Archive

Category Archives for "Networking"

Report: Price of flash memory to drop faster, further in Q4

Back in August, TrendForce Research predicted that due to an oversupply in NAND flash memory, the price of SSDs could drop by 5% to 10% in the third quarter.Since then, the economy has only worsened and the oversupply has continued, and while TrendForce hasn't reported the Q3 actuals, it's now predicting 15% to 20% drop in NAND flash prices in the fourth quarter on top of the Q3 drop..TrendForce says buyers of NAND flash memory—vendors that make SSDs but don’t manufacture their own memory—have reduced their NAND inventory and cut back on new purchases in the second half of the year. Meanwhile makers of memory drastically reduced prices to boost sales. Now TrendForce predicts that before the end of the year, suppliers will be selling memory at a loss and reduce production.To read this article in full, please click here

Using bash options to change the behavior of scripts

Bash provides a large number of options that can be used to control the behavior of bash scripts. This post examines some of the more useful ones and explains how to display which options are in use and which are not.Exiting when an error occurs If you want a bash script to exit soon as it encounters an error—any error at all—in your scripts, you can add the set -o errexit option. If your script contains a syntax error, tries to read a file that doesn’t exist, attempts to append to a file when you don’t have permission to do so, or misuses a command in some way, the script will end abruptly. Here is a simple example:#!/bin/bash set -o errexit tail NoSuchFile echo -n “Enter text to be appended> “ read txt echo $txt >> NoSuchFile Try to run this script, and you’ll see this:To read this article in full, please click here

Using bash options to change the behavior of scripts

Bash provides a large number of options that can be used to control the behavior of bash scripts. This post examines some of the more useful ones and explains how to display which options are in use and which are not.Exiting when an error occurs If you want a bash script to exit soon as it encounters an error—any error at all—in your scripts, you can add the set -o errexit option. If your script contains a syntax error, tries to read a file that doesn’t exist, attempts to append to a file when you don’t have permission to do so, or misuses a command in some way, the script will end abruptly. Here is a simple example:#!/bin/bash set -o errexit tail NoSuchFile echo -n “Enter text to be appended> “ read txt echo $txt >> NoSuchFile Try to run this script, and you’ll see this:To read this article in full, please click here

Join our upcoming live roadshow series: ‘Zero Trust, Zero Nonsense’

Join our upcoming live roadshow series: ‘Zero Trust, Zero Nonsense’
Join our upcoming live roadshow series: ‘Zero Trust, Zero Nonsense’

Many companies now believe that Zero Trust is the answer to common perimeter network infrastructure problems. But they sometimes struggle to make the progress they’d like, frequently pushing adoption timelines back.

The most common reason we hear from our customers is: “We aren’t sure how to get started.” There’s a lot of Zero Trust talk in the market, but comparatively little substance — leading to uncertainty about how to proceed.

Businesses need a strategy for tackling Zero Trust adoption and security modernization one step at a time. Cloudflare wants to help. So we’re hosting in-person discussions with security and IT leaders to do just that.

We’re hosting a series of Zero Trust Roadshows in various North American cities. These events will feature Cloudflare executives, industry experts, and other organizations like yours, and focus on ways of breaking the Zero Trust roadmap into manageable pieces, allowing organizations to make steps towards:

  • Augmenting (or replacing) a VPN: Provide simple, secure access to resources and maintain a great employee experience, while mitigating risk of lateral movement—a favorite hacker and ransomware tactic.
  • Streamlining SaaS security: Empower IT with the visibility and controls of SaaS apps and email they deserve to better care for Continue reading

Supporting next level IXP topologies

Netlab 1.4 sneak preview (unofficial)

Output of ‘fdp’ layout for ‘netlab create -o graph’

Imagine you are an IXP deploying technologies like RFC9161 EVPN with proxy ARP and MPLS over RSVP-TE, and you need to come up with a validated multi-vendor design. How would you go about that?

The Netlab team has got you covered. Check out this example — a sneak preview with upcoming Netlab 1.4 features (work in progress)

  • S1/S2 are data center routers doing EVPN/VXLAN with proxy ARP; iBGP control plane and ISIS IGP. Anycast gateways are available in the ‘red-hot’ vlan
  • C1/C2 are core nodes doing SRv6 over ISIS (one might call this BGP-Free :)
  • PE1/PE2 are MPLS core nodes doing MPLS EVPN over LDP, with OSPF
netlab up

…is all it takes to bring this topology to life!

Customer h1 can ping h4 across this ultimate feature fabric
Resulting interface configuration on s1 (SR Linux)
Sample ISIS/SRv6 configuration on c1 (SR OS)

Bringing the best live video experience to Cloudflare Stream with AV1

Bringing the best live video experience to Cloudflare Stream with AV1
Bringing the best live video experience to Cloudflare Stream with AV1

Consumer hardware is pushing the limits of consumers’ bandwidth.

VR headsets support 5760 x 3840 resolution — 22.1 million pixels per frame of video. Nearly all new TVs and smartphones sold today now support 4K — 8.8 million pixels per frame. It’s now normal for most people on a subway to be casually streaming video on their phone, even as they pass through a tunnel. People expect all of this to just work, and get frustrated when it doesn’t.

Consumer Internet bandwidth hasn’t kept up. Even advanced mobile carriers still limit streaming video resolution to prevent network congestion. Many mobile users still have to monitor and limit their mobile data usage. Higher Internet speeds require expensive infrastructure upgrades, and 30% of Americans still say they often have problems simply connecting to the Internet at home.

We talk to developers every day who are pushing up against these limits, trying to deliver the highest quality streaming video without buffering or jitter, challenged by viewers’ expectations and bandwidth. Developers building live video experiences hit these limits the hardest — buffering doesn’t just delay video playback, it can cause the viewer to get out of sync with the live event. Buffering Continue reading

Cisco tightens its SD-WAN integration with Microsoft Azure

Cisco continues to build tighter SD-WAN integration with the leading cloud service providers to better tie together widely distributed resources.This week Cisco and Microsoft extended their SD-WAN/Microsoft Azure integration to enable building single or multiple overlays on top of Microsoft’s backbone to interconnect enterprise sites worldwide, and to connect sites to workloads running inside Azure, similar to an arrangement Cisco has with Google Cloud.To read this article in full, please click here

Day Two Cloud 166: VMware: How Multi-Cloud Services Address Cloud Complexity (Sponsored)

Multi-cloud services are an emerging category of software designed to make your Dev and Ops teams' multi-cloud reality easier to cope with. Sponsor VMware stops by the Day Two Cloud podcast to talk about how the operational challenges of running workloads in a mix of public and private clouds and how its multi-cloud services initiative can help.

The post Day Two Cloud 166: VMware: How Multi-Cloud Services Address Cloud Complexity (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Juniper Integrates SD-WAN, AI Ops To Solve WAN Challenges (Sponsored)

On today's Tech Bytes podcast we talk with sponsor Juniper Networks about its AI-driven SD-WAN. While SD-WAN solves a number of problems for network engineers, it also introduces new ones: more site links, more link types, more paths, more ISPs, and more apps, all of which means more data. The Mist AI integration with SD-WAN looks for network anomalies that could lead to problems, and can often fix those problems automatically.

The post Tech Bytes: Juniper Integrates SD-WAN, AI Ops To Solve WAN Challenges (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Juniper Integrates SD-WAN, AI Ops To Solve WAN Challenges (Sponsored)

On today's Tech Bytes podcast we talk with sponsor Juniper Networks about its AI-driven SD-WAN. While SD-WAN solves a number of problems for network engineers, it also introduces new ones: more site links, more link types, more paths, more ISPs, and more apps, all of which means more data. The Mist AI integration with SD-WAN looks for network anomalies that could lead to problems, and can often fix those problems automatically.

EVPN/MPLS Bridging Forwarding Model

Most networking engineers immediately think about VXLAN and data center switches when they hear about EVPN. While that’s the most hyped use case, EVPN standardization started in 2012 as a layer-2 VPN solution on top of MPLS transport trying to merge the best of VPLS and MPLS/VPN worlds.

If you want to understand how any technology works, and what its quirks are, you have to know how it was designed to be used. In this blog post we’ll start that journey exploring the basics of EVPN used in a simple MLPS network with three PE-routers:

Lab topology

Lab topology

EVPN/MPLS Bridging Forwarding Model

Most networking engineers immediately think about VXLAN and data center switches when they hear about EVPN. While that’s the most hyped use case, EVPN standardization started in 2012 as a layer-2 VPN solution on top of MPLS transport trying to merge the best of VPLS and MPLS/VPN worlds.

If you want to understand how any technology works, and what its quirks are, you have to know how it was designed to be used. In this blog post we’ll start that journey exploring the basics of EVPN used in a simple MLPS network with three PE-routers:

Lab topology

Lab topology

What is a network switch, and how does it work?

Modern networks are critical for any enterprise. Networks deliver business applications, multimedia messages and key data to end users around the world. A fundamental element that networks have in common is the network switch, which helps connect devices for the purpose of sharing resources within a local area network (LAN).What is a network switch? A network switch is a physical device that operates at the Data Link layer of the Open Systems Interconnection (OSI) model -- Layer 2. It takes in packets sent by devices that are connected to its physical ports, and forwards them to the devices the packets are intended to reach. Switches can also operate at the Network Layer (Layer 3) where routing occurs.To read this article in full, please click here