Cloud Native Data Center Networking. Architecture, Protocols, and Tools
- Autor:
- Dinesh G. Dutt
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 486
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Cloud Native Data Center Networking. Architecture, Protocols, and Tools
If you want to study, build, or simply validate your thinking about modern cloud native data center networks, this is your book. Whether you’re pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the steps necessary to design a data center that’s affordable, high capacity, easy to manage, agile, and reliable.
Ideal for network architects, data center operators, and network and containerized application developers, this book mixes theory with practice to guide you through the architecture and protocols you need to create and operate a robust, scalable network infrastructure. The book offers a vendor-neutral way to look at network design. For those interested in open networking, this book is chock-full of examples using open source software, from FRR to Ansible.
In the context of a cloud native data center, you’ll examine:
- Clos topology
- Network disaggregation
- Network operating system choices
- Routing protocol choices
- Container networking
- Network virtualization and EVPN
- Network automation
Wybrane bestsellery
-
Ta książka będzie świetnym uzupełnieniem wiedzy o Flutterze i Darcie, sprawdzi się również jako wsparcie podczas rozwiązywania konkretnych problemów. Znalazło się tu ponad sto receptur, dzięki którym poznasz tajniki pisania efektywnego kodu, korzystania z narzędzi udostępnianych przez framework F...
Flutter i Dart. Receptury. Tworzenie chmurowych aplikacji full stack Flutter i Dart. Receptury. Tworzenie chmurowych aplikacji full stack
(41.40 zł najniższa cena z 30 dni)44.85 zł
69.00 zł(-35%) -
Czy chcesz szybko i skutecznie opanować podstawy Microsoft Azure, zrozumieć jego architekturę i możliwości? W takim razie to książka dla Ciebie! Czy chcesz nauczyć się, jak wdrażać, zarządzać i skalować aplikacje w chmurze Azure, nie tracąc przy tym cennego czasu? W takim razie to książka dla C...
Azure w 1 dzień. Microsoft Azure od podstaw po zaawansowane techniki Azure w 1 dzień. Microsoft Azure od podstaw po zaawansowane techniki
-
Unlock the power of Azure data engineering with this certification guide, elevating your skills in data processing, storage, and security with the help of practical insights, hands-on exercises, and the latest advancements.
Azure Data Engineer Associate Certification Guide. Ace the DP-203 exam with advanced data engineering skills - Second Edition Azure Data Engineer Associate Certification Guide. Ace the DP-203 exam with advanced data engineering skills - Second Edition
(121.68 zł najniższa cena z 30 dni) -
Become a Prometheus master with this guide that takes you from the fundamentals to advanced deployment in no time. Equipped with practical knowledge of Prometheus and its ecosystem, you’ll learn when, why, and how to scale it to meet your needs.
Mastering Prometheus. Gain expert tips to monitoring your infrastructure, applications, and services Mastering Prometheus. Gain expert tips to monitoring your infrastructure, applications, and services
-
This Google Cloud Digital Leader Certification guide is your gateway to the latest cloud technologies as it equips toy with industry knowledge, foundational tech insights, and real-world use cases for a strong start in your learning journey.
Google Cloud Digital Leader Certification Guide. A comprehensive study guide to Google Cloud concepts and technologies Google Cloud Digital Leader Certification Guide. A comprehensive study guide to Google Cloud concepts and technologies
-
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%)
Ebooka "Cloud Native Data Center Networking. Architecture, Protocols, and Tools" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Cloud Native Data Center Networking. Architecture, Protocols, and Tools" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Cloud Native Data Center Networking. Architecture, Protocols, and Tools" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-920-4555-7, 9781492045557
- Data wydania ebooka:
- 2019-11-22 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 6.8MB
- Rozmiar pliku Mobi:
- 18.5MB
Spis treści ebooka
- Preface
- Audience
- How This Book Is Organized
- Software Used in This Book
- Conventions Used in This Book
- Using Code Examples
- OReilly Online Learning
- How to Contact Us
- Acknowledgments
- 1. The Motivations for a New Network Architecture
- The Application-Network Shuffle
- The Network Design from the Turn of the Century
- The Charms of Bridging
- Hardware packet switching
- Proprietary enterprise network stacks
- The promise of zero configuration
- The Charms of Bridging
- Building Scalable Bridging Networks
- Broadcast storms and the impact of Spanning Tree Protocol
- The burden of flooding
- Increasing bandwidth through per-VLAN spanning tree
- Redundancy at the IP level
- Mitigating failure: In-Service Software Upgrade
- The Trouble with the Access-Aggregation-Core Network Design
- Unscalability
- Complexity
- Failure Domain
- Unpredictability
- Inflexibility
- Lack of Agility
- The Stories Not Told
- Summary
- 2. Clos: Network Topology for a New World
- Introducing the Clos Topology
- A Deeper Dive into the Clos Topology
- Use of Homogeneous Equipment
- Routing as the Fundamental Interconnect Model
- Oversubscription in a Clos Topology
- Interconnect Link Speeds
- Practical Constraints
- Fine-Grained Failure Domain
- Scaling the Clos Topology
- Comparing the Two Three-Tier Models
- Application Matchup
- Data Center Build Out
- Implications of the Clos Topology
- Rethinking Failures and Troubleshooting
- Cabling
- Simplified Inventory Management
- Network Automation
- Some Best Practices for a Clos Network
- Use of Multiple Links Between Switches
- Use of Spines as Only a Connector
- Use of Chassis as a Spine Switch
- Host Attach Models
- Summary
- References
- 3. Network Disaggregation
- What Is Network Disaggregation?
- Why Is Network Disaggregation Important?
- Controlling Costs
- Avoiding Vendor Lock-In
- Standardization of Features
- What Made Network Disaggregation Possible Now?
- Difference in Network Operations with Disaggregation
- Purchase and Support
- First Boot
- Open Network Installer Environment
- How Does ONIE Work?
- The Players in Network Disaggregation: Hardware
- Packet-Switching Silicon
- ODMs
- CPU Complex
- The Standards Bodies
- Common Myths About Network Disaggregation
- Some Best Practices for Engaging with Network Disaggregation
- Summary
- References
- 4. Network Operating System Choices
- Requirements of a Network Device
- The Rise of Software-Defined Networking and OpenFlow
- More Details About SDN and OpenFlow
- The Trouble with OpenFlow
- OVS
- The Effect of SDN and OpenFlow on Network Disaggregation
- NOS Design Models
- Location of Switch Network State
- Vendor-specific user space model
- Hybrid model
- Complete kernel model
- Location of Switch Network State
- Programming the Switching Silicon
- Switch Abstraction Interface
- Switchdev
- API
- The Reasons Behind the Different Answers
- User Interface
- Comparing the NOS Models with Cloud Native NOS Requirements
- Illustrating the Models with an Example
- Ping
- Running a different routing protocol
- Illustrating the Models with an Example
- What Else Is Left for a NOS to Do?
- Summary
- References
- 5. Routing Protocol Choices
- Routing Overview
- How Routing Table Lookups Work
- How Routes Are Chosen
- Types of Routing Table Entries
- RIB and FIB
- Routing Overview
- Routing Protocols Overview
- Distance Vector Protocols Versus Link-State Protocols
- Distance Vector Dissected
- Link-State Dissected
- Summarizing Distance Vector Versus Link-State Route Exchange
- Comparing Distance Vector and Link-State Protocols
- Scaling in Link-State and Distance Vector Protocols
- Multipathing in Distance Vector and Link-State Protocols
- No News Is Good News
- Propagation Delay in Link-State and Distance Vector Protocols
- Multiprotocol Support
- Unnumbered Interfaces
- Routing Configuration Complexity
- Who am I?
- Whom do I talk to?
- What do I tell them?
- Routing Protocols in Clos Networks
- Link-State Versus Distance Vector When Links or Nodes Fail
- BGPs behavior in a Clos network
- Link-state protocols behavior in a Clos network
- Link-State Versus Distance Vector When Links or Nodes Fail
- Route Summarization in Clos Networks
- Security and Safeguards
- Bidirectional Forwarding Detection
- Requirements of a Routing Protocol in the Data Center
- Basic Requirements
- Advanced Requirements
- Rare or Futuristic Requirements
- Choosing the Routing Protocol for Your Network
- Summary
- References
- 6. Network Virtualization
- What Is Network Virtualization?
- Uses of Network Virtualization in the Data Center
- Forcing Traffic to Take a Certain Path
- Applications That Require L2 Adjacency
- Cloud
- Separating Switch Management Network from Data Traffic
- Network Virtualization Models
- Service Abstraction: L2 or L3
- L2 virtual networks
- L3 virtual networks
- Service Abstraction: L2 or L3
- Inline Versus Overlay Virtual Networks
- Network Tunnels: The Fundamental Overlay Construct
- Benefits of Network Tunnels
- The Drawbacks of Network Tunnels
- Packet load balancing
- NIC behavior
- Maximum transmission unit
- Lack of visibility
- Network Virtualization Solutions for the Data Center
- VLAN
- VRF
- VXLAN
- Other Network Virtualization Solutions
- Practical Limits on the Number of Virtual Networks
- Size of Virtual Network ID in Packet Header
- Hardware Limitations
- Scalability of Control Plane and Software
- Deployment Model
- Control Protocols for Network Virtualization
- Relationship of Virtual and Physical Control Plane
- The Centralized Control Model
- The Protocol-Based Control Model
- Vendor Support for Network Virtualization
- Merchant Silicon
- Software
- Standards
- Illustrating VXLAN Bridging and Routing
- VXLAN Bridging Example: H1 to H5
- Multidestination frame handling in VXLAN
- VXLAN Bridging Example: H1 to H5
- VXLAN and Routing: H1 to H6
- Support for multicast routing in overlay networks
- Summarizing VXLAN Bridging and Routing
- Summary
- 7. Container Networking
- Introduction to Containers
- Namespaces
- Network Namespaces
- Virtual Ethernet Interfaces
- Container Networking: Diving In
- Single-Host Container Networking
- Bridge
- Macvlan
- Single-Host Container Networking
- Multihost Container Networking
- Overlay network
- Direct routing
- Comparing Different Container Network Solutions
- Kubernetes Networking
- Summary
- 8. Multicast Routing
- Multicast Routing: Overview
- The Uses of Multicast Routing
- Multicast Routing: Overview
- Problems to Solve in Multicast Routing
- Building a Multicast Tree
- Multicast Routing Protocol
- PIM Sparse Mode
- Rendezvous Point
- Building a Multicast Distribution Tree
- Source starts first
- Listener starts up first
- How is the first packet trapped to the CPU?
- Multiple RPs and MSDP
- PIM-SM in the Data Center
- PIM-SM and Unnumbered
- Summary
- 9. Life on the Edge of the Data Center
- The Problems
- Connectivity Models
- Why Connect to the External World?
- Bandwidth Requirements for External Connectivity
- Connecting the Clos Topology to the External World
- Routing at the Edge
- Services
- Hybrid Cloud Connectivity
- Summary
- 10. Network Automation
- What Is Network Automation?
- Who Needs Network Automation?
- Does Network Automation Mean Learning Programming?
- Why Is Network Automation Difficult?
- The Trouble with IP Addresses and Interfaces
- Scale
- Network Protocol Configuration Complexity
- Lack of Programmatic Access
- Traditional Network OS Limitations
- What Can Network Developers Do to Help Network Automation?
- Tools for Network Automation
- Automation Best Practices
- Ansible: An Overview
- Inventory
- Playbooks
- Ad Hoc Commands
- Structuring Playbooks
- A Typical Automation Journey
- Glorified File Copy
- Automate the Configuration That Was Not Device Specific
- Template the Routing and Interface Configuration
- More Templating and Roles
- Some Observations from Fellow Journeymen
- Validating the Configuration
- Single Source of Truth
- Commit/Rollback in the Age of Automation
- Vagrant and Network Testing
- Automating Verification
- Summary
- References
- 11. Network Observability
- What Is Observability?
- The Current State of Network Observability
- The Disenchantments of SNMP
- Box-by-Box Approach to Network Observability
- Why Is Observability Difficult with Networking?
- Observability in Data Center Networks: Special Characteristics
- Decomposing Observability
- The Mechanics of Telemetry
- What Do We Gather?
- How Do We Gather?
- When Do We Gather?
- Storing the Data
- The Uses for Multiple Data Sources
- Of Alerts and Dashboards
- Summary
- References
- 12. Rethinking Network Design
- Standard, Simple Building Blocks
- Network Disaggregation
- Standard, Simple Building Blocks
- Failure: Missing the Forest for the Trees
- L2 Failure Model Versus L3 Failure Model
- Simple Versus Complex Failures
- Handling Upgrades
- The Pursuit of Less
- How the Right Architecture Helps
- Feature Set Essentialism
- Constraints on the Cloud Native Network Design Principles
- Summary
- 13. Deploying OSPF
- Why OSPF?
- The Problems to Be Addressed
- Determining Link-State Flooding Domains
- Numbered Versus Unnumbered OSPF
- Support for IPv6
- Support for VRFs
- Requirements for Running OSPF on Servers
- OSPF Route Types
- The Messiness of Stubbiness
- OSPF Timers
- Dissecting an OSPF Configuration
- Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv4
- Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv6
- Configuration with Three-Tier Clos Running OSPF
- Configuration with Servers Running OSPF: IPv4
- Summarizing Routes in OSPF
- OSPF and Upgrades
- Best Practices
- Summary
- 14. BGP in the Data Center
- Basic BGP Concepts
- BGP Protocol Overview
- BGP Peering
- BGP State Machine
- Autonomous System Number
- BGP Capabilities
- BGP Attributes, Communities, Extended Communities
- BGP Best-Path Computation
- Support for Multiple Protocols
- BGP Messages
- Basic BGP Concepts
- Adapting BGP to the Data Center
- eBGP Versus iBGP
- eBGP: Flying Solo
- Private ASNs
- BGPs ASN Numbering Scheme
- Multipath Selection
- Fixing BGPs Convergence Time
- Summary
- 15. Deploying BGP
- Core BGP Configuration Concepts
- Traditional Configuration for a Two-Tier Clos Topology: IPv4
- Peer Group
- Routing Policy
- Route Maps: Implementation of Routing Policy
- Classifiers in route maps
- Writing secure route maps
- Route maps in BGP
- Effect of route maps on BGP processing
- Route Maps: Implementation of Routing Policy
- Providing Sane Defaults for the Data Center
- BGP Unnumbered: Eliminating Pesky Interface IP Addresses
- A remote-as by Any Name
- How Unnumbered Interfaces Work with BGP
- IPv6 link-local address
- IPv6 router advertisement
- RFC 5549
- Packet forwarding with RFC 5549
- FRR and RFC 5549
- Interoperability
- Final Observations on BGP Configuration in FRR
- Unnumbered BGP Support in Routing Stacks
- Summary
- Configuring IPv6
- BGP and VRFs
- Peering with BGP Speakers on the Host
- BGP Dynamic Neighbors
- BGP and Upgrades
- AS_PATH Prepend
- GRACEFUL_SHUTDOWN Community
- Max-MED
- Best Practices
- Summary
- 16. EVPN in the Data Center
- Why Is EVPN Popular?
- The Problems a Network Virtualization Control Plane Must Address
- Where Does a VTEP Reside?
- One Protocol to Rule Them All, Or?
- iBGP Characteristics
- Separate Underlay and Overlay Protocols
- eBGP Only
- BGP Constructs to Support Virtual Network Routes
- Route Distinguisher
- Route Target
- FRRs use of RD and RT
- EVPN Route Types
- Communicating Choice of BUM Handling
- EVPN and Bridging
- EVPN Bridging with Ingress Replication
- EVPN Bridging with Routed Multicast Underlay
- Handling MAC Moves
- Support for Dual-Attached Hosts
- Host-Switch Interconnect Model
- VXLAN Model for Dual-Attached Hosts
- Switch Peering Options
- MLAG
- EVPN support for multihoming
- Handling Link Failures
- Avoiding Duplicate Multidestination Frames
- ARP/ND Suppression
- EVPN and Routing
- Centralized Versus Distributed Routing
- Symmetric Versus Asymmetric Routing
- Route Advertisements
- The Use of VRFs
- Deploying EVPN in Large Networks
- Summary
- 17. Deploying Network Virtualization
- The Configuration Scenarios
- Device-Local Configuration
- Single eBGP Session
- OSPF Underlay, iBGP Overlay
- allowas-in Versus Separate ASN
- PIM/MSDP Configuration
- EVPN on the Host
- Best Practices
- Summary
- 18. Validating Network Configuration
- Validating the Network State
- System Validation
- Cabling Validation
- Using Ansible to Validate Cabling
- Interface Configuration Validation
- Automating Interface Configuration Validation
- Routing Configuration Validation
- Validating an OSPF Configuration
- Determining the originator of the default route
- Automating OSPF validation
- Validating an OSPF Configuration
- Validating a BGP Configuration
- Determining the originator of the default route
- Stripping the Private ASNs
- Automating BGP validation
- Validating Network Virtualization
- Automating EVPN validation
- Applications Network Validation
- Data-Plane Validation
- Summary
- 19. Coda
- Glossary
- Index
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Cloud Native Data Center Networking. Architecture, Protocols, and Tools Dinesh G. Dutt (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.