Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
Wij wijzen u graag op het volgende
Door drukte zijn de levertijden van PostNL aangepast en kan uw pakket vertraging oplopen. Door de Brexit kan de levering van Engelse boeken vertraging oplopen.

Cloud Native Data–Center Networking

Architecture, Protocols, and Tools

Paperback Engels 2019 9781492045601
Verkooppositie 5009
Verwachte levertijd ongeveer 8 werkdagen


If you want to study, build, or simply validate your thinking about modern cloud native data center networks, this is your book. Whether you’re pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the steps necessary to design a data center that’s affordable, high capacity, easy to manage, agile, and reliable.

Ideal for network architects, data center operators, and network and containerized application developers, this book mixes theory with practice to guide you through the architecture and protocols you need to create and operate a robust, scalable network infrastructure. The book offers a vendor-neutral way to look at network design. For those interested in open networking, this book is chock-full of examples using open source software, from FRR to Ansible.

In the context of a cloud native data center, you’ll examine:
- Clos topology
- Network disaggregation
- Network operating system choices
- Routing protocol choices
- Container networking
- Network virtualization and EVPN
- Network automation


Aantal pagina's:450
Hoofdrubriek:IT-management / ICT


Wees de eerste die een lezersrecensie schrijft!

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Dinesh Dutt

Dinesh Dutt is Chief Scientist, Cumulus Networks; Fellow, Cisco Systems.

Andere boeken door Dinesh Dutt


How This Book Is Organized
Software Used in This Book
Conventions Used in This Book
Using Code Examples
O’Reilly Online Learning
How to Contact Us

1. The Motivations for a New Network Architecture
The Application-Network Shuffle
The Network Design from the Turn of the Century
The Charms of Bridging
Building Scalable Bridging Networks
The Trouble with the Access-Aggregation-Core Network Design
Failure Domain
Lack of Agility
The Stories Not Told

2. Clos: Network Topology for a New World
Introducing the Clos Topology
A Deeper Dive into the Clos Topology
Use of Homogeneous Equipment
Routing as the Fundamental Interconnect Model
Oversubscription in a Clos Topology
Interconnect Link Speeds
Practical Constraints
Fine-Grained Failure Domain
Scaling the Clos Topology
Comparing the Two Three-Tier Models
Application Matchup
Data Center Build Out
Implications of the Clos Topology
Rethinking Failures and Troubleshooting
Simplified Inventory Management
Network Automation
Some Best Practices for a Clos Network
Use of Multiple Links Between Switches
Use of Spines as Only a Connector
Use of Chassis as a Spine Switch
Host Attach Models

3. Network Disaggregation
What Is Network Disaggregation?
Why Is Network Disaggregation Important?
Controlling Costs
Avoiding Vendor Lock-In
Standardization of Features
What Made Network Disaggregation Possible Now?
Difference in Network Operations with Disaggregation
Purchase and Support
First Boot
Open Network Installer Environment
How Does ONIE Work?
The Players in Network Disaggregation: Hardware
Packet-Switching Silicon
CPU Complex
The Standards Bodies
Common Myths About Network Disaggregation
Some Best Practices for Engaging with Network Disaggregation

4. Network Operating System Choices
Requirements of a Network Device
The Rise of Software-Defined Networking and OpenFlow
More Details About SDN and OpenFlow
The Trouble with OpenFlow
The Effect of SDN and OpenFlow on Network Disaggregation
NOS Design Models
Location of Switch Network State
Programming the Switching Silicon
The Reasons Behind the Different Answers
User Interface
Comparing the NOS Models with Cloud Native NOS Requirements
Illustrating the Models with an Example
What Else Is Left for a NOS to Do?

5. Routing Protocol Choices
Routing Overview
How Routing Table Lookups Work
How Routes Are Chosen
Types of Routing Table Entries
Routing Protocols Overview
Distance Vector Protocols Versus Link-State Protocols
Distance Vector Dissected
Link-State Dissected
Summarizing Distance Vector Versus Link-State Route Exchange
Comparing Distance Vector and Link-State Protocols
Scaling in Link-State and Distance Vector Protocols
Multipathing in Distance Vector and Link-State Protocols
No News Is Good News
Propagation Delay in Link-State and Distance Vector Protocols
Multiprotocol Support
Unnumbered Interfaces
Routing Configuration Complexity
Routing Protocols in Clos Networks
Link-State Versus Distance Vector When Links or Nodes Fail
Route Summarization in Clos Networks
Security and Safeguards
Bidirectional Forwarding Detection
Requirements of a Routing Protocol in the Data Center
Basic Requirements
Advanced Requirements
Rare or Futuristic Requirements
Choosing the Routing Protocol for Your Network

6. Network Virtualization
What Is Network Virtualization?
Uses of Network Virtualization in the Data Center
Forcing Traffic to Take a Certain Path
Applications That Require L2 Adjacency
Separating Switch Management Network from Data Traffic
Network Virtualization Models
Service Abstraction: L2 or L3
Inline Versus Overlay Virtual Networks
Network Tunnels: The Fundamental Overlay Construct
Benefits of Network Tunnels
The Drawbacks of Network Tunnels
Network Virtualization Solutions for the Data Center
Other Network Virtualization Solutions
Practical Limits on the Number of Virtual Networks
Size of Virtual Network ID in Packet Header
Hardware Limitations
Scalability of Control Plane and Software
Deployment Model
Control Protocols for Network Virtualization
Relationship of Virtual and Physical Control Plane
The Centralized Control Model
The Protocol-Based Control Model
Vendor Support for Network Virtualization
Merchant Silicon
Illustrating VXLAN Bridging and Routing
VXLAN Bridging Example: H1 to H5
VXLAN and Routing: H1 to H6
Summarizing VXLAN Bridging and Routing

7. Container Networking
Introduction to Containers
Network Namespaces
Virtual Ethernet Interfaces
Container Networking: Diving In
Single-Host Container Networking
Multihost Container Networking
Comparing Different Container Network Solutions
Kubernetes Networking

8. Multicast Routing
Multicast Routing: Overview
The Uses of Multicast Routing
Problems to Solve in Multicast Routing
Building a Multicast Tree
Multicast Routing Protocol
PIM Sparse Mode
Rendezvous Point
Building a Multicast Distribution Tree
Multiple RPs and MSDP
PIM-SM in the Data Center
PIM-SM and Unnumbered

9. Life on the Edge of the Data Center
The Problems
Connectivity Models
Why Connect to the External World?
Bandwidth Requirements for External Connectivity
Connecting the Clos Topology to the External World
Routing at the Edge
Hybrid Cloud Connectivity

10. Network Automation
What Is Network Automation?
Who Needs Network Automation?
Does Network Automation Mean Learning Programming?
Why Is Network Automation Difficult?
The Trouble with IP Addresses and Interfaces
Network Protocol Configuration Complexity
Lack of Programmatic Access
Traditional Network OS Limitations
What Can Network Developers Do to Help Network Automation?
Tools for Network Automation
Automation Best Practices
Ansible: An Overview
Ad Hoc Commands
Structuring Playbooks
A Typical Automation Journey
Glorified File Copy
Automate the Configuration That Was Not Device Specific
Template the Routing and Interface Configuration
More Templating and Roles
Some Observations from Fellow Journeymen
Validating the Configuration
Single Source of Truth
Commit/Rollback in the Age of Automation
Vagrant and Network Testing
Automating Verification

11. Network Observability
What Is Observability?
The Current State of Network Observability
The Disenchantments of SNMP
Box-by-Box Approach to Network Observability
Why Is Observability Difficult with Networking?
Observability in Data Center Networks: Special Characteristics
Decomposing Observability
The Mechanics of Telemetry
What Do We Gather?
How Do We Gather?
When Do We Gather?
Storing the Data
The Uses for Multiple Data Sources
Of Alerts and Dashboards

12. Rethinking Network Design
Standard, Simple Building Blocks
Network Disaggregation
Failure: Missing the Forest for the Trees
L2 Failure Model Versus L3 Failure Model
Simple Versus Complex Failures
Handling Upgrades
The Pursuit of Less
How the Right Architecture Helps
Feature Set Essentialism
Constraints on the Cloud Native Network Design Principles

13. Deploying OSPF
The Problems to Be Addressed
Determining Link-State Flooding Domains
Numbered Versus Unnumbered OSPF
Support for IPv6
Support for VRFs
Requirements for Running OSPF on Servers
OSPF Route Types
The Messiness of Stubbiness
OSPF Timers
Dissecting an OSPF Configuration
Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv4
Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv6
Configuration with Three-Tier Clos Running OSPF
Configuration with Servers Running OSPF: IPv4
Summarizing Routes in OSPF
OSPF and Upgrades
Best Practices

14. BGP in the Data Center
Basic BGP Concepts
BGP Protocol Overview
BGP Peering
BGP State Machine
Autonomous System Number
BGP Capabilities
BGP Attributes, Communities, Extended Communities
BGP Best-Path Computation
Support for Multiple Protocols
BGP Messages
Adapting BGP to the Data Center
eBGP Versus iBGP
eBGP: Flying Solo
Private ASNs
BGP’s ASN Numbering Scheme
Multipath Selection
Fixing BGP’s Convergence Time

15. Deploying BGP
Core BGP Configuration Concepts
Traditional Configuration for a Two-Tier Clos Topology: IPv4
Peer Group
Routing Policy
Route Maps: Implementation of Routing Policy
Providing Sane Defaults for the Data Center
BGP Unnumbered: Eliminating Pesky Interface IP Addresses
A remote-as by Any Name
How Unnumbered Interfaces Work with BGP
Final Observations on BGP Configuration in FRR
Unnumbered BGP Support in Routing Stacks
Configuring IPv6
BGP and VRFs
Peering with BGP Speakers on the Host
BGP Dynamic Neighbors
BGP and Upgrades
AS_PATH Prepend
Best Practices

16. EVPN in the Data Center
Why Is EVPN Popular?
The Problems a Network Virtualization Control Plane Must Address
Where Does a VTEP Reside?
One Protocol to Rule Them All, Or…?
iBGP Characteristics
Separate Underlay and Overlay Protocols
eBGP Only
BGP Constructs to Support Virtual Network Routes
Route Distinguisher
Route Target
FRR’s use of RD and RT
EVPN Route Types
Communicating Choice of BUM Handling
EVPN and Bridging
EVPN Bridging with Ingress Replication
EVPN Bridging with Routed Multicast Underlay
Handling MAC Moves
Support for Dual-Attached Hosts
Host-Switch Interconnect Model
VXLAN Model for Dual-Attached Hosts
Switch Peering Options
Handling Link Failures
Avoiding Duplicate Multidestination Frames
ARP/ND Suppression
EVPN and Routing
Centralized Versus Distributed Routing
Symmetric Versus Asymmetric Routing
Route Advertisements
The Use of VRFs
Deploying EVPN in Large Networks

17. Deploying Network Virtualization
The Configuration Scenarios
Device-Local Configuration
Single eBGP Session
OSPF Underlay, iBGP Overlay
allowas-in Versus Separate ASN
PIM/MSDP Configuration
EVPN on the Host
Best Practices

18. Validating Network Configuration
Validating the Network State
System Validation
Cabling Validation
Using Ansible to Validate Cabling
Interface Configuration Validation
Automating Interface Configuration Validation
Routing Configuration Validation
Validating an OSPF Configuration
Validating a BGP Configuration
Stripping the Private ASNs
Validating Network Virtualization
Application’s Network Validation
Data-Plane Validation

19. Coda


Alle 100 bestsellers


Populaire producten



        Cloud Native Data–Center Networking