Wireshark is a popular, free and open-source packet capture tool that enables network and security administrators to take a “deep dive” analysis into traffic moving through a network.Wireshark can be deployed for a variety of purposes including sniffing out security issues, troubleshooting network performance problems, traffic optimization, or as part of the application development and testing process.What Does Wireshark Do?
Wireshark is primarily used to capture packets of data moving through a network. The tool allows users to put network interface controllers (NICs) into promiscuous mode to observe most traffic, even unicast traffic, which is not sent to a controller’s MAC address. However, doing this normally requires superuser permissions and may be restricted on some networks.To read this article in full, please click here
Most major network outages happen as a result of human error, not equipment failures—mistakes in the settings themselves, missed steps in a sequence, steps taken out of order, etc. Automation through scripting is meant not only to speed up network operations activities but, as importantly, to reduce the chance of such mistakes by ensuring consistency. A script executes the same steps, in the same order, every time.Ad-hoc, scripting, or programmatic automation doesn’t eliminate the possibility of error, of course. It does limit the scope of the mistakes to the programs themselves, and robust testing should uncover most of them before they have a chance to be put into production. And, should a mistake get through and result in a bunch of misconfigured switches, there is one place to fix it—the script—that also provides the means of correcting the problem at machine speeds.To read this article in full, please click here
Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.The biggest piece of the Cisco roll out was a new overarching security platform called the Cisco Security Cloud will include unified management and policies, and offer open APIs to help grow a multivendor security ecosystem. Cisco defines the Security Cloud as a “multi-year strategic vision for the future of security.” It is an ongoing journey that began several years ago and Cisco will continue delivering upon the key tenets of this vision with a consistent roadmap. The cloud will be made up of existing products like Umbrella and offerings from Duo, other features will be developed in the future.To read this article in full, please click here
Ampere Computing introduced the next generation of its Arm-based server processors and said it has begun sampling the chip to select customers.Former Intel president Renee James launched Ampere in 2018, and the company so far has released two processors aimed at cloud data centers: the 80-core Ampere Altra and the 128-core Ampere Altra Max. Those processors used cores licensed from Arm Holdings. But now, with the new AmphereOne chip, Ampere has created customized versions of the Arm processor cores to better tailor them to customer needs.
Read more: The three-way race for GPU dominance in the data centerTo read this article in full, please click here
Ampere Computing introduced the next generation of its Arm-based server processors and said it has begun sampling the chip to select customers.Former Intel president Renee James launched Ampere in 2018, and the company so far has released two processors aimed at cloud data centers: the 80-core Ampere Altra and the 128-core Ampere Altra Max. Those processors used cores licensed from Arm Holdings. But now, with the new AmphereOne chip, Ampere has created customized versions of the Arm processor cores to better tailor them to customer needs.
Read more: The three-way race for GPU dominance in the data centerTo read this article in full, please click here
While using your cell phone to connect to your Linux system might not seem like much of a priority, it is possible and you might have a good reason to do this from time to time. If you have an Android cell phone, you can install a tool that will allow you to connect, open a terminal session on your Linux box and run commands just like you would if you were sitting in front of the system. Well, almost.The tool that I recommend is called JuiceSSH. It installs easily and leaves an icon with an image of a lemon with its name below it on your screen. Click on that icon and select Quick Connect to set up your connection.To read this article in full, please click here
Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.To read this article in full, please click here
Networking multicloud-based enterprise workloads can be complicated and tedious, but there is an open-source software project underway that may change that.Called Network Service Mesh, the project would enable cloud-based Kubernetes workloads to communicate securely regardless of where they are located in disparate clouds and is under the auspices of the Cloud Native Computing Foundation, which is part of the Linux Foundation.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
And the need for such technology is growing. Cisco recently issued a study that says organizations with 5,000 or more employees are likely use more than 10 public-cloud providers and 20 to 100 SaaS providers across categories such as email, collaboration and video calling, and customer-relationship and human-capital management.To read this article in full, please click here
Arista Networks has rolled out two new switches that are designed to reduce network latency and decrease the need for cables and devices in high-density environments.The 7130LBR Series and 7130B Series are aimed helping customers consolidate servers, network and FPGA devices in Layer 1 networks that are typically found in financial, banking and trading environments along with certain enterprise environments such as those that support lots of video and test labs.
Read more: How to choose an edge gatewayTo read this article in full, please click here
The International Supercomputer Conference (ISC) kicked off in Hamburg, Germany this week with the release of the TOPP500 list of the fastest supercomputers, with a computer named Frontier taking first place.Deployed at the US Department of Energy’s Oak Ridge National Labs, it is the first exascale machine (1018 floating point operations per second)—an HPE-Cray EX system powered by AMD Epyc CPUs and Instinct MI250 GPUs.Intel had hoped to win the exascale battle with another DoE computer called Aurora, but AMD beat it to the punch. Frontier also beat out competitors from China and Japan that had hoped to win the exascale race.To read this article in full, please click here
Arriving at a consensus on when 6G wireless will be widely available commercially is all but impossible, as this small sample size shows:
Northeastern University researchers: More than five years, but probably not long after
Nokia CEO Pekka Lundmark: Definitely by 2030
ABI Research: Sometime in the 2030s
A magic 8-ball I found in my basement: Reply hazy, try again
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
Then there is this intriguing quatrain by 16th century French physician, astrologer and renowned seer Nostradamus:To read this article in full, please click here
The first true exascale supercomputer, Frontier, is now the fastest in the world, toppling Fugaku, which held the title for the past two years, according to the latest TOPP500 list of the best performing supercomputers.An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOPS), and Frontier, installed at Oak Ridge National Laboratory in Tennessee, weighed in at 1.12 exaFLOPS.Frontier also captured the title of most energy efficient supercomputer, generating 62.68 GFLOP per watt.Frontier’s speed bumps down Fugaku at the RIKEN Center for Computational Science (R-CCS) in Kobe, Japan, from number 1 on the TOPP500 list last fall to number 2 now. Fugaku scored 442 peta FLOPS (PFLOPS) on the High Performance Linpack (HPL) benchmark, which measures how well systems solve a dense system of linear equations.To read this article in full, please click here
Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Broadcom's planned acquisition of VMware might open opportunities to reach enterprise and telco companies alike with innovative technology. The question is whether Broadcom will give VMware the opportunity to further develop 5G, SDN (software-defined networking), multicloud management and other networking tools.Semiconductor manufacturer and infrastructure software vendor Broadcom confirmed Thursday that it has reached an agreement to buy VMware in a deal worth roughly $61 billion in stock and cash, subject to customary closing conditions, including regulatory and shareholder approval.To read this article in full, please click here
A VLAN is a logical subnetwork of devices in a broadcast domain that is partitioned by network switches and/or network management software to act as its own distinct LAN. Switches that support VLANs give network managers the ability to create flexible virtual network segments that are independent of the underlying physical wired or wireless topology.VLANs operate at either Layer 2 (data-link layer) or Layer 3 (network layer), depending on the design of the network. Several different network protocols support VLANs, most notably Ethernet and Wi-Fi.To read this article in full, please click here
Nvidia unveiled high-performance computing (HPC) reference designs and new water-cooling technology for its GPUs at the annual Computex tradeshow in Taipei, Taiwan.The reference designs employ Nvidia's forthcoming Grace CPU and Grace Hopper Superchips, due next year. Grace is an Arm-based CPU – Nvidia’s first for the server market. Hopper is Nvidia’s next generation of GPU processors.
Read more: Highflying Nvidia widens its reach into enterprise data centersTo read this article in full, please click here
Wi-Fi has become an indispensable technology in enterprise networks, supporting enough bandwidth and individual channels to make all-wireless LANs feasible, thanks in large part to 802.11ax, the standard more commonly called Wi-Fi 6.What is 802.11ax (Wi-Fi 6)?
Wi-Fi 6 was officially certified in 2020 and has quickly become the de facto standard for wireless LAN technology (WLAN), superseding Wi-Fi 5 (802.11ac). Wi-Fi 6 delivers improved performance, extended coverage and longer battery life compared to Wi-Fi 5.Wi-Fi 6 was originally designed to address bandwidth problems associated with dense, high-traffic environments such as airports, stadiums, trains and offices. However, the explosion of IoT devices that need to connect wirelessly to edge devices, and the ever-increasing bandwidth needs of new data-thirsty applications has rendered Wi-Fi 6 not exactly obsolete on arrival, but certainly not sufficient for some use cases.To read this article in full, please click here
HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.