What’s NEW in NETWORK PROGRAMMABILITY Section | CCIE Evolving Technologies V1.1 Blueprint
In this article, you will learn about changes that are coming into Evolving Technologies V1.1.
If you recall, Cisco published an update to Evolving Technologies section dubbed as V1.1 which will go into effect starting Aug 30 2018. For the uninitiated, Evolving Technologies consists of three sub-sections or topics, i.e.
- Cloud (cloud deployment and service models etc.)
- Network Programmability (SDN/NFV, Infrastructure as Code which includes CICD and DevOps tools etc.). BTW, you can also refer to Full Stack Networker, if you prefer to deep dive into Infrastructure as Code.
- Internet of Things (or IoT)
Now, we’ve already covered Cloud topic, so let’s get right into network programmability.
Unfortunately, Evolving Technologies V1.0 did nothing more than hand waving for network programmability section. Now, that changes with V1.1 as Cisco seemed to have made it much more specific and pretty much all about the real network programmability and not just SDN.
Topics Added to V1.1
- data modeling languages (YANG etc.)
- data encoding formats (JSON which is pronounced as Jay-sun and XML)
- configuration management protocols (NETCONF, RESTCONF, REST, gRPC)
- configuration management tools (Git, SVN etc.)
- policy-driven configuration (Cisco APIC etc.)
Topics Removed in V1.1
- Service function chaining
- Performance, availability, and scaling considerations (around virtualization and automation)
IMO, Cisco deserves some kudos for spelling out network programmability by being more specific, i.e. configuration management and DevOps and Software Configuration Management (or SCM) tools such as Git and SVN. I wish they had also added CICD and DevOps pipeline as well to the list, but oh well, perhaps we shall see that in V1.2.
Now, let me breakdown each of the newly added topics.
SNMP has been around for over 30 years. Over this time, it has been the de-facto way to monitor networks. It worked great when networks were small and polling a device every 15-30 minutes met operational requirements. SNMP MIBs are a type of data model defining a collection of information that is organized in a hierarchical format that is used along with SNMP. Anyhow, SNMP did work great for monitoring devices every few minutes, but it never caught on for configuration management purposes due to custom or proprietary MIBs.
In addition to SNMP, there has always been the network command line interface or CLI. Access to the CLI happens via console, Telnet, or SSH, and it has been the de-facto way of managing configuration of networking devices for the past 20+ years. If you tally up the way devices have been managed for 20 years, you can see that there has been no good way to handle machine to machine mechanism i.e. using software to configure network devices.
YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (or NETCONF), NETCONF remote procedure calls, and NETCONF notifications.YANG is used to model the operations and content layers of NETCONF. YANG along with NETCONF allows you to move away from SNMP and CLI, and to programmatic network management. YANG can also use RESTCONF as a configuration management protocol.
RESTCONF is nothing but an addition of REST API, which is very popular, to NETCONF. YANG models are used as when you use RESTCONF, and thus the URLs, HTTP verbs, and Request bodies are automatically derived from the associated YANG model.
gRPC is a modern API originally developed by Google but eventually contributed into open source much like what happened with Kubernetes. Cisco includes support for gRPC on IOS-XR devices running IOS XR v6.1 or later.
In a policy-driven configuration mode, policy describes the desired network state in a declarative way, abstracted from the actions that lead to that state. This is in sharp contrast to OpenFlow based SDN model, where controller directly controls forwarding decision-making by way of flow entries in each device within the given topology.
Configuration management is about automating the provisioning and deployment of applications and infrastructure. It leverages some of the following software development practices for deployments.
- Version control
- Design patterns
Configuration management tools include Puppet, Chef and Ansible and they are well known in the DevOps circles. Version control systems enable efficient collaboration for developer contributing to a software project.
Git is a distributed version control software that keeps track of every modification to the code. If a mistake is made, developers can look back and compare earlier versions of code to help fix the mistake minimizing disruption to all team members. If you want to see a real life Git and CICD example, check out this network programmability and automation example.
When will CCIEin8Weeks release new course material?
We already did! All of our CCIE study guides and practice quizzes now include Evolving Technologies V1.1 material.
Please feel free to post your comments and questions, I will be responding to them over the next few days and weeks.
0 (0) Today, we live in a world where there is nothing, and I mean nothing, off the limits for cyberattacks and particularly ransomware attacks. Our hospitals, our universities, oil pipelines, and now even our meat is under cyberattack. The cyberattack that flattened the IT operations at JBS Foods over the weekend turns out was […]
0 (0) Ransomware has been a growing menace for years, but there has been a marked increase, during the recent months, in sophistication and level of innovation in this portion of the cybercrime underbelly. If you didn’t know, cybercrime comes in many different types, such as email and internet fraud, identity theft, financial theft like […]
0 (0) It’s time to check your Pulse. I mean your Pulse Connect Secure VPN appliance. Hackers have been exploiting several previously known and one zero-day vulnerabilities affecting Pulse Connect Secure aka PCS VPN appliances. They are targeting defense, government, and financial organizations around the world. According to FireEye, several threat actors have been exploiting […]
5 (2) OK, we now have another supply chain attack that could become the next big hack. When April fools’ jokes were being published online, one company known as Codecov discovered something that was far from a joke. So, who is Codecov? Codecov is one of the many DevOps tools out there. It provides hosted […]
5 (2) So, what is Ethical Hacking? Well, it is hacking ethically. OK, that was not helpful. There are two types of hacking, white hat hacking, black hat hacking. They use similar tools and have similar goals, so then what is the difference. Well, there is one big difference and that has to do with […]