Author Archives: Matt Conran

Matt Conran is an independent consultant, blogger, and the publisher of network-insight.net. He is a 16 year veteran in the networking industry with core skillsets in Data Centre, WAN, MPLS, security and virtualization technologies. He has implemented multiple infrastructure projects with startups, governments, enterprises, and service provider customers, including being a lead Network Architect in major global greenfield deployments. He loves to travel and has a passion for landscape photography.

NFV Update: MidoNet & Open Security Controller

Introduction The advent of virtualisation initiates many changes to infrastructure paradigms. Initially, it started with data centre compute and storage modules. Compute virtualization gave rise to the virtual machine enabling data centres to host thousands of customers requiring flexible compute capacity. However, the network module lagged severely limiting the agility of cloud data centres. Why Read More …

MidoNet Rule Chains

Introduction Initially, the protocols and standards used to connect networks were designed without any security in mind. The main focus was connectivity, less attention was directed on securing protocols and connections. Over the last decade, the use case of applications has expanded greatly. As a result, the attack surface has too expanded and the original Read More …

An Architect’s view on Network Virtualization – Part II

This is a two-part post – Part 1 introduces the network concepts associated with MidoNet architecture and discusses the concepts of complexity to network edges. Part 2 (this post) describes distributed databases, overlay model and traffic flow. Distributed Databases Control plane state is all about how much information a protocol needs to manage. State can Read More …

An Architect’s view on Network Virtualization

This is a two-part post – Part 1 (this post) introduces the components associated with MidoNet network virtualization architecture and discusses the concept of moving complexity to network edges. Part 2 describes distributed databases, overlay model and traffic flow through the virtual network. Introduction There has been a dramatic shift in networking – landscapes have Read More …