Monday, February 26, 2024

Where are the rants?

I need to apologize.  I started this as a place to rant.  It hasn't turned out that way.

At first, I wasn't happy about the state of our government, and I wanted to proclaim ideas that I thought would help.  I didn't think they'd get anywhere, but I wanted to make sure they were published.  I'm still not happy about all aspects of our government, but at least I can point to some of my early posts and say, "See?  I tried to give you some options!"

Since then, I've published things that stuck me as interesting or fun.

But I think I need to rant more...

Friday, November 10, 2023

Edge Computing (or something)

 A little over a month ago (October 4/5, 2023 if you're reading this in the far future), I was invited to be a delegate at Gestalt IT's second Edge Field Day (#EFD2).  I'd participated in a couple of earlier Field Days, so I knew the format:   Vendors would present information to a group of technical folks and discussion would ensue.

At the moment, the core of my consulting work lies in helping a WISP with networking issues, and giving technical advice to the State of New Mexico's Office of Broadband Expansion and Access.  Also, I run the ABQIX, an Internet Exchange in multiple data centers in Albuquerque, New Mexico.

I don't really design/implement things that I think of as "Edge Computing," so I wasn't really sure what value I would add.  But I knew I'd learn a lot, and am old enough that I'm willing to ask questions that others might feel are obvious without getting embarrassed.  Also, I figured I'd be able to add comic relief if nothing else to the fray.

On site, we had a roundtable discussion with all of the delegates to talk about Edge Computing.  In the end, we talked about a number of issues important to IT workloads, security, and many other points.  But I was still fuzzy on Edge Computing.

Next up was a presentation from Solidigm.  Their presentation showcased their SSD products.  They've got everything:  speed, reliability, physical form, rugged packaging, storage density.  At the end of their presentation, I was convinced that if I was an OEM, I'd be considering the use of their gear.  But I'm not sure I knew a lot more about Edge Computing.

We then heard from StorMagic.  They showed us their SvSAN product which was quite cool.  Running on top of hypervisors, you can scale the underlying hardware to create the performance level you need.  They also have some cool tools for managing these storage devices as you scale -- in fact, they let us see their Edge Control tool before releasing info publically.  I was starting to wonder if Edge Computing was really about storage...

Edge Field Day #2 ended with an introduction to NodeWeaver.  I know I didn't grok this product, but it spoke to me.  A slim hypervisor with a slick install system that lets you build (yet another) hyperconverged platform.  A compute and storage swiss-army knife that runs on virtually any x86 hardware, so you can mix/match to meet your performance needs -- just want you need for Edge Computing.  Right?

I went home from Edge Field Day with a heavy heart.  I seriously wondering if I'd been worth anyone's time.  We had good talks on technology with great people, but I still wasn't sure what Edge Computing was.

On October 20, David Linthicum published an article titled "Whatever Happened to Edge Computing?"  The title made me wonder if I could stop worrying about Edge Computing because I'd already missed the boat.  (Actually my take on David's thoughts indicate that Edge Computing is alive and well -- but the wealth of possible applications make it difficult to define meaningful standards.)

After the last few weeks, I've decided that I'll define Edge Computing for myself until someone can get me a better definition.  To wit:

Edge Computing is a optimization strategy that involves distributed computing.

Or something.

At least it isn't the typical consultant weasel words: "It depends."


Thanks go out to Gestalt IT, Solidigm, StorMagic, and NodeWeaver to making things rattle around my head for a couple of weeks.  I didn't realize how much this was bothering me until this article started to flow.  My conclusion is overly broad -- but so the the term I tried to define.

David Linthicum gets credit for writing an article that helped me gel my thoughts.

Tuesday, January 17, 2023

An Old Sysadmin Tries Out ChatGPT

(Editorial note: Pretend this post is a Star Trek episode with folks spouting techno-babble, use the words as place holders, and feel the flow of the story...)

A while back, I built some anycasting DNS resolvers using bind on a loopback, and FRR talking OSPF to a router.  I finally decided I should hammer together a script to turn off FRR if there was something wrong with the bind process so the servers would pull themselves out of service.

Why not try this new ChatGPT thingee?

I won't bore you with the code that was created, but you'll see my thoughts, and the input I gave to ChatGPT as I worked through this problem until... the end?

Wednesday, September 29, 2021

The Ramp Room

If you've ever spent time doing telecommunication work in Albuquerque, NM, the odds are you've had to work at 505 Marquette NW.  If you're local, you just talk about "505" and everyone knows what you mean.

505 was built during 1965 and 1966, and isn't a bad looking place, but it is showing it's age. Wikipedia quotes a July 10, 1966 Albuquerque Journal article: "It has twelve floors of office space above a wider six-story base which incorporates a parking garage on floors 2–6."  The Wikipedia article has this  picture:

Now that Albuquerque has become a center for shooting TV and Movie productions, you will sometimes see this building in the background.  Perhaps my favorite is from the Netflix series Daybreak where the building gets an FX makeover to fit the apocalyptic theme of the show:

I can't find a picture on the interwebs, so you have to settle for the one I took while watching Daybreak on Netflix.  Note: Palm trees, background hills, and building damage are all simulated.  I do, however, get my home Internet connectivity from the antenna on the roof.

Did you note that the parking garage was on floors two through six?  That means you have to drive up a ramp to get to the parking levels.  This architectural need has lead to one of  Albuqueruque's telecom black holes known as the Ramp Room.

To enter the Ramp Room, you need to get the the garage ramp, where air conditioning condensers congregate to release the heat of the inner building.  In between the first and second floors you'll find a non-descript door:

Upon opening the door, you'll find that it immediately blocks your way.  It feels like you aren't really welcome, but you move forward anyway...

...And end up in a narrow hallway.

Behind the door at the end of the hall way you immediately see a rack of batteries that were put in twenty years ago and never maintained. 

One step into the room and you can see the building punch downs -- the metallic path over which the business conversations from fifty years ago used to pulse.  Yet there is also a veneer of modern fiber optic communications that reside here as well.  In fact, they are the mainstay of the Ramp Room.

In every city, there is a nexus of communication that isn't ensconced in a pristine data center.  A place where various players gather.  But not because they really want to do so.  Rather, their customers demand they work together.

The path of least resistance nets small, out-of-the-way rooms where fiber optics from multiple carriers co-exist.  A place that isn't official, but becomes important.

Some players have been around for a long time.   They've been sold, bought others, been forced to divest assets, and any number of other acquisition issues.  Sometimes you forget what they're called now, and just refer to them by their "old" names.  After a while it you stop worrying about what to call them.

They have, and will persist.

Other are younger.  More nimble.  Willing to do things out of the ordinary, and force the old guard to play their way.

For a time.

They will become the old guard for a new generation.

Years roll on, and old gear is left in rooms like this.  Forgotten.  Useless technology from the past interwoven with the modern.

Old gear isn't ever removed.  It sits and drinks power from the building.

No one owns it, so no one cleans it.

Everyone is afraid to shut anything off.  Few know how to tell if something is still in use or not.

Within this building are a multitude of other places to interconnect -- but none have the diversity of the Ramp Room.

Friday, January 22, 2021

ModemCast -- a podcast

I tend to babble a lot.  Sometimes I find people that babble about some of the same things.  My friend Nick has talked me into helping him babble as well.  His take on things is here:

You might even enjoy some of our mutual babbling:

If you find it to your liking, do not blame me.

Sunday, May 26, 2019

Joe's Internet -- an IGP adventure

Before we can setup inter-network links, Joe's Internet (J-Inet)  need to get the internal network in order.  We'll implement an Internal Gateway Protocol (IGP) so all of our infrastructure will be able communicate with other parts of our network.

The IGP's job is to advertise what it knows to all of it's neighbors.  If there are multiple paths to a destination, it will pick the best of those available, and pick alternates in case of a path failure.  The IGP ensures communication resiliency as long as there are redundant paths.

Quick network overview

We're going to make sure each router has a single IP address on a "loopback" interface.  Loopbacks give you a management interface on the router that is not dependant upon any given interconnection link's state.  As long as the IGP is running properly, every router will know how to get to every other router via their loopback regardless of what path is in use.

Our infrastructure addressing is going to include the networks that interconnect the routers, and the loopback addresses on each router:

Joe's Internet -- IGP Map
J-Inet's IGP Map.  Click on it for more detail.

IGP by psuedo-code

No matter the platform, we have a few things we need to do to ensure our goal.  Those steps come down to:
  1. setup loopback interface address
  2. set global IGP parameters
  3. get IGP to adopt the loopback
  4. for each infrastructure link (one or more)
    1. setup interface address
    2. get IGP to adopt the interface
Pretty simple, really.  We're going to use OSPF in this example.  I'll assume a passing familiarity with OSPF, and just point out that we will only be using Area 0.  There's no reason to do things in a fashion more complicated than a single area.  (If that doesn't make sense, find some background material on OSPF, and come back.)

Also, we're going to pretend these routers run something that looks a lot like Cisco IOS from a syntax standpoint. Take a look at a config for routers R1 and R2:

!  Router R1
! global IGP parameters
router ospf 1
! setup loopback, and add to IGP
interface Loopback20
 ip address
 ip ospf 1 area 0
! setup infrastructure link, and add to IGP
interface ether 1
  description Link to R2
  ip address
  ip ospf 1 area 0
! setup infrastructure link, and add to IGP
interface ether 2
  description Link to R3
  ip address
  ip ospf 1 area 0

! Router R2
! global IGP parameters
router ospf 1
! setup loopback, and add to IGP
interface Loopback20
 ip address
 ip ospf 1 area 0
! setup infrastructure link, and add to IGP
interface ether 1
  description Link to R1
  ip address
  ip ospf 1 area 0
! setup infrastructure link, and add to IGP
interface ether 2
  description Link to R3
  ip address
  ip ospf 1 area 0
! setup infrastructure link, and add to IGP
interface ether 3
  description Link to R3
  ip address
  ip ospf 1 area 0

I will leave the construction of configs for routers R3 and R4 to our readers.

While your setting things up on a Cisco router, you will find the following commands useful to help you track your progress:
  • show ip ospf neighbor
  • show ip route
  • show ip route ospf

Adding Complications to the IGP setup

Most of the time, I  tell people to stick to the simplest setup they can.  The configs above should let you build a simple IGP to keep your network running.  However, there are some things you may encounter that require a bit more thought into your setup and will force your to consult your platform's documentation.  A couple of the more common issues and a method to use them are:
  • password / encryption / message-digest for IGP on links
  • link type (point-to-point vs. point-to-multipoint, etc.)
  • changing link metrics
Consult your platform documentation, but to implement the above features, we could have added something like the following to our configs:
router ospf 1
   area 0 authentication message-digest
   auto-cost reference-bandwidth 10000
interface ether-whatever
   ip ospf network point-to-point
   ip ospf message-digest-key 1 md5 <some key/password>


All of our routers now know how to reach each other because the IGP keeps them all informed.  If we add new routers, we simply need to add them into the IGP, and they will be added to the reachability information that all of the routers share.

Our eventual goal is to ensure that the customers share this type of reachability.  To do that, we will use BGP to leverage the IGP information for anything else we need to reach on this network.  That will be the subject of the next episode of J-Inet...

Sunday, April 14, 2019

Joe's Internet -- Addressing and Interconnection

In the last installment, Routing Policy -- interconnecting with other networks, we talked about the business relationships Joe's Internet (J-Inet) might have with other networks.  Now we'll look a little closer at the technical side of how those relationships are enacted on the network itself.

Before we get too much closer to J-Inet, I want to point out that I'm going to be using a single network model for continuity between posts.  I've worked out IP addressing (v4 & v6), consistent routing policies, and a topology that should suffice for many posts. I've got several posts lined up that should help show at least one path to building a scalable network.

The Interconnects

J-Inet has two transit providers (Transit 1 & 2), three customers (Customer A, B, & C), and a single Peer (Peer 1).  Customer C is a bit of stretch for this conversation.  They aren't an autonomous system, but we'll look at them anyway, as it may lead some readers to revelations they might not have otherwise.

J-Inet has four Points of Presence (POPs) where equipment is housed.  Most customers of J-Inet are like Customer C.  They simply buy transit from J-Inet.  These customers actually make up the bulk of J-Inet's revenue.  But they're pretty boring from an network perspective.

The Network, Prefixes, and Policy

The network itself is pretty simple, and looks like this:
Joe's Internet -- Simple Map
Over view J-Inet's network and interconnects.  Click on it for more detail

J-Inet has two blocks of address space it uses internally, that we will advertise to anyone that interconnects.  Those prefixes are: and

Customer A uses  That block comes from J-Inet's prefixes, but they are allowed to use it as long as they are a customer of J-Inet.  J-Inet also allows Customer A to advertise this prefix across any interconnects they may have with other networks.  J-Inet will pass all of the prefixes it knows about to Customer A.

Customer B uses, which was allocated to them from their Regional Internet Registry.  They advertise this prefix to us, and any other interconnects they have according to their own routing policy. J-Inet will pass advertise all routes to Customer B.

Customer C uses  They don't have any other interconnects, so they aren't really an autonomous system (AS).  They're in this mix as a kind of anti-example -- a customer that really only acts as an extension of J-Inet's network and routing policy.  Neither Customer C nor J-Inet will advertise prefixes to one another.

Peer 1 is another ISP that happens to have equipment in the same building that houses POP 1.  J-Inet and the Peer 1 decided that they should interconnect directly.  They will be announcing to J-Inet.  J-Inet will pass internal and customer prefixes to Peer 1, but will not send any routes learned from transit providers.

Transit 1 and Transit 2 are networks that have customers and other interconnects.  Since they are transit providers, they have promised to get traffic to any destination. However, they bouth announce prefixes to us, J-Inet can make an informed decision about which network should be used for any given prefix.  J-Inet will announce internal routes and customer routes to both transit providers.  J-Inet will not advertise routes learned from Peer1.  Lastly, J-Inet will not advertise any transit routes back to either transit provider.  (i.e. J-Inet will not allow transit to the these providers.)

At this point, we have a pretty good idea of J-Inet's network topology and how it interconnects with customers, peers and transit providers.  In our next installment, we'll look at some of the internal housekeeping of J-Inet's network is put together, and later use this internal configuration to make our interconnects simpler.