Minikube Installation on Linux system Let’s find out how to put in the most recent Minikube release on Ubuntu linux system 20.04 LTS with VirtualBox v6.1 specifically. NOTE: For different Linux system OS distributions or releases, VirtualBox and Minikube versions, the installation steps could vary! Check the Minikube installation! Verify the virtualization support on your… Continue reading Minikube Installation
What is multi access edge computing?
What is multi access edge computing? Multi-Access Edge Computing (MEC) in 5G moves the processing of traffic and services from a unified cloud located at central location to the edge of the network and nearer to the client. Rather than sending all information to a cloud for handling, the data’s are processed, analyzed and stored… Continue reading What is multi access edge computing?
Intend based analytics (IBA)
Intend based analytics A proper IBN system uses intent-based analytics (IBA) to stay aware of network changes in real time, continually ensuring that your services remain in compliance with your intent. That’s intent assurance. Change management: IBN system shall provide change management. There are two types of changes normally we observed in the network. Uncontrolled… Continue reading Intend based analytics (IBA)
Intend Based Networking Close Loop Automation life cycle
Intend Based Networking Close Loop Automation life cycle An intend based automation life cycle is depicted as below. IBN workflows defined as below: Define the intent. Translate intent into a series of prescriptive network changes. Verify that the changes are valid before deploying them. Deploy the verified changes. Monitor network state to ensure continuous compliance… Continue reading Intend Based Networking Close Loop Automation life cycle
Intend based networking
What is intend Based Networking (IBN)? Intend based networking is networking software that is used to manage end to end network life cycle. End to end network life cycle management includes plan, design and implement/operate. In layman term, we can say we are putting our network in the auto pilot mode with the help of… Continue reading Intend based networking
network slicing in 5g
What is network slicing in 5G? 5G network slicing is nothing but logically dividing a physical network into multiple virtual networks. Each virtual network will cover specific use case requirements. Here network slice will isolated from each other in control and user plan. Each user will be experienced dedicated services as like they are using… Continue reading network slicing in 5g
What is docker?
What is Docker? Docker can be defined as below: Docker is an image format. Docker is a container run time library which manages container life cycle. A command line tool for packaging and running containers. It provides API for container management. Container image Container image is a single binary file that has a unique ID… Continue reading What is docker?
What is Kubernetes architecture?
What is Kubernates Architecture? What is Kubernates Architecture? Each thing managed by Kubernetes is represent by an object model. Object model is having two elements. Kubernetes object is a persistent entity that defines the state of something running in a cluster. Object spec: We have to provide an object spec for each object that we… Continue reading What is Kubernetes architecture?
Container orchestration
Why would you need container orchestration? Now running software application in a container is giving so many benefits that we have seen already. It is very beneficial for operations team as well. They also don’t have to maintain different operating systems and different packages. But what about very large scale container deployment. Container management, deployment… Continue reading Container orchestration
PCI-Passthrough | SR-IOV | DPDK
Packet Processing in Linux Kernel When packets are arrived at NIC, it sends an interrupt request (IRQ) to the CPU. The CPU then stop working task (like computing) it was performing to receive the packets. Interruptions mean reducing the CPU’s ability to perform its primary computational tasks. In case of VM, this problem is increased… Continue reading PCI-Passthrough | SR-IOV | DPDK