Back in April, we talked about a feature called Explicit Congestion Notification (ECN). We discussed how ECN is an end-to-end method used to converge networks and save money. Priority flow control (PFC) is a different way to accomplish the same goal. Since PFC supports lossless or near lossless Ethernet, you can run applications, like RDMA, over Converged Ethernet (RoCE or RoCEv2) over your current data center infrastructure. Since RoCE runs directly over Ethernet, a different method than ECN must be used to control congestion. In this post, we’ll concentrate on the Layer 2 solution for RoCE — PFC, and how it can help you optimize your network.
Certain data center applications can tolerate only little or no loss. However, traditional Ethernet is connectionless and allows traffic loss; it relies on the upper layer protocols to re-send or provide flow control when necessary. To allow flow control for Ethernet frames, 802.3X was developed to provide flow control on the Ethernet layer. 802.3X defines a standard to send an Ethernet PAUSE frame upstream when congestion is experienced, telling the sender to “stop sending” for a few moments. The PAUSE frame stops traffic BEFORE the buffer Continue reading
The post Worth Reading: The root of a robust Internet appeared first on rule 11 reader.
Recent push by Microsoft highlights need to keep container OS platforms tight.
Mellanox and HPE build machine learning data centers; Talari Networks partners with Technology Solutions.
PaaS and IaaS businesses will ‘accelerate into hyper growth’ in 2018, Larry Ellison says.
The post Worth Reading: The revival of standards appeared first on rule 11 reader.
Moving applications and data to the public cloud brings a number of security advantages.
Download now to learn the latest on container and cloud orchestration.
On Jun 21, the OpenVPN team released an update for the 2.3.x and 2.4.x branches that resolved some newly discovered security vulnerabilities. The OpenVPN team recommends that users “upgrade to OpenVPN 2.4.3 or 2.3.17 as soon as possible“.
OpenBSD 6.0–which was released Sep 1 2016 and is still receiving security updates to the base system as per OpenBSD’s policy–shipped with a package for OpenVPN 2.3.11. Below you will find a patch and instructions for using the ports system to upgrade to version 2.3.11. Note that if you’re running OpenBSD 6.1, the ports tree has been updated to 2.4.3 so all you need to do is “cvs up” and “make install”.
Instructions:
% cd ports/net/openvpn
% patch < ~/openvpn-2.3.17p0.diff
% make install
Original article: OpenVPN 2.3.17 on OpenBSD 6.0
Copyright © 2017 Joel Knight . All Rights Reserved.