Archive

Category Archives for "Networking"

Network Break 446: Microsoft’s Series Of Unfortunate Events; Huawei’s 7nm Chip Gives US The Middle Finger

This week on Network Break we dig into Microsoft's post-mortem of an attack that led to the theft of emails from multiple US government agencies, discuss Huawei rolling out a new 7nm chip despite US trade restrictions meant to thwart advanced chipmaking, examine a Cisco and Nutanix team-up, and more tech news.

The post Network Break 446: Microsoft’s Series Of Unfortunate Events; Huawei’s 7nm Chip Gives US The Middle Finger appeared first on Packet Pushers.

Using the comm command to compare files or directories on Linux

The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here

Using the comm command to compare files or directories on Linux

The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here

Using the comm command to compare files or directories on Linux

The comm command on Linux systems can compare file or directory contents and display the differences in a clear and useful way. Think of “comm” not so much as a reference to “compare” as to “common,” since the command writes to standard output both the lines that are common and the lines that are unique in each of the files or directories.One key requirement when using comm is that the content to be compared must be in sorted order. However, there are ways that you can get away with comparing content that isn’t sorted. Some examples of how to do this will be presented in this post.Comparing files Normally, when using the comm command, you would compare two sorted text files to see their shared and unique lines. Here’s an example in which a list of friends and a list of neighbors are compared.To read this article in full, please click here

Enterprise DPU advances are spurred by AI, security, networking apps

The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here

Enterprise DPU advances are spurred by AI, security, networking apps

The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here

Enterprise DPU advances are spurred by AI, security, networking apps

The use of data processing units (DPU) is beginning to grow in large enterprises as AI, security and networking applications demand greater system performance.Much DPU development to date has been aimed at hyperscalers. Looking ahead, DPU use in the data center and elsewhere in the enterprise network is expected to grow. One way that could happen is the melding of DPU technology with networking switches – a technology combination AMD Pensando calls a “smartswitch.”An early entrant in that category is HPE Aruba’s CX 10000, which combines DPU technology from AMD Pensando with high-end switching capabilities. Available since early 2022, the CX 10000 is a top-of-rack, L2/3 data-center box with 3.6Tbps of switching capacity. The box eliminates the need for separate appliances to handle low latency traffic, security and load balancing, for example.To read this article in full, please click here

Flow Distribution Across ECMP Paths

ECMP is crucial for scaling and performance in modern data centers and wide-area networks, which rely on hash-based path selection. It leverages path diversity and keeps a flow’s packets on the same path, preventing reordering with useful properties like stateless operation and no reordering.

While simple and widely used, ECMP has some limitations. For example, it does not always distribute traffic evenly across all available paths. However, due to its ease of hardware implementation, ECMP remains the predominant approach. The core enabler for ECMP is hashing, which allows packet-by-packet path selection in a distributed manner across switches. ECMP limitations have also started getting more attention with the surge in building GPU clusters but fabrics suffer from Poor hashing due to a lack of flow entropy.

In this post, we’ll dive into ECMP and use statistical analysis to better understand the limitations.

Introduction

Here is a simplified explanation of how the lookup process functions. We aim to perform a prefix lookup that directs us to a specific ECMP Group listed in the ECMP group table. Each of these ECMP groups contains ECMP member counts for the ECMP group. A hash function takes Packet fields i.e. our typical five tuple (Source Continue reading

Heavy Networking 699: Connecting Multicloud Kubernetes Clusters With Virtual Application Networks

Virtual Application Networks, or VANs, are today’s Heavy Networking topic. Our guest is Ted Ross, motive force behind the Skupper.io project. Skupper builds VANs in Kubernetes clusters that are conceptually like a VLAN or VPN, except that all the magic happens at layer 7. Skupper is based on the Advanced Message Queueing Protocol (AMQP), making it effectively a message bus used to interconnect application messages inside of mTLS tunnels running on top of whatever L3 network is available. If you're confused, don't be. We talk it all out, and explain why it's relevant to today's networking pros.

The post Heavy Networking 699: Connecting Multicloud Kubernetes Clusters With Virtual Application Networks appeared first on Packet Pushers.

Heavy Networking 699: Connecting Multicloud Kubernetes Clusters With Virtual Application Networks

Virtual Application Networks, or VANs, are today’s Heavy Networking topic. Our guest is Ted Ross, motive force behind the Skupper.io project. Skupper builds VANs in Kubernetes clusters that are conceptually like a VLAN or VPN, except that all the magic happens at layer 7. Skupper is based on the Advanced Message Queueing Protocol (AMQP), making it effectively a message bus used to interconnect application messages inside of mTLS tunnels running on top of whatever L3 network is available. If you're confused, don't be. We talk it all out, and explain why it's relevant to today's networking pros.

Elevate load balancing with Private IPs and Cloudflare Tunnels: a secure path to efficient traffic distribution

Elevate load balancing with Private IPs and Cloudflare Tunnels: a secure path to efficient traffic distribution
Elevate load balancing with Private IPs and Cloudflare Tunnels: a secure path to efficient traffic distribution

In the dynamic world of modern applications, efficient load balancing plays a pivotal role in delivering exceptional user experiences. Customers commonly leverage load balancing, so they can efficiently use their existing infrastructure resources in the best way possible. Though, load balancing is not a ‘one-size-fits-all, out of the box’ solution for everyone. As you go deeper into the details of your traffic shaping requirements and as your architecture becomes more complex, different flavors of load balancing are usually required to achieve these varying goals, such as steering between datacenters for public traffic, creating high availability for critical internal services with private IPs, applying steering between servers in a single datacenter, and more. We are extremely excited to announce a new addition to our Load Balancing solution, Local Traffic Management (LTM) with deep integrations with Zero Trust!

A common problem businesses run into is that almost no providers can satisfy all these requirements, resulting in a growing list of vendors to manage disparate data sources to get a clear view of your traffic pipeline, and investment into incredibly expensive hardware that is complicated to set up and maintain. Not having a single source of truth to dwindle down ‘time to resolution’ Continue reading

Reliable ECMP with Static Routing

One of my readers wanted to use EIBGP (hint: wrong tool for this particular job1) to load balance outgoing traffic from a pair of WAN edge routers. He’s using a design very similar to this one with VRRP running between WAN edge routers, and the adjacent firewall cluster using a default route to the VRRP IP address.

The problem: all output traffic goes to the VRRP IP address which is active on one of the switches, and only a single uplink is used for the outgoing traffic.

Reliable ECMP with Static Routing

One of my readers wanted to use EIBGP to load balance outgoing traffic from a pair of WAN edge routers (hint: wrong tool for this particular job1). He’s using a design very similar to this one with VRRP running between WAN edge routers, and the adjacent firewall cluster using a default route to the VRRP IP address.

The problem: all output traffic goes to the VRRP IP address which is active on one of the switches, and only a single uplink is used for the outgoing traffic.