there’s an alternative that you can adopt without your life being entirely ruined.
In short, only 2% of the population use cryptocurrencies … but that 2% performs an enormous service for the other 98%, by keeping censors, and governments, and central banks, honest. Providing a viable decentralized alternative, in and of itself, mitigates many of the flaws of centralized systems. It could be, actually, the best of both worlds.
Cool read from TC Source Link
0 notes
theinvinciblenoob · 7 years ago
Link
Suppose, just for a moment, just for argument’s sake, that (some) cryptocurrencies are not a giant scam, and what’s more, they’re not just another kind of financial asset. Come on. Don’t look at me like that. Work with me here. Imagine, just for a moment, that there exist plausible futures in which they matter.
An interesting question to ask is: what exactly do those futures look like? Because if we can’t come up with any compelling answers, then we may conclude, by reductio ad absurdum, that a cryptofuture is awfully unlikely. So let’s walk through a few scenarios, shall we? And then judge how likely each one is.
1. The Crypto Maximalist Future
Situation: Bitcoin is the global currency. Except for “System D,” of course, and transactions hidden for reasons of tax avoidance, which run on ZCash, which is (ineffectively) banned by governments who fear the loss of their tax revenue from earned income hidden by zk-SNARKs. All retail transactions run through Lightning hubs, constantly watched and verified by AIs.
People maintain their own private keys, without which all of their life savings effectively vanish. These keys also maintain all of their own personal data, which they approve for usage by dapps on the Ethereum “world computer,” which performs billions of transactions per second courtesy of Plasma and (again) AIs monitoring the system with fraud proofs at the ready.
Fiat currencies died of hyperinflation. Banks died with them. Nation-states are on life support., and the new generation prefers statelessness to any citizenship. The world is increasingly controlled by a weird combination of libertarian Bitcoin seasteaders and communal Ethereum hacker collectives, who name themselves “phyles” after Neal Stephenson’s The Diamond Age, but call this The Crypto Age.
Likelihood: essentially nil, for many, many reasons, such as: The overwhelming majority of people don’t want to maintain their own private keys, and if you don’t maintain your own private keys, cryptocurrencies are essentially no different from fiat money held in banks, except for the many ways (such as the irrevocability of transactions) in which they are wildly inferior. Credit and cryptocurrencies play poorly together. Most people want strong governments, and strong governments want to control their own currencies, meaning, with only one small logical remove, that most people want fiat currencies. Deflation is actually bad. Etcetera etcetera etcetera etcetera etcetera. I mean come on people.
2. The Wall Street Crypto Future
Situation: Ordinary people don’t use cryptocurrencies. Why would they? But the financial world has gone full crypto; you always go full crypto. Stocks live only on the Ethereum blockchain. Bonds, too. Anyone who can qualify for a “security token” — a proof of your identity and valid investordom — can trade any stock, and any bond, in any market, from any country, anywhere in the world, in near real time, without asking for permission. Mostly via fully decentralized exchanges, though in certain markets centralized ones still have their advantages. Few people do it directly, though; their stock AIdvisors handle it for them.
Bitcoin is the global settlement and reserve currency; nobody cares about gold any more. Your credit card may be charged in dollars but that money is promptly converted to Bitcoin, and some satoshis are sent to the card issuer and the merchant bank (in a single transaction) before being converted back to dollars and sent to the vendor — the Lightning fees are so tiny, courtesy of the volume being so immense, that this is cheaper than the alternative. Ordinary people still don’t even know what Lightning is but the payment channels which connect banks, both within and between nations, pulse with hundreds of millions of dollars every single day.
Likelihood: slim to none. I personally see the irrevocability of crypto transactions, and the awkward “how do you provide cryptocurrency credit” issues as twin dealbreakers here — but I’m an engineer not a financier, so you could maybe persuade me that I’m wrong. We can at least see some of the advantages of cryptocurrencies here; why squander fortunes on running and maintaining hundreds to thousands of various financial databases and messaging buses around the world, when in theory we could have … well … one?
3. The Dapper Dapp Future
Situation: Financially, cryptocurrencies are just an asset class and a counterculture, but tokenized “fat protocols” powering decentralized apps have conquered the Internet. Facebook, Twitter, and increasingly even Google have been replaced by vast peer-to-peer networks in which processing and data are coordinated and optimized in real time by token transfers orchestrated by AI proxies. The rules of these systems are determined by frequent votes, which, again, are tokenized.
All of your personal data is packetized in many redundant tranches scattered across the Internet, protected by your private key(s) and various aspects of it are made available to services that wish to use it only as and when you or your proxies approve that access. You are rewarded with tokens for this access, which can then spend on other services. You maintain a portfolio of hundreds, sometimes thousands, of different kinds of tokens, and your AI proxy frequently trades between them so as to optimize this portfolio for your behavior.
Similar tokenized protocol infrastructures are beginning to creep offline and to organize meatspace projects, too, ranging from hardware development to massive-scale art collectives to urban planning and the transformation of entire cities. Token economics increasingly govern all of human behavior.
Likelihood: Yeah I don’t think so. I concede that in its way it’s an inspiring notion, but: most people want and like centralized solutions, which give them an authority to complain to, and to introduce and enforce rules, without having to vote on every single administrative detail of every network they connect to. (California ballot propositions are bad enough; imagine having to deal with their equivalent every day.) Dapps are by their very nature more complex, more fragile, and harder/slower to evolve than capps. (Imagine having to fork every time a feature changes. Now imagine some of those being hard forks.) Rewards to decentralized users are trivial — Facebook makes maybe $10/user/quarter, which is, to understate, not enough reward for the hassle of decentralization. Centralized solutions also have the advantages of things like “economies of scale” and “data centers which are more efficient than personal computers” and “databases which are vastly more efficient than blockchains.” And nobody wants to have to keep track of a portfolio of hundreds of different kinds of tokens no matter how useful their AI assistant may become.
4. The Global Crypto South Future
Situation: North America and Europe still use dollars and euros. Wall Street still uses its own systems, though it dabbles some in crypto assets. Facebook still rules the social media of the wealthy world. Cryptocurrencies are an afterthought, a curiosity, a fringe investment.
But the global South is different. Venezuela and Zimbabwe were the first to replace their currencies with cryptocurrencies that literally cannot hyperinflate. (I.e. a real cryptocurrency, not Venezuala’s what-even-is-that recent grotesquerie) Others soon followed; it was an easy and natural evolution from M-Pesa, Orange Money, and the like. There were some catastrophic failures in the early days, eg the BGP attack that took out most of the miners / validators of the Ethiopian cryptobirr and enabled a successful 51% attack that made a few hackers very wealthy at the expense of Addis Ababa’s treasury, but a few hard forks and version 2.0s later, stable prosperity was achieved.
The local stock and bond markets followed. As did the local Internet, where bandwidth costs far greater than those of the USA, plus the relatively greater size of potential dapp rewards, led to efficient local dapps, mostly using national cryptocurrencies (which can be traded for one another in real time on a vast decentralized exchange of atomic cross-chain payment channels), which have all but replaced centralized Western local services. Nowadays when Zimbabweans visit London and New York they’re taken aback by how backward those legacy financial systems seem.
Likelihood: I’m going to go out on a limb here and suggest that this is actually plausible. Not likely, necessarily, but plausible. In New York and London and Toronto and Paris, deflationary cryptocurrencies and real-time cross-country payment channels are basically solutions looking for a problem; I’d rather just use any one of my several no-international-usage-fees credit cards in Paris, and get the bonus miles / points, the ability to contest and reverse charges, the credit float, the extended warranty and other card bonuses, etc., rather than transact with the “global currency” Bitcoin over a Lightning payment channel, as cool as that sounds. But when you don’t have the mature, rewards-laden international payment system to hand, when you’re treated as suspicious and denied credit just because you’re from the most populous country in Africa, when your national currency’s inflation rate crosses double digits heading for triple … then, suddenly, the calculation looks very different indeed.
5. The Crypto Counterculture Future
Situation: Bitcoin did not conquer. Ethereum did not conquer. Tezos did not, EOS did not, Hashgraph did not. People around the world use credit cards, US dollars, euros, reals, yuan, etc., just as they always did. Wall Street might use some private / permissioned blockchains, as may some supply-chain enterprises, but their effect consists of an uptick in enterprise efficiency and a decrease in some costs, not the global revolution we were promised.
…That is, for 98% of the population. 2% however, are different. Maybe because they’re libertarians who mistrust the government, or hackers fascinated by the technology, or because they believe in the prospect of a better world. They’re willing to go through the struggle of dealing with private keys, funding payment channels, acquiring tokens to set up and pay for dapps and federate their data, and so forth. Only 2% of the population. But worldwide, that means 140 million people.
Only 140 million people use uncensorable, independent, decentralized social media. But that’s a big enough number that it means censorship doesn’t really fly on centralized media, either, because it can be transposed to the decentralized alternative. Only 140 million use cryptocurrencies for their day-to-day expenses and long-term savings. But that’s a big enough alternative to keep national currencies honest, because they know that if they start to degrade, a viable alternative already exists, and if the pain of centralized fiat money grows great enough, people can and will move to that alternative. Only 140 million people use permissionless systems; but that’s enough that if you get locked out of or kicked out of your nation’s permissioned infrastructure, there’s an alternative that you can adopt without your life being entirely ruined.
In short, only 2% of the population use cryptocurrencies �� but that 2% performs an enormous service for the other 98%, by keeping censors, and governments, and central banks, honest. Providing a viable decentralized alternative, in and of itself, mitigates many of the flaws of centralized systems. It could be, actually, the best of both worlds.
Likelihood: Call me an optimist, but I think this is the most likely outcome of all.
via TechCrunch
0 notes
abckidstvyara · 7 years ago
Text
The crypto alternative
The crypto alternative
Suppose, just for a moment, just for argument’s sake, that (some) cryptocurrencies are not a giant scam, and what’s more, they’re not just another kind of financial asset. Come on. Don’t look at me like that. Work with me here. Imagine, just for a moment, that there exist plausible futures in which they matter.
An interesting question to ask is: what exactly do those futures look like? Because if we can’t come up with any compelling answers, then we may conclude, by reductio ad absurdum, that a cryptofuture is awfully unlikely. So let’s walk through a few scenarios, shall we? And then judge how likely each one is.
1. The Crypto Maximalist Future
Situation: Bitcoin is the global currency. Except for “System D,” of course, and transactions hidden for reasons of tax avoidance, which run on ZCash, which is (ineffectively) banned by governments who fear the loss of their tax revenue from earned income hidden by zk-SNARKs. All retail transactions run through Lightning hubs, constantly watched and verified by AIs.
People maintain their own private keys, without which all of their life savings effectively vanish. These keys also maintain all of their own personal data, which they approve for usage by dapps on the Ethereum “world computer,” which performs billions of transactions per second courtesy of Plasma and (again) AIs monitoring the system with fraud proofs at the ready.
Fiat currencies died of hyperinflation. Banks died with them. Nation-states are on life support., and the new generation prefers statelessness to any citizenship. The world is increasingly controlled by a weird combination of libertarian Bitcoin seasteaders and communal Ethereum hacker collectives, who name themselves “phyles” after Neal Stephenson’s The Diamond Age, but call this The Crypto Age.
Likelihood: essentially nil, for many, many reasons, such as: The overwhelming majority of people don’t want to maintain their own private keys, and if you don’t maintain your own private keys, cryptocurrencies are essentially no different from fiat money held in banks, except for the many ways (such as the irrevocability of transactions) in which they are wildly inferior. Credit and cryptocurrencies play poorly together. Most people want strong governments, and strong governments want to control their own currencies, meaning, with only one small logical remove, that most people want fiat currencies. Deflation is actually bad. Etcetera etcetera etcetera etcetera etcetera. I mean come on people.
2. The Wall Street Crypto Future
Situation: Ordinary people don’t use cryptocurrencies. Why would they? But the financial world has gone full crypto; you always go full crypto. Stocks live only on the Ethereum blockchain. Bonds, too. Anyone who can qualify for a “security token” — a proof of your identity and valid investordom — can trade any stock, and any bond, in any market, from any country, anywhere in the world, in near real time, without asking for permission. Mostly via fully decentralized exchanges, though in certain markets centralized ones still have their advantages. Few people do it directly, though; their stock AIdvisors handle it for them.
Bitcoin is the global settlement and reserve currency; nobody cares about gold any more. Your credit card may be charged in dollars but that money is promptly converted to Bitcoin, and some satoshis are sent to the card issuer and the merchant bank (in a single transaction) before being converted back to dollars and sent to the vendor — the Lightning fees are so tiny, courtesy of the volume being so immense, that this is cheaper than the alternative. Ordinary people still don’t even know what Lightning is but the payment channels which connect banks, both within and between nations, pulse with hundreds of millions of dollars every single day.
Likelihood: slim to none. I personally see the irrevocability of crypto transactions, and the awkward “how do you provide cryptocurrency credit” issues as twin dealbreakers here — but I’m an engineer not a financier, so you could maybe persuade me that I’m wrong. We can at least see some of the advantages of cryptocurrencies here; why squander fortunes on running and maintaining hundreds to thousands of various financial databases and messaging buses around the world, when in theory we could have … well … one?
3. The Dapper Dapp Future
Situation: Financially, cryptocurrencies are just an asset class and a counterculture, but tokenized “fat protocols” powering decentralized apps have conquered the Internet. Facebook, Twitter, and increasingly even Google have been replaced by vast peer-to-peer networks in which processing and data are coordinated and optimized in real time by token transfers orchestrated by AI proxies. The rules of these systems are determined by frequent votes, which, again, are tokenized.
All of your personal data is packetized in many redundant tranches scattered across the Internet, protected by your private key(s) and various aspects of it are made available to services that wish to use it only as and when you or your proxies approve that access. You are rewarded with tokens for this access, which can then spend on other services. You maintain a portfolio of hundreds, sometimes thousands, of different kinds of tokens, and your AI proxy frequently trades between them so as to optimize this portfolio for your behavior.
Similar tokenized protocol infrastructures are beginning to creep offline and to organize meatspace projects, too, ranging from hardware development to massive-scale art collectives to urban planning and the transformation of entire cities. Token economics increasingly govern all of human behavior.
Likelihood: Yeah I don’t think so. I concede that in its way it’s an inspiring notion, but: most people want and like centralized solutions, which give them an authority to complain to, and to introduce and enforce rules, without having to vote on every single administrative detail of every network they connect to. (California ballot propositions are bad enough; imagine having to deal with their equivalent every day.) Dapps are by their very nature more complex, more fragile, and harder/slower to evolve than capps. (Imagine having to fork every time a feature changes. Now imagine some of those being hard forks.) Rewards to decentralized users are trivial — Facebook makes maybe $10/user/quarter, which is, to understate, not enough reward for the hassle of decentralization. Centralized solutions also have the advantages of things like “economies of scale” and “data centers which are more efficient than personal computers” and “databases which are vastly more efficient than blockchains.” And nobody wants to have to keep track of a portfolio of hundreds of different kinds of tokens no matter how useful their AI assistant may become.
4. The Global Crypto South Future
Situation: North America and Europe still use dollars and euros. Wall Street still uses its own systems, though it dabbles some in crypto assets. Facebook still rules the social media of the wealthy world. Cryptocurrencies are an afterthought, a curiosity, a fringe investment.
But the global South is different. Venezuela and Zimbabwe were the first to replace their currencies with cryptocurrencies that literally cannot hyperinflate. (I.e. a real cryptocurrency, not Venezuala’s what-even-is-that recent grotesquerie) Others soon followed; it was an easy and natural evolution from M-Pesa, Orange Money, and the like. There were some catastrophic failures in the early days, eg the BGP attack that took out most of the miners / validators of the Ethiopian cryptobirr and enabled a successful 51% attack that made a few hackers very wealthy at the expense of Addis Ababa’s treasury, but a few hard forks and version 2.0s later, stable prosperity was achieved.
The local stock and bond markets followed. As did the local Internet, where bandwidth costs far greater than those of the USA, plus the relatively greater size of potential dapp rewards, led to efficient local dapps, mostly using national cryptocurrencies (which can be traded for one another in real time on a vast decentralized exchange of atomic cross-chain payment channels), which have all but replaced centralized Western local services. Nowadays when Zimbabweans visit London and New York they’re taken aback by how backward those legacy financial systems seem.
Likelihood: I’m going to go out on a limb here and suggest that this is actually plausible. Not likely, necessarily, but plausible. In New York and London and Toronto and Paris, deflationary cryptocurrencies and real-time cross-country payment channels are basically solutions looking for a problem; I’d rather just use any one of my several no-international-usage-fees credit cards in Paris, and get the bonus miles / points, the ability to contest and reverse charges, the credit float, the extended warranty and other card bonuses, etc., rather than transact with the “global currency” Bitcoin over a Lightning payment channel, as cool as that sounds. But when you don’t have the mature, rewards-laden international payment system to hand, when you’re treated as suspicious and denied credit just because you’re from the most populous country in Africa, when your national currency’s inflation rate crosses double digits heading for triple … then, suddenly, the calculation looks very different indeed.
5. The Crypto Counterculture Future
Situation: Bitcoin did not conquer. Ethereum did not conquer. Tezos did not, EOS did not, Hashgraph did not. People around the world use credit cards, US dollars, euros, reals, yuan, etc., just as they always did. Wall Street might use some private / permissioned blockchains, as may some supply-chain enterprises, but their effect consists of an uptick in enterprise efficiency and a decrease in some costs, not the global revolution we were promised.
…That is, for 98% of the population. 2% however, are different. Maybe because they’re libertarians who mistrust the government, or hackers fascinated by the technology, or because they believe in the prospect of a better world. They’re willing to go through the struggle of dealing with private keys, funding payment channels, acquiring tokens to set up and pay for dapps and federate their data, and so forth. Only 2% of the population. But worldwide, that means 140 million people.
Only 140 million people use uncensorable, independent, decentralized social media. But that’s a big enough number that it means censorship doesn’t really fly on centralized media, either, because it can be transposed to the decentralized alternative. Only 140 million use cryptocurrencies for their day-to-day expenses and long-term savings. But that’s a big enough alternative to keep national currencies honest, because they know that if they start to degrade, a viable alternative already exists, and if the pain of centralized fiat money grows great enough, people can and will move to that alternative. Only 140 million people use permissionless systems; but that’s enough that if you get locked out of or kicked out of your nation’s permissioned infrastructure, there’s an alternative that you can adopt without your life being entirely ruined.
In short, only 2% of the population use cryptocurrencies … but that 2% performs an enormous service for the other 98%, by keeping censors, and governments, and central banks, honest. Providing a viable decentralized alternative, in and of itself, mitigates many of the flaws of centralized systems. It could be, actually, the best of both worlds.
Likelihood: Call me an optimist, but I think this is the most likely outcome of all.
0 notes
hopesmilesx · 7 years ago
Text
I think I’m Scared of Love...
I’m listening to this podcast (Black Girl Podcast) and it is AMAZING! These women are incredibly funny and so damn relatable. On episode 4 they were talking about love specifically being scared of love and running away from love. I’ve also been thinking about of where I stand with love, relationships, dating, boyfriends. So here I am writing on my reflections on where I stand with love…or at least where I think I stand. Where do I stand? It has been two and a half years since I broke up with my last boyfriend. Throughout these past 2 and a half years I have explored the dating life, went on actual dates, talked to different guys but no one really caught my eye for something longer than just a few short months or weeks. I told myself that if I really wanted to find love again, that I would actually have to give guys a chance. Even the one's who I think might not be in my interests. So, I did. I gave chances to different men who I have never pictured myself talking to. Although nothing ever worked out with any of these guys, it was all a learning experience. I really did learn a lot about myself, the dating world and what not to do on dates. But, I still felt like there was something wrong with this whole picture. Why couldn't I form the relationships I wanted with men? Then, I reflected and realized that part of it was because I was always looking for a boyfriend and not a friend. I realized that I needed to build a friendship with a guy before I decided to date them. This sounds obvious but for me it wasn't. I was too busy thinking of immediately trying to form a relationship with someone. After all, that's how my ex and I started dating; by building a friendship. Now, I am practicing this. It is going better than expected. But there is still several things that continue to hold me back from building these friendships; I am guarded and scared of getting hurt. I'm truly scared of being vulnerable, opening up and then poof, the person is no longer in my life. I become self-conscious of what information I reveal, when I reveal it and how. It becomes easier for me to be physical then to open up my heart because I can deal with being touched a few times then heartbroken for an uncertain amount of time. So, this brings me back to the title of this post: I think I am Scared of Love; more importantly being left. This also brings back my past and it's painful but I know part of the reason why I feel this way is because of my past dealing with abandonment in my ways. So now, thinking about a real relationship with someone is actually scary. I reach a point when everything is good and then I begin to retract because in some ways I rather leave the person before they leave me. I know this is fucked up but it's how my brain works at the moment. So this makes believe that to be in a relationship, the person I decide to start that journey with (whenever that is) will have to be patient with me. And understanding as well as aware that I might take a longer time to trust and to open up. I am willing to do the work that a relationship requires but it will take a bit of an extra push. I am scared but I also take risks with the hope that something beautiful could form. But I also remain guarded in some areas because I know letting someone in is not easy. I don't have a clear blue, skied past. Like some, my past is sad, traumatic, eventful and painful. I've only opened up to my ex about everything; well almost. So now, to do it again with someone scares the shit out of me. I am scared that if I tell them, they will leave. Or if I tell them they will look at me differently or if I tell them then they won't care. This is where my mind is at right now. However, despite all of my worries and how guarded I am, I still want to fall in love again because that is one of the most beautiful things that I've had the privilege to experience in my lifetime and to experience it again would be kind of incredible. Idk when that will happen but I know my heart is prepping for the moment and I know it will be a great and scary journey. ... Balance+Consistency=Longevity (BGP) This sounds right to me. Xoxo
0 notes
stephenlibbyy · 4 years ago
Text
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic
  On August 30, 2020, Level 3/Century Link, AS 3356 had major Internet outage. In fact this outage effected massive amount of networks, including very well know ones such as Amazon, Microsoft, Twitter, Discord, Reddit etc.
3.5% Global Internet Traffic was dropped due to this outage and entire network converged after almost 7 hours. This is huge amount of time. When we usually discuss convergence, specifically fast convergence, ‘Seconds’ if not ‘ Milliseconds ‘ are the target values.
No one wants to have minutes level network convergence. But when there is an Outage like this, we categorize them as ‘ Catastrophic Failures’ and unfortunately network design usually doesn’t take this kind of failures into an account.
But could it be prevented?
In the first place, let’s understand that, this event, similar to many other catastrophic network events, started at a single location. (According to a CenturyLink status page, the issue originated from CenturyLink’s data center in Mississauga, a city near Ontario, Canada.)
But it spread over entire backbone of AS3356.
In fact, I remember on 2014, which we famously know as 512k incident happened because of this network (Level 3) as well and that event also caused Global outages!.(Default Free Zone/ Global Routing Table was exceeded 512000 prefixes for IPv4 Unicast, Level 3 was announced 30k prefixes, and it was one of the defined Route Leaks in RFC 7908)
August 30, 2020 issue was not Route Leak though. It happened due to bad Flowspec (RFC 5575) rule.
In fact, Flowspec based outages happened many times in the past and CloudFlare Flowspec Based Outage was famous one.
Flowspec is an extension for the BGP that allows companies to use BGP routes to distribute firewall/policy rules across their network.
Flowspec announcements are usually used when dealing with security incidents, such as BGP hijacks or DDoS attacks, as it allows companies to change their entire network to react and mitigate attacks within seconds.
I usually explain it as the more flexible version of RTBH (Remotely Trigged Black Hole), though there are many differences between the two. Although Service Providers gives the customer to control their DDOS prevention with RTBH, they don’t like to give control via Flowspec.
Flowspec is for me no different than VTP or any other protocol, which the potential risks of it not greater than the benefits. So, you can bring the entire network down, relatively easily and tradeoff is operational simplicity.
Century Link/Level 3 took coordinated action with the other providers and they met in IRC to discuss the action, and other providers simply de-peered(disabled) their BGP session with the AS3356 until the problem is resolved. So, one more time we have seen how bad Flowspec rule would create AS (Autonomous System) wide outage easily, and when this AS is one of the Global Tier 1 company can effect millions of people again. Hope this time we take lesson, and take Routing Security seriously!
BGP Security, Interdomain Routing, BGP Traffic Engineering, Ingress and Egress Peer Engineering and many other details with BGP can be found in my BGP Zero to Her Course.
Cheers
Orhan Ergun
Century Link Outage!
The post Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic appeared first on orhanergun.net.
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic published first on https://wdmsh.tumblr.com/
0 notes
stephenlibbyy · 4 years ago
Text
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic
  On August 30, 2020, Level 3/Century Link, AS 3356 had major Internet outage. In fact this outage effected massive amount of networks, including very well know ones such as Amazon, Microsoft, Twitter, Discord, Reddit etc.
3.5% Global Internet Traffic was dropped due to this outage and entire network converged after almost 7 hours. This is huge amount of time. When we usually discuss convergence, specifically fast convergence, ‘Seconds’ if not ‘ Milliseconds ‘ are the target values.
No one wants to have minutes level network convergence. But when there is an Outage like this, we categorize them as ‘ Catastrophic Failures’ and unfortunately network design usually doesn’t take this kind of failures into an account.
But could it be prevented?
In the first place, let’s understand that, this event, similar to many other catastrophic network events, started at a single location. (According to a CenturyLink status page, the issue originated from CenturyLink’s data center in Mississauga, a city near Ontario, Canada.)
But it spread over entire backbone of AS3356.
In fact, I remember on 2014, which we famously know as 512k incident happened because of this network (Level 3) as well and that event also caused Global outages!.(Default Free Zone/ Global Routing Table was exceeded 512000 prefixes for IPv4 Unicast, Level 3 was announced 30k prefixes, and it was one of the defined Route Leaks in RFC 7908)
August 30, 2020 issue was not Route Leak though. It happened due to bad Flowspec (RFC 5575) rule.
In fact, Flowspec based outages happened many times in the past and CloudFlare Flowspec Based Outage was famous one.
Flowspec is an extension for the BGP that allows companies to use BGP routes to distribute firewall/policy rules across their network.
Flowspec announcements are usually used when dealing with security incidents, such as BGP hijacks or DDoS attacks, as it allows companies to change their entire network to react and mitigate attacks within seconds.
I usually explain it as the more flexible version of RTBH (Remotely Trigged Black Hole), though there are many differences between the two. Although Service Providers gives the customer to control their DDOS prevention with RTBH, they don’t like to give control via Flowspec.
Flowspec is for me no different than VTP or any other protocol, which the potential risks of it not greater than the benefits. So, you can bring the entire network down, relatively easily and tradeoff is operational simplicity.
Century Link/Level 3 took coordinated action with the other providers and they met in IRC to discuss the action, and other providers simply de-peered(disabled) their BGP session with the AS3356 until the problem is resolved. So, one more time we have seen how bad Flowspec rule would create AS (Autonomous System) wide outage easily, and when this AS is one of the Global Tier 1 company can effect millions of people again. Hope this time we take lesson, and take Routing Security seriously!
BGP Security, Interdomain Routing, BGP Traffic Engineering, Ingress and Egress Peer Engineering and many other details with BGP can be found in my BGP Zero to Her Course.
Cheers
Orhan Ergun
Century Link Outage!
The post Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic appeared first on orhanergun.net.
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic published first on https://wdmsh.tumblr.com/
0 notes
stephenlibbyy · 4 years ago
Text
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic
  On August 30, 2020, Level 3/Century Link, AS 3356 had major Internet outage. In fact this outage effected massive amount of networks, including very well know ones such as Amazon, Microsoft, Twitter, Discord, Reddit etc.
3.5% Global Internet Traffic was dropped due to this outage and entire network converged after almost 7 hours. This is huge amount of time. When we usually discuss convergence, specifically fast convergence, ‘Seconds’ if not ‘ Milliseconds ‘ are the target values.
No one wants to have minutes level network convergence. But when there is an Outage like this, we categorize them as ‘ Catastrophic Failures’ and unfortunately network design usually doesn’t take this kind of failures into an account.
But could it be prevented?
In the first place, let’s understand that, this event, similar to many other catastrophic network events, started at a single location. (According to a CenturyLink status page, the issue originated from CenturyLink’s data center in Mississauga, a city near Ontario, Canada.)
But it spread over entire backbone of AS3356.
In fact, I remember on 2014, which we famously know as 512k incident happened because of this network (Level 3) as well and that event also caused Global outages!.(Default Free Zone/ Global Routing Table was exceeded 512000 prefixes for IPv4 Unicast, Level 3 was announced 30k prefixes, and it was one of the defined Route Leaks in RFC 7908)
August 30, 2020 issue was not Route Leak though. It happened due to bad Flowspec (RFC 5575) rule.
In fact, Flowspec based outages happened many times in the past and CloudFlare Flowspec Based Outage was famous one.
Flowspec is an extension for the BGP that allows companies to use BGP routes to distribute firewall/policy rules across their network.
Flowspec announcements are usually used when dealing with security incidents, such as BGP hijacks or DDoS attacks, as it allows companies to change their entire network to react and mitigate attacks within seconds.
I usually explain it as the more flexible version of RTBH (Remotely Trigged Black Hole), though there are many differences between the two. Although Service Providers gives the customer to control their DDOS prevention with RTBH, they don’t like to give control via Flowspec.
Flowspec is for me no different than VTP or any other protocol, which the potential risks of it not greater than the benefits. So, you can bring the entire network down, relatively easily and tradeoff is operational simplicity.
Century Link/Level 3 took coordinated action with the other providers and they met in IRC to discuss the action, and other providers simply de-peered(disabled) their BGP session with the AS3356 until the problem is resolved. So, one more time we have seen how bad Flowspec rule would create AS (Autonomous System) wide outage easily, and when this AS is one of the Global Tier 1 company can effect millions of people again. Hope this time we take lesson, and take Routing Security seriously!
Century Link Outage!
The post Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic appeared first on orhanergun.net.
Century Link/Level 3 Outage is one of the biggest Internet Problem! 3.5% Drop in Global Internet Traffic published first on https://wdmsh.tumblr.com/
0 notes
stephenlibbyy · 5 years ago
Text
Interdatacenter broadcast control – ARP Proxy in OTV and EVPN
When it comes to multi domain or Inter datacenter communication, minimizing the broadcast traffic between the datacenters is an important scaling requirement.
Especially if you are dealing with millions of end hosts, localizing the broadcast traffic is critical to save resources on the network and the end hosts. Resources are bandwidth , CPU , memory and so on.
In this post I will mention how ARP cache is populated in OTV and EVPN technologies and the importance of ARP proxy function.
Classical approach to control broadcast traffic by localizing it within a datacenter is Proxying.
ARP is a good example of broadcast packet and ARP Proxy or Proxy ARP works either based on control or data plane learning.
Idea is, destination MAC address can be learned from the local device which keeps ARP cache and ARP traffic doesn’t have to traffic over datacenter interconnect links.
I said ARP cache can be populated either via control or data plane learning and let me give an example for each one of them.
OTV as a Cisco preparatory protocol advertise the MAC addresses through IS-IS. MAC reachability information is learned via control plane. But OTV doesn’t advertise MAC to IP binding through IS-IS. MAC to IP binding is used to populate ARP cache and it is done via data plane learning in OTV.
If MAC to IP binding information would be sent in a control plane protocol, then we would say the ARP cache is populated via control plane. It is not the case in OTV.
On the other hand, EVPN which uses BGP control plane to advertise MAC address reachability information also send IP to MAC binding information through BGP updates.
Thus in EVPN, not only the MAC addresses but also the ARP cache is populated via control plane.
Probably this is one of the biggest misunderstanding on ARP proxy function with two popular Interdomain Layer 2 Overlay protocols.
The post Interdatacenter broadcast control – ARP Proxy in OTV and EVPN appeared first on orhanergun.net.
Interdatacenter broadcast control – ARP Proxy in OTV and EVPN published first on https://wdmsh.tumblr.com/
0 notes
stephenlibbyy · 6 years ago
Text
VRF route leaking: time to get a little more social!
Virtual Routing and Forwarding (VRF) is a ubiquitous concept in networking, first introduced in the late 1990s as the control and data plane mechanism to provide traffic isolation at layer 3 over a shared network infrastructure. VRF for Linux is an excellent blog that describes the technology behind VRFs, especially as it pertains to the Linux kernel. With the introduction of support for leaking of routes, VRFs get to enjoy their isolation while also having the nous to mix and mingle.
Wait, aren’t VRFs meant to be completely isolated?
You have a valid question there. That was certainly the initial use case for VRFs. Each VRF was intended to represent a customer of a service provider and isolation was a fundamental tenet. Each VRF had its own routing protocol sessions and IPv4 and IPv6 routing tables and route computation as well as packet forwarding was independent from other VRFs. All communication stayed within the VRF other than specific scenarios such as reaching the Internet. Hershey’s wouldn’t want to get too chatty with Lindt, right? No, VRFs weren’t meant to be gregarious.
As VRFs moved outside the realm of the service provider and started finding application elsewhere, such as in the data center or within an enterprise, additional needs arose for VRFs to be a bit more social.
Key use cases for VRF route leaking
As VRFs started representing departments or business functions within an enterprise rather than just an ISP’s customer, the need for some inter-VRF communication arose. Hey, I do need the Friday happy hour notices from Human Resources to reach me, though I may not be able to log on to their servers and give myself a bonus!
In a multi-tenant data center, or even in an enterprise cloud, offering of shared services started becoming common. The Engineering and Marketing teams don’t need their individual email servers, though I daresay the Engineering team deserves its own espresso machine. Services such as storage, backup, security/AAA etc. are often offered or implemented as shared, and made available to multiple tenants as depicted in the diagram below.
Additionally, VRFs regularly need external connectivity. This connectivity may not be limited to just the Internet — it might also be connected to services hosted externally or to other data centers.
All of the use cases above, and others like them, can be addressed by leaking routes between VRFs to get them talking to one another. The leaking of routes results in each VRF getting to know the IP routing information to reach destinations that are part of another VRF.
In Cumulus Linux, you have choice in how you want to implement route leaking between VRFs. You can control this as closely as you would your child’s first foray into social networking by setting everything up through explicit configuration. Or, you can take it easy and just define the broad parameters and let the implementation handle it from there. Let’s dig in a bit more.
Static route leaking — keep things on a tight leash
For strict control of inter-VRF chatter, you configure routes manually in a VRF whose next hops are reachable over an interface that is part of another VRF. This is useful when a small number of specific destinations in a different VRF need to be reachable from another VRF. You can use static route leaking to reach remote destinations in another VRF (ones that are reachable through a next hop router) or directly connected destinations in another VRF. Note that in terms of configuration, you have to configure routes in each of the two VRFs in order to get them to talk. A statically configured leaked route will be active only if the specified next hop or connected destination is active in its original VRF.
Dynamic route leaking — just set the boundaries
What if the strict regime of static route leaking doesn’t work for you? Fear not, Cumulus Linux also supports a more dynamic approach where the system deals with routes as they come and go. All that you have to do is set the boundaries and the system will honor that as routes are moved from one VRF to another.
So, what are these boundaries that I’m speaking of? The only thing you really need to specify is that VRF A is interested in the routes of VRF B. As routes are learned, updated and deleted in VRF B, the system takes care of leaking them over to VRF A. You can of course apply additional control — filtering the routes that get leaked. Again, for a proper dialogue, you have to also specify that VRF B is interested in the routes of VRF A; otherwise, all you have is a monologue which can quickly become dull.
Under the hood, the horsepower for both static and dynamic route leaking is provided by the Free Range Routing protocol suite (FRR). Here is a nice blog if you wanted to know more about this protocol suite. Dynamic route leaking happens via the BGP routing protocol. Here is a way to visualize it:
The advantage of route leaking via BGP is that BGP has well-defined mechanisms for dealing with VRFs and VPNs — constructs such as Route Distinguishers (RDs) and Route Targets (RTs). Fear not though, because once again, we make this simple. FRR has been coded to figure this all out; all you have to do is specify the broad parameters as mentioned earlier. Also, IPv6 aficionados needn’t worry: though the illustration above only refers to IPv4, route leaking for IPv6 routes is fully supported.
Since a party of two can sometimes get a little monotonous, dynamic route leaking can support multiple VRFs. This is particularly useful when shared services are deployed in a specific VRF and many other VRFs need access to this service.
If you’d like to cut to the chase and look at the technical documentation, head here.
VRF route leaking in cahoots with EVPN
We all know hip and trendy gravitate towards one another. Yes, VRF route leaking has applications in an EVPN context too. What is special about this? For one, EVPN has a lot to do with host routes, and that is a level of detail you don’t want to bother with when leaking routes across VRFs. Also, there are a myriad of routing paradigms for EVPN. Cumulus Linux is currently working on a simplified solution for this use case, so check back here for an update in a little while. By the way, for a good recap of EVPN and its support for routing, read this excellent blog.
In conclusion
With the support for VRF route leaking, Cumulus Linux has expanded the reach and power of open networking to more use cases. And in its inimitable fashion, provided a choice of options with simplified configuration. VRFs keep their isolation but are no longer held incommunicado. Who doesn’t like to have their cake and eat it too? I definitely know I do.
The post VRF route leaking: time to get a little more social! appeared first on Cumulus Networks Blog.
VRF route leaking: time to get a little more social! published first on https://wdmsh.tumblr.com/
0 notes