ABOUT THE AUTHOR

Jerzy Kaczmarski

Senior Network Engineer

Jerzy is a Senior Network Engineer at CodiLime, specializing in designing and implementing advanced solutions for data center and ISP environments. With over 15 years of experience in the field, Jerzy is a seasoned professional with a profound understanding of networking technologies and a strong passion for automation. He has profound knowledge of Python and network security, as well as many certifications, including from Cisco, Juniper Networks and Palo Alto Networks.

Jerzy Kaczmarski

CONNECT WITH JERZY KACZMARSKI

Linkedin

Recent posts by Jerzy:

Thumbnail of an article about VLAN vs. VXLAN — what’s the difference and is one better than the other?
NETWORKS

VLAN vs. VXLAN — what’s the difference and is one better than the other?

VM, VDI, VIM, NFVI, VLAN, VXLAN, VNF - the famous ‘V’ that dominates today’s IT world stands, of course, for ‘Virtual’. Every day we use virtualized servers, storage, desktop or networks without even realizing it. The convenience, cost-saving, enhanced features and security are just some of the reasons why we start using virtualization and often never look back. The same is true for computer networking, where a single physical network can host multiple separated, logical (virtual) networks that may have different topologies and feature sets or even carry traffic of different customers without interfering with each other.
Thumbnail of an article about Management vs. Control vs. Data Planes in a Network Device
NETWORKS

Management vs. Control vs. Data Planes in a Network Device

An application, a system or even a simple device is made up of several components, each of which performs specific functions to the best of its ability, while leaving other tasks to other components which are dedicated to taking care of them. For example, a web application may consist of a HTTP server which provides the UI, a database server which keeps information about users, and a content server where images and videos are stored. Such an approach to dividing responsibilities is no different in networking devices, where hardware and software components work together to analyze and forward traffic according to the configuration applied by the administrator.