Archive

Category Archives for "Networking"

Sender Pays

The entire set of issues of network neutrality, interconnection and settlements, termination monopolies, cost allocation and infrastructure investment economics is back with us again. This time it’s not under the banner of “Network Neutrality,” but under a more directly confronting title of “Sender Pays”. The principle is much the same: network providers want to charge both their customers and the content providers to carry content to users.

How to copy files to multiple locations on Linux

Using a series of commands to copy a file to multiple locations or a number of files to a single location can be time-consuming, but there are options to speed up the process. This post explains some of them.Multiple commands like these can to copy a single file to a series of directories on your system:$ cp myfile dir1 $ cp myfile dir2 $ cp myfile dir3 One way to make the task easier is typing the first command and then repeat the command by only specifying the needed changes. This method relies on whether the file or directory names are similar enough to substitute only some portion of the names. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

How to copy files to multiple locations on Linux

Using a series of commands to copy a file to multiple locations or a number of files to a single location can be time-consuming, but there are options to speed up the process. This post explains some of them.Multiple commands like these can to copy a single file to a series of directories on your system:$ cp myfile dir1 $ cp myfile dir2 $ cp myfile dir3 One way to make the task easier is typing the first command and then repeat the command by only specifying the needed changes. This method relies on whether the file or directory names are similar enough to substitute only some portion of the names. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Cisco plans to predict, solve network problems via SaaS

Two years after it was it was acquire by Cisco, ThousandEyes' intelligent network software is now at the heart of the networking giant’s strategy to predict and fix network problems before they cause trouble.When it bought the compnay, Cisco acquired its cloud-based software package that analyzed everything from performance of local and wide-area networks to ISP, cloud, and collaboration-application performance to the health of the internet. Its cloud, enterprise, and endpoint-agent technology has been integrated in one fashion or another across Cisco’s core product lines such as its Catalyst, Nexus switches, and now that technology is part of Cisco's latest effort: predictive networking.To read this article in full, please click here

Upcoming Live Training: Data Center Fabrics

I’ve rebuilt my data center fabrics live training class, adding a lot of new material across the board, and adding a few new topics. To cover all this new material, the class has been expanded from three to six hours. I’m teaching it for the first time on the 29th and 30th of this month.

Register here.

From the Safari Books description—

Data centers are the foundation of the cloud, whether private, public, on the edge, or in the center of the network. This training will focus on topologies and control planes, including scale, performance, and centralization. This training is important for network designers and operators who want to understand the elements of data center design that apply across all hardware and software types.

This class consists of two three-hour sessions. The first session will focus on the physical topology, including a short history of spine-and-leaf fabrics, the characteristics of fabrics (versus the broader characteristics of a network), and laying out a spine-and-leaf network to support fabric lifecycle and scaling the network out. The first session will also consider the positive and negative aspects of using single- and multi-forwarding engine (FE) devices to build a fabric, and various aspects of Continue reading

Hedge 146: Leslie Daigle and Unwanted Traffic in the DFZ

How much of the traffic on the Internet is wasted—traffic no-one really wanted, and yet is being carried and paid for by providers and end users? In a world increasingly concerned about the waste of precious resources, this is an important topic to consider. Leslie Daigle joins Russ White and Tom Ammon on this episode of the Hedge to discuss the kinds of traffic she’s seeing hit their large-scale honey-trap, and the implications for the Internet.

download

From Bits to Application Data

Long long time ago, Daniel Dib started an interesting Twitter discussion with this seemingly simple question:

How does a switch/router know from the bits it has received which layer each bit belongs to? Assume a switch received 01010101, how would it know which bits belong to the data link layer, which to the network layer and so on.

As is often the case, Peter Paluch provided an excellent answer in a Twitter thread, and allowed me to save it for posterity.

Arm lawsuit threatens Qualcomm chips developed by its Nuvia subsidiary.

Arm Holdings has filed suit against tech giant Qualcomm and its Nuvia subsidiary breach of license agreements and trademark infringement.The move comes just days after word broke that Qualcomm was looking to re-enter the server market, and take a swing at the client/desktop market as well. Qualcomm bought Nuvia, founded by ex-Apple SoC designers, for $1.4 billion last year. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Arm lawsuit threatens Qualcomm chips developed by its Nuvia subsidiary.

Arm Holdings has filed suit against tech giant Qualcomm and its Nuvia subsidiary breach of license agreements and trademark infringement.The move comes just days after word broke that Qualcomm was looking to re-enter the server market, and take a swing at the client/desktop market as well. Qualcomm bought Nuvia, founded by ex-Apple SoC designers, for $1.4 billion last year. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

New Trident 4C ASIC Includes Real-Time Threat Analysis Option

Broadcom has announced a new ASIC in the Trident family that can monitor flows in real time to identify anomalies that may indicate DDoS attacks, port scans, data exfiltration, and other threats, but has yet to announce security partners to take advantage of this capability.

The post New Trident 4C ASIC Includes Real-Time Threat Analysis Option appeared first on Packet Pushers.