Archive

Category Archives for "Networking"

Comment la commutation « White Box » canalise Trader Joe’s

L’année 2018 est une année phénoménale pour être dans le secteur de la mise en réseau désagrégé. Il n’y a jamais eu un meilleur moment d’y être – non seulement pour les vendeurs, mais aussi pour les chefs d’entreprise eux-mêmes. Le marché pour l’innovation du réseau s’est enfin precisé après une longue balade à travers le désert qui compose la piété du SDN académique, et le hardware sur lequel fonctionne l ‘infrastructure réseau désagrégé basé sur le Linux est maintenant de calibre mondiale – les mêmes ASICs et le même hardware qu’utilisent les vendeurs actuels, et probablement les mêmes câbles électriques, si l’on digne regarder d’assez près.

Alors où entre Trader Joe’s – un supermarché américain très performant – dans cette équation ? En quatre mots: la proposition de valeur. Alors que les vendeurs de l’OS réseau « white box » comme Pica8 n’ont pas délibérément cherché à émuler les valeurs de l’entreprise Trader Joe’s, il s’avère que c’est plus ou moins ce que nous avons fait. La configuration de nos valeurs est curieusement similaire.

Meilleure qualité au moindre coût? Oui.

Service et réactivité comme buts principaux? Encore oui.

Utiliser les mêmes produits que nos plus grands compétiteurs, mais sans noms de marque? Continue reading

Comment la commutation « White Box » canalise Trader Joe’s

L’année 2018 est une année phénoménale pour être dans le secteur de la mise en réseau désagrégé. Il n’y a jamais eu un meilleur moment d’y être – non seulement pour les vendeurs, mais aussi pour les chefs d’entreprise eux-mêmes. Le marché pour l’innovation du réseau s’est enfin precisé après une longue balade à travers le désert qui compose la piété du SDN académique, et le hardware sur lequel fonctionne l ‘infrastructure réseau désagrégé basé sur le Linux est maintenant de calibre mondiale – les mêmes ASICs et le même hardware qu’utilisent les vendeurs actuels, et probablement les mêmes câbles électriques, si l’on digne regarder d’assez près.

Alors où entre Trader Joe’s – un supermarché américain très performant – dans cette équation ? En quatre mots: la proposition de valeur. Alors que les vendeurs de l’OS réseau « white box » comme Pica8 n’ont pas délibérément cherché à émuler les valeurs de l’entreprise Trader Joe’s, il s’avère que c’est plus ou moins ce que nous avons fait. La configuration de nos valeurs est curieusement similaire.

Meilleure qualité au moindre coût? Oui.

Service et réactivité comme buts principaux? Encore oui.

Utiliser les mêmes produits que nos plus grands compétiteurs, mais sans noms de marque? Continue reading

BGP leaks and cryptocurrencies

BGP leaks and cryptocurrencies

Over the few last hours, a dozen news stories have broken about how an attacker attempted (and perhaps managed) to steal cryptocurrencies using a BGP leak.

BGP leaks and cryptocurrencies
CC BY 2.0 image by elhombredenegro

What is BGP?

The Internet is composed of routes. For our DNS resolver 1.1.1.1 , we tell the world that all the IPs in the range 1.1.1.0 to 1.1.1.255 can be accessed at any Cloudflare PoP.

For the people who do not have a direct link to our routers, they receive the route via transit providers, who will deliver packets to those addresses as they are connected to Cloudflare and the rest of the Internet.

This is the normal way the Internet operates.

There are authorities (Regional Internet Registries, or RIRs) in charge of distributing IP addresses in order to avoid people using the same address space. Those are IANA, RIPE, ARIN, LACNIC, APNIC and AFRINIC.

What is a BGP leak?

BGP leaks and cryptocurrencies
CC BY 2.0 image by Magnus D

The broad definition of a BGP leak would be IP space that is announced by somebody not allowed by the owner of the Continue reading

5G is over-hyped and expectations need reigning in

5G is nearly here. The next generation of wireless connectivity promises superfast speeds, ultra-low latency and more network capacity than ever. 5G auctions have or are due to take place in the US, UK, Ireland, Italy, Portugal, Germany, Australia and host of other countries.To read this article in full, please click here(Insider Story)

5G is over-hyped and expectations need reigning in

5G is nearly here. The next generation of wireless connectivity promises superfast speeds, ultra-low latency and more network capacity than ever. 5G auctions have or are due to take place in the US, UK, Ireland, Italy, Portugal, Germany, Australia and host of other countries.To read this article in full, please click here(Insider Story)

5G is overhyped and expectations need reining in

5G is nearly here. The next generation of wireless connectivity promises superfast speeds, ultra-low latency and more network capacity than ever. 5G auctions have or are due to take place in the US, UK, Ireland, Italy, Portugal, Germany, Australia and host of other countries.To read this article in full, please click here(Insider Story)

5G is overhyped and expectations need reining in

5G is nearly here. The next generation of wireless connectivity promises superfast speeds, ultra-low latency and more network capacity than ever. 5G auctions have or are due to take place in the US, UK, Ireland, Italy, Portugal, Germany, Australia and host of other countries.To read this article in full, please click here(Insider Story)

Celebrating ECMP in Linux — part one

ECMP in Linux: A brief history

Equal Cost Multi-Path (ECMP) routes are a big component of all the super-trendy data center network designs that are en vogue right now. Clos networks and the ECMP that underpins those designs are the best tools we have today to deliver high bandwidth, highly fault-tolerant networks. Clos networks are rich with multiple equal cost paths to get from Server A to Server B.

Linux kernel ECMP

2 Paths from Host to ToR * 8 Paths from ToR to Leaf * 16 Paths from Leaf to Spine * 8 Paths from Spine to Leaf * 2 Paths from Leaf to ToR
= 4096 Possible Unique Paths between Server A and Server B

FYI: The above is an actual customer network. Names have been changed to protect the innocent and colors have been added because a rainbow of links is more fun!

Cumulus has been working to improve the behavior of ECMP routes in the Linux kernel over the last several kernel releases. Now, with kernel v4.17, we have achieved the milestone we set out to attain. As of Linux kernel v4.17, Linux hosts can now leverage the “5-Tuple” style hashing used inside traditional network devices for Continue reading

Interested in Virtualization? Check Out Our Newest Addition to the INE Library: Virtualization – Introduction to Hypervisor (KVM)

Virtualization is a key skillset for any Linux Administrator or Engineer. Not all workloads are useful in the cloud, and companies are quickly realizing this in terms of increasing cloud bills. You can bring those workloads in house, but what about licensing? KVM is a favorite of home labs because of the low cost of entry (free). KVM is also a favorite of shops that know how powerful open source is. Gain a greater understanding of how any virtualization platform works by utilizing common linux tools to manage and orchestrate your virtual machines. KVM forms the basis for upstream virtualization projects like oVirt and RHEV as well. Learn how to setup a virtualized environment only armed with an install usb from your favorite linux distribution.

 

Any workload can be run on a KVM virtual machine platform. Docker/Kubernetes? No problem. Databases, front end web services, workloads requiring dedicated hardware such as GPU’s or HBA’s, KVM can run any of these workloads with near bare metal performance.


What You’ll Learn:

  • Setting up the hypervisor machine
  • Installing your first virtual machine
  • managing network storage memory and cpu resources
  • Virtual machine snapshots
    Virtual machine cloning


You can watch this course on our streaming Continue reading

BrandPost: What We Can Learn from IT in Education

Among the vertical industries most impacted by technological change in the past three to five years is K-12 education. This is often overlooked, but the move to becoming digital is truly changing the game for school districts. Changes wrought by extensive device use, distance learning, and emerging technologies such as virtual reality and augmented reality require that K-12 schools dramatically overhaul their approach to IT. In many ways, the IT need at schools has similar or greater demands for availability, reliability, and scalability to support new applications than what is seen in other industries. However, the rapid rate of change that has occurred in K-12 is exceptional. There are some important lessons that we can learn from the “high speed” that IT professionals and administrators are responding to.To read this article in full, please click here

IDG Contributor Network: Cisco Digital Network Architecture: a prison of promises or the next big thing?

Cisco’s Digital Network Architecture (DNA) promises to help companies in their digital transformation journey where new technologies can be used to accelerate business activities and processes to make them more competitive. It's also a big validation that network analytics is no longer a nice to have but a must have. Cisco DNA aims to provide a platform that companies can use as the foundation for digital transformation projects. The architecture's key tenants are virtualization, automation, analytics, a cloud-based service management layer, and open application programming interfaces (APIs). It’s a system that’s “designed for automation.” In other words, Cisco wants to make its products easier to deploy and manage. At the heart of that message is a move away from CLI. Sounds good so far.To read this article in full, please click here

IDG Contributor Network: Cisco Digital Network Architecture: a prison of promises or the next big thing?

Cisco’s Digital Network Architecture (DNA) promises to help companies in their digital transformation journey where new technologies can be used to accelerate business activities and processes to make them more competitive. It's also a big validation that network analytics is no longer a nice to have but a must have. Cisco DNA aims to provide a platform that companies can use as the foundation for digital transformation projects. The architecture's key tenants are virtualization, automation, analytics, a cloud-based service management layer, and open application programming interfaces (APIs). It’s a system that’s “designed for automation.” In other words, Cisco wants to make its products easier to deploy and manage. At the heart of that message is a move away from CLI. Sounds good so far.To read this article in full, please click here

IDG Contributor Network: Improving supply chains with the IoT and blockchain

The U.S. Centers for Disease Control and Prevention recently advised "consumers to throw away any store-bought romaine lettuce and warned restaurants not to serve it amid an E. coli outbreak that has sickened more than 50 people in several states."This problem highlights the dangers of modern supply chains. They help lower costs and improve business efficiency, but they’re complex and a single failure can sicken people thousands of miles away. The food we eat and the medicines we use come from remote suppliers, transported in refrigerated trucks, and stored in different warehouses. How can perishable commodities be tracked from suppliers to customers? How can the temperature conditions during shipment be monitored to avoid contamination? How can spoilt products be quickly recalled even if they’re in transit or stored in a warehouse?To read this article in full, please click here