Archive

Category Archives for "Network World SDN"

What is Wireshark?

Wireshark is a popular, free and open-source packet capture tool that enables network and security administrators to take a “deep dive” analysis into traffic moving through a network.Wireshark can be deployed for a variety of purposes including sniffing out security issues, troubleshooting network performance problems, traffic optimization, or as part of the application development and testing process.What Does Wireshark Do? Wireshark is primarily used to capture packets of data moving through a network. The tool allows users to put network interface controllers (NICs) into promiscuous mode to observe most traffic, even unicast traffic, which is not sent to a controller’s MAC address. However, doing this normally requires superuser permissions and may be restricted on some networks.To read this article in full, please click here

How to manage scripts that manage network automation

Most major network outages happen as a result of human error, not equipment failures—mistakes in the settings themselves, missed steps in a sequence, steps taken out of order, etc. Automation through scripting is meant not only to speed up network operations activities but, as importantly, to reduce the chance of such mistakes by ensuring consistency. A script executes the same steps, in the same order, every time.Ad-hoc, scripting, or programmatic automation doesn’t eliminate the possibility of error, of course. It does limit the scope of the mistakes to the programs themselves, and robust testing should uncover most of them before they have a chance to be put into production. And, should a mistake get through and result in a bunch of misconfigured switches, there is one place to fix it—the script—that also provides the means of correcting the problem at machine speeds.To read this article in full, please click here

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.The biggest piece of the Cisco roll out was a new overarching security platform called the Cisco Security Cloud will include unified management and policies, and offer open APIs to help grow a multivendor security ecosystem. Cisco defines the  Security Cloud as a “multi-year strategic vision for the future of security.” It is an ongoing journey that began several years ago and Cisco will continue delivering upon the key tenets of this vision with a consistent roadmap. The cloud will be made up of existing products like Umbrella and offerings from Duo, other features will be developed in the future.To read this article in full, please click here

Ampere trials AmphereOne server processor with customers

Ampere Computing introduced the next generation of its Arm-based server processors and said it has begun sampling the chip to select customers.Former Intel president Renee James launched Ampere in 2018, and the company so far has released two processors aimed at cloud data centers: the 80-core Ampere Altra and the 128-core Ampere Altra Max. Those processors used cores licensed from Arm Holdings. But now, with the new AmphereOne chip, Ampere has created customized versions of the Arm processor cores to better tailor them to customer needs.  Read more: The three-way race for GPU dominance in the data centerTo read this article in full, please click here

Ampere trials AmpereOne server processor with customers

Ampere Computing introduced the next generation of its Arm-based server processors and said it has begun sampling the chip to select customers.Former Intel president Renee James launched Ampere in 2018, and the company so far has released two processors aimed at cloud data centers: the 80-core Ampere Altra and the 128-core Ampere Altra Max. Those processors used cores licensed from Arm Holdings. But now, with the new AmphereOne chip, Ampere has created customized versions of the Arm processor cores to better tailor them to customer needs.  Read more: The three-way race for GPU dominance in the data centerTo read this article in full, please click here

Connecting to your Linux system with your Android phone

While using your cell phone to connect to your Linux system might not seem like much of a priority, it is possible and you might have a good reason to do this from time to time. If you have an Android cell phone, you can install a tool that will allow you to connect, open a terminal session on your Linux box and run commands just like you would if you were sitting in front of the system. Well, almost.The tool that I recommend is called JuiceSSH. It installs easily and leaves an icon with an image of a lemon with its name below it on your screen. Click on that icon and select Quick Connect to set up your connection.To read this article in full, please click here

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.To read this article in full, please click here

Network Service Mesh: Linking multicloud workloads

Networking multicloud-based enterprise workloads can be complicated and tedious, but there is an open-source software project underway that may change that.Called Network Service Mesh, the project would enable cloud-based Kubernetes workloads to communicate securely regardless of where they are located in disparate clouds and is under the auspices of the Cloud Native Computing Foundation, which is part of the Linux Foundation. [ Get regularly scheduled insights by signing up for Network World newsletters. ] And the need for such technology is growing.  Cisco recently issued a study that says organizations with 5,000 or more employees are likely use more than 10 public-cloud providers and 20 to 100 SaaS providers across categories such as email, collaboration and video calling, and customer-relationship and human-capital management.To read this article in full, please click here

Arista switches target low-latency, high-density networks

Arista Networks has rolled out two new switches that are designed to reduce network latency and decrease the need for cables and devices in high-density environments.The 7130LBR Series and 7130B Series are aimed helping customers consolidate servers, network and FPGA devices in Layer 1 networks that are typically found in financial, banking and trading environments along with certain enterprise environments such as those that support lots of video and test labs. Read more: How to choose an edge gatewayTo read this article in full, please click here

ISC ’22: The AMD-Intel-Nvidia HPC race heats up

The International Supercomputer Conference (ISC) kicked off in Hamburg, Germany this week with the release of the TOPP500 list of the fastest supercomputers, with a computer named Frontier taking first place.Deployed at the US Department of Energy’s Oak Ridge National Labs, it is the first exascale machine (1018 floating point operations per second)—an HPE-Cray EX system powered by AMD Epyc CPUs and Instinct MI250 GPUs.Intel had hoped to win the exascale battle with another DoE computer called Aurora, but AMD beat it to the punch. Frontier also beat out competitors from China and Japan that had hoped to win the exascale race.To read this article in full, please click here

6G cellular doesn’t exist, but it can be hacked

Arriving at a consensus on when 6G wireless will be widely available commercially is all but impossible, as this small sample size shows: Northeastern University researchers: More than five years, but probably not long after Nokia CEO Pekka Lundmark: Definitely by 2030 ABI Research: Sometime in the 2030s A magic 8-ball I found in my basement: Reply hazy, try again [ Get regularly scheduled insights by signing up for Network World newsletters. ] Then there is this intriguing quatrain by 16th century French physician, astrologer and renowned seer Nostradamus:To read this article in full, please click here

World’s first exascale supercompuer is the world’s fastest

The first true exascale supercomputer, Frontier, is now the fastest in the world, toppling Fugaku, which held the title for the past two years, according to the latest TOPP500 list of the best performing supercomputers.An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOPS), and Frontier, installed at Oak Ridge National Laboratory in Tennessee, weighed in at 1.12 exaFLOPS.Frontier also captured the title of most energy efficient supercomputer, generating 62.68 GFLOP per watt.Frontier’s speed bumps down Fugaku at the RIKEN Center for Computational Science (R-CCS) in Kobe, Japan, from number 1 on the TOPP500 list last fall to number 2 now. Fugaku scored 442 peta FLOPS (PFLOPS) on the  High Performance Linpack (HPL) benchmark, which measures how well systems solve a dense system of linear equations.To read this article in full, please click here

Change an IP address from dynamic to static with a bash script

Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

How will Broadcom and VMware move enterprise networking forward?

Broadcom's planned acquisition of VMware might open opportunities to reach enterprise and telco companies alike with innovative technology. The question is whether Broadcom will give VMware the opportunity to further develop 5G, SDN (software-defined networking), multicloud management and other networking tools.Semiconductor manufacturer and infrastructure software vendor Broadcom confirmed Thursday that it has reached an agreement to buy VMware in a deal worth roughly $61 billion in stock and cash, subject to customary closing conditions, including regulatory and shareholder approval.To read this article in full, please click here

What is a VLAN and how does it work?

A VLAN is a logical subnetwork of devices in a broadcast domain that is partitioned by network switches and/or network management software to act as its own distinct LAN. Switches that support VLANs give network managers the ability to create flexible virtual network segments that are independent of the underlying physical wired or wireless topology.VLANs operate at either Layer 2 (data-link layer) or Layer 3 (network layer), depending on the design of the network. Several different network protocols support VLANs, most notably Ethernet and Wi-Fi.To read this article in full, please click here

Nvidia announces HPC and edge reference designs, liquid cooling plans

Nvidia unveiled high-performance computing (HPC) reference designs and new water-cooling technology for its GPUs at the annual Computex tradeshow in Taipei, Taiwan.The reference designs employ Nvidia's forthcoming Grace CPU and Grace Hopper Superchips, due next year. Grace is an Arm-based CPU – Nvidia’s first for the server market. Hopper is Nvidia’s next generation of GPU processors. Read more: Highflying Nvidia widens its reach into enterprise data centersTo read this article in full, please click here

What is Wi-Fi 6 (802.11ax), and why do we need it?

Wi-Fi has become an indispensable technology in enterprise networks, supporting enough bandwidth and individual channels to make all-wireless LANs feasible, thanks in large part to 802.11ax, the standard more commonly called Wi-Fi 6.What is 802.11ax (Wi-Fi 6)? Wi-Fi 6 was officially certified in 2020 and has quickly become the de facto standard for wireless LAN technology (WLAN), superseding Wi-Fi 5 (802.11ac). Wi-Fi 6 delivers improved performance, extended coverage and longer battery life compared to Wi-Fi 5.Wi-Fi 6 was originally designed to address bandwidth problems associated with dense, high-traffic environments such as airports, stadiums, trains and offices. However, the explosion of IoT devices that need to connect wirelessly to edge devices, and the ever-increasing bandwidth needs of new data-thirsty applications has rendered Wi-Fi 6 not exactly obsolete on arrival, but certainly not sufficient for some use cases.To read this article in full, please click here

1 24 25 26 27 28 366