Apstra
Apstra
  • 109
  • 155 175
AI/ML DC Design - Part 2
The 0x2 Nerds continue with Petr Lapukov for part 2 of their discussion on AI/ML data center design.
zhlédnutí: 271

Video

AI/ML Data Center Design - Part 1AI/ML Data Center Design - Part 1
AI/ML Data Center Design - Part 1
zhlédnutí 1,2KPřed 29 dny
Petr Lapukhov joins Jeff Doyle and Jeff Tantsura to discuss the finer points of AI/ML Data Center design.
BGP Over QUICBGP Over QUIC
BGP Over QUIC
zhlédnutí 301Před měsícem
The 0x2 Nerds continue the discussion on QUIC and using it for BGP.
An Introduction to QUICAn Introduction to QUIC
An Introduction to QUIC
zhlédnutí 333Před 2 měsíci
Jeff and Jeff are back for more protocol talk with this episode focusing on QUIC.
Deep Space IPDeep Space IP
Deep Space IP
zhlédnutí 385Před 3 měsíci
Marc Blanchet joins the Jeffs to discuss the next frontier of routing.
Exploring Apstra FlowExploring Apstra Flow
Exploring Apstra Flow
zhlédnutí 230Před 4 měsíci
Jeff Doyle is joined by special guest host, Adam Jarvis. Together, they will discuss the Apstra Flow capability with product experts, Kyle Baxter and Adam Grochowski.
A Routing Architecture for Satellites w/Tony LiA Routing Architecture for Satellites w/Tony Li
A Routing Architecture for Satellites w/Tony Li
zhlédnutí 864Před 4 měsíci
Tony Li joins the 0x2 Nerds to discuss routing in satellite networks.
BGP Security: ROSE-T (ROuting SEcurity Tool)-Mariano Scazzariello, Antonio Prado,Tommaso CaiazziBGP Security: ROSE-T (ROuting SEcurity Tool)-Mariano Scazzariello, Antonio Prado,Tommaso Caiazzi
BGP Security: ROSE-T (ROuting SEcurity Tool)-Mariano Scazzariello, Antonio Prado,Tommaso Caiazzi
zhlédnutí 369Před 6 měsíci
Jeff and Jeff are joined by Mariano Scazzariello, Antonio Prado, and Tommaso Caiazzi to discuss ROSE-T.
Fuzzing BGP: Uncovering Vendor Vulnerabilities-Ben Cartwright-CoxFuzzing BGP: Uncovering Vendor Vulnerabilities-Ben Cartwright-Cox
Fuzzing BGP: Uncovering Vendor Vulnerabilities-Ben Cartwright-Cox
zhlédnutí 350Před 7 měsíci
Ben Cartwright-Cox and the 0x2Nerds talk about what it is like to find and report BGP vulnerabilities.
TreeDN: Content Distribution without the Multicast Headaches-Lenny GuilianoTreeDN: Content Distribution without the Multicast Headaches-Lenny Guiliano
TreeDN: Content Distribution without the Multicast Headaches-Lenny Guiliano
zhlédnutí 540Před 8 měsíci
Lenny Guiliano joins Jeff and Jeff to show how Content Distribution can be less painful with the use of TreeDN.
Securing the Future - Katherine McNamaraSecuring the Future - Katherine McNamara
Securing the Future - Katherine McNamara
zhlédnutí 172Před 8 měsíci
The Nerds are joined by Katherine McNamara for a discussion on cybersecurity, life and the journey forward.
Everything You Wanted to Know About Technical Publication-Russ WhiteEverything You Wanted to Know About Technical Publication-Russ White
Everything You Wanted to Know About Technical Publication-Russ White
zhlédnutí 280Před 8 měsíci
Industry icons discuss their experiences with writing and publishing technical materials.
Revisiting BGP in the Data Center - Part 2Revisiting BGP in the Data Center - Part 2
Revisiting BGP in the Data Center - Part 2
zhlédnutí 453Před 9 měsíci
The 0x2 Nerds share the details of BGP in the Data Center.
Multicast History-Farinacci.Multicast History-Farinacci.
Multicast History-Farinacci.
zhlédnutí 697Před 10 měsíci
Join the Jeffs for this discussion of Multicast History with their guest, Dino Farinacci.
Revisiting BGP Data Center Design-Part 1Revisiting BGP Data Center Design-Part 1
Revisiting BGP Data Center Design-Part 1
zhlédnutí 2,7KPřed 10 měsíci
Jeff Doyle and Jeff Tantsura revisit BGP design for the Data Center.

Komentáře

  • @ChrisWhyte24
    @ChrisWhyte24 Před 23 dny

    Really enjoyed this one! Greatly appreciate the insight.

  • @sinade1
    @sinade1 Před měsícem

    Nice to see Petr Lapukhov again.

  • @abdullahbinmanzoor9692
    @abdullahbinmanzoor9692 Před 2 měsíci

    For the love of God, I can't understand a single word of Jeff T. 🙃

  • @hassanshah7929
    @hassanshah7929 Před 2 měsíci

    Much needed video podcast.

  • @manojj1544
    @manojj1544 Před 3 měsíci

    Both jeff’s respect ..I just respect/luv/adore U almost same as (Ken Thompson).Gr8 guys ignited countless minds and kept our stomachs fed/happy as well.

  • @Douglas_Gillette
    @Douglas_Gillette Před 3 měsíci

    Great conversation!

  • @dagobertoantonioalzamorach5594

    Great episode as always!

  • @arulgobinathemmanuel5417
    @arulgobinathemmanuel5417 Před 7 měsíci

    In retrospect everyone can judge ❤

  • @anujkant1
    @anujkant1 Před 7 měsíci

    Great session. Full of knowledge and practical experience. Just one request, could you please add all the whitepapers/docs you bring up in the notes?

  • @joespt966
    @joespt966 Před 9 měsíci

    What a nice session! Thx. I am a big fan of this 2 nerd. Quick question on Free Valley routing. In case of IGP for underlay with no specific policy, the traffic via another Leaf to Exit point. It probably is useful there is NO traffic high-demanding. Could you give me another point of view for it?

  • @jbparrish17
    @jbparrish17 Před 9 měsíci

    Great talk. This has been one of my favorite shows you guys have hosted. Would love to see a future show on LISP with Dino and on BIER

  • @daryllawrence9398
    @daryllawrence9398 Před rokem

    Promo-SM

  • @eddiechan4840
    @eddiechan4840 Před rokem

    This echo a lot what i see in my organization. We try to push orchestration to different teams but they worry about supporting and not having the automation knowledge to maintain it.

  • @durgaprasadm9972
    @durgaprasadm9972 Před rokem

    Where can i get the slides presented here

  • @ludakris29
    @ludakris29 Před rokem

    Thanks for the great content! You both are Legends!

  • @sebschrader
    @sebschrader Před rokem

    Very informative as always

  • @MXSPORTRU
    @MXSPORTRU Před rokem

    Sorry to say that, but this session is very difficult to understand. The speaker is talking about details, options and differences between them without any introduction and visualization. Before he question what is a dragonfly topology was vaguely explained, about 15 minutes of discussion preceded it that was impossible to understand. It would be better to start from topologies that appeared around 30-35 minutes from the beginning.

  • @shankarvaranasy8404

    Have you looked at vPC Fabric Peering functionality on NX-OS? It doesn't need peer-link and leverages EVPN fabric for that functionality of peer-link

    • @jefftantsura9677
      @jefftantsura9677 Před 9 měsíci

      it is proprietary to NX-OS, which defeats the purpose of using an open standard (EVPN)

  • @mazenkhaddam5586
    @mazenkhaddam5586 Před rokem

    There is an emerging nerd (Mel) ! Timely and relevant emerging technology ... time well spent. thank you all.

  • @halfsterker
    @halfsterker Před rokem

    Looking forward to the continuation of this conversation! The intersection of ML and Networking is a fascinating topic.

  • @mazenkhaddam5586
    @mazenkhaddam5586 Před rokem

    Love that shirt JeffT …

  • @mmm763
    @mmm763 Před rokem

    why we need mac-only route-type 2 , if we already have all information in mac-ip route-type 2?

  • @SalmanSadiq-iy4fv
    @SalmanSadiq-iy4fv Před rokem

    I would request to upload videos with better resolution than 720p. Specially the slides are very hard to read

  • @RishiRap
    @RishiRap Před rokem

    JT seems to be a knowledgeable guy but his THICK ACCENT just kills it. It is so hard to understand coupled with his inability to show route type slides in bigger font just makes me extremely disappointed.

  • @yummyummy8662003
    @yummyummy8662003 Před rokem

    Such an amazing series, just found it and loved all the videos. Jeff Doyle has unique ablility to put things in simple words and give historical perspective wherever possible to clear things out. Jeff Tantsura clear and concise and to the point!!

  • @errickbaroquin7464
    @errickbaroquin7464 Před rokem

    This episode was the least informative of the series. Part 1 and 3 were pretty good in technical detail, not to mention the more structured format supported with slides. I do not doubt the guest's knowledge and expertise at all. I think he was either not able to articulate those well and/or too nervous about giving away any confidential information, which resulted in him providing almost no useful information at all. I understand the nature of proprietary information, but it should be possible to explain certain things without giving away actual implementation details. Nobody was asking for block diagrams for algorithms or code samples. As Jeff T mentioned in the beginning of Part 1, these interview series were inspired by the late discussions on the nanog mailing list and aimed to provide more insight, as well as shed some light on some of the items under question there. Those transactions were much more detailed and technical at a deeper level. You kept saying "we are all nerds here, please give us more details" and I barely saw that happening. I am sorry to say I learned almost nothing new from this and still have those questions unanswered. Anyhow, I appreciate all your time and effort to put this together, and always great to see you 0x2 Jeffs.

  • @andyyu8755
    @andyyu8755 Před rokem

    very nice

  • @timstevenson121
    @timstevenson121 Před rokem

    Clearly a real expert in the field, thanks for the very informative session.

  • @joespt966
    @joespt966 Před rokem

    proud of you as Junivator and X-Junivator. Thx a lot.

  • @hetvankarsa
    @hetvankarsa Před rokem

    Thank you Sharada, Jeff & Jeff.

  • @MS-um5ni
    @MS-um5ni Před 2 lety

    Great podcast, keep it up guy's 👍

  • @biswajitsadhu3607
    @biswajitsadhu3607 Před 2 lety

    Hi Jeff^2, Could you please create a session on the flooding list creation with the assistance of the dataplane ?

  • @20dorko
    @20dorko Před 2 lety

    Thanks a lot Peter and Jeff for this great video. The concept of using BGP communities to prevent BGP path hunting is really interesting, but I am not 100% sure how this works. Let's say the FSW1 switch has 2 paths for an IP address behind the RSW1 - 1 primary (with the "rack_prefix" community) and 1 backup (with "completed_backup_path" community). How is the path hunting prevented if a prefix behind the RSW1 became unreachable? In my understanding, RSW1 would send BGP withdraw to FSW1 and FSW2. Both routers will start to converge, let's say FSW1 converges first, he can see the backup path via RSW2 and start to use this path and in the meantime it will send explicit withdraw to RSW2. RSW2 will now send the traffic via FSW2 (if FSW2 is not fully converged and didn't send withdraw to RSW2). Once all RSWx / FSWx are not fully converged, traffic is dropped. Probably I am missing something, could someone please explain? Thanks a lot !

  • @lucianobarros2303
    @lucianobarros2303 Před 2 lety

    Great talk, enjoyed listening to you guys!

  • @mohammedelhassanhabiballa5700

    Really a very good discussion. I wish if there will me more details on specific topics like MPLS implementations on scaling DC vs ECMP routing. What to expect in the near future? Are they any large DCs which currently in the path to embrace MPLS in DC?

  • @mohammedelhassanhabiballa5700

    Thank you very much. I really enjoyed this webinar, it opened my eyes beyond seeing the small picture of scaling DC in narrow environments and sees how big whales are trying to scale really giant DCs.

  • @monstertraining1528
    @monstertraining1528 Před 2 lety

    Without a doubt that was one of the greatest session ever!

  • @monstertraining1528
    @monstertraining1528 Před 2 lety

    Brilliant! So who is the exit point ? is it the responsibility of LEAF (Border Leaf like cisco) or TOF level ?

  • @aminmoghim8571
    @aminmoghim8571 Před 2 lety

    That was a great explanation thanks

  • @halfsterker
    @halfsterker Před 2 lety

    I'm a late comer to the podcast, but I am enjoying these conversations so much. Thank you, gents.

  • @wimhenderickx919
    @wimhenderickx919 Před 2 lety

    Q

  • @floriancokl3142
    @floriancokl3142 Před 2 lety

    oh yes - the ugly stuff - allow own-as in 🤢

  • @floriancokl3142
    @floriancokl3142 Před 2 lety

    Yes - you can't know the whole system -> document as good as possible - which ususally mostly never happens

  • @floriancokl3142
    @floriancokl3142 Před 2 lety

    Has automation made human error more efficient - YES - breaking stuff with skill - YES - absoautomationlutely 🤣

  • @floriancokl3142
    @floriancokl3142 Před 2 lety

    have we done ... human factor ... I don't think so - at least from what I have experienced in the last 20 years

  • @OptnetEu-channel
    @OptnetEu-channel Před 2 lety

    Hypothetical question around 13:14 into video - how about getting the ability to actually know everything in real-time about what is going on in the complex system? (well at least on a 1 second scale which is humanly possible)

  • @navisasaddadi4375
    @navisasaddadi4375 Před 2 lety

    Gosh I missed the show ! :(

  • @monstertraining1528
    @monstertraining1528 Před 2 lety

    Great Post many thanks for sharing.

  • @gus_leon
    @gus_leon Před 2 lety

    Great interview! Thank you for sharing this enlightening session with us.

  • @skgmlsvi
    @skgmlsvi Před 3 lety

    Excellent information. Thanks.