Archive

Category Archives for "Networking"

Hop by Hop

It is a rare situation when you can create an outcome from two somewhat broken technologies where the outcome is not also broken. I’m referring to a recent effort to try and salvage something from the debacle that is IPv6 packet fragmentation support by taking another piece of operationally broken IPv6, namely Hop-by-Hop (HBH) extension headers, and trying to use that to solve the IPv6 Path Maximum Transfer Unit Discovery (PMTUD) problem.

Dell releases reference designs for retail, manufacturing edge solutions

Dell will offer new "validated" designs — a term used for edge devices that have been tested for compatibility in a range of important capabilities in a particular field — for retail edge computing deployments and the manufacturing sector later this year, according to an announcement issued today.The idea behind both the retail and manufacturing validated designs is to provide a central infrastructure stack for the numerous individual applications that might be in use in any given location. For retail, that can range from inventory tracking systems and smart labels on shelves, to connected point-of-sale terminals, all the way up through numerous smart vision capabilities.To read this article in full, please click here

Dell releases reference designs for retail, manufacturing edge solutions

Dell will offer new "validated" designs — a term used for edge devices that have been tested for compatibility in a range of important capabilities in a particular field — for retail edge computing deployments and the manufacturing sector later this year, according to an announcement issued today.The idea behind both the retail and manufacturing validated designs is to provide a central infrastructure stack for the numerous individual applications that might be in use in any given location. For retail, that can range from inventory tracking systems and smart labels on shelves, to connected point-of-sale terminals, all the way up through numerous smart vision capabilities.To read this article in full, please click here

SolarWinds launches overarching management, monitoring for hybrid cloud

IT management software provider SolarWinds has launched Hybrid Cloud Observability to help organizations address issues across cloud and hybrid environments.The software and services package can monitor network performance, servers and applications; analyze logs; manage IP addresses; track user devices; and manage network quality to support real-time IP applications including VoIP and video, the company says. [ Get regularly scheduled insights by signing up for Network World newsletters. ] With all these capabilities brought together on a common interface, Hybrid Cloud Observability can simplify optimizing performance, improving availability, and reducing the time to fix problems it spots, the company says.To read this article in full, please click here

Duke University to test private LTE/5G network using CBRS spectrum

Cisco and DISH Wireless are teaming with Duke University and the Internet2 research network to pilot a neutral host network for higher education institutions using Citizens Broadband Radio Service (CBRS) shared spectrum.CBRS is a band of radio-frequency spectrum from 3.5GHz to 3.7GHz that the Federal Communications Commission has designated for sharing among three tiers of users: incumbent users, priority licensees, and generally authorized/lightly licensed. Private 5G resources Private 5G as a service is now a thing Cisco details delivery of its private 5G services Tips on how to implement private 5G, from enterprises that already have Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Neutral host networks typically let public and private entities use the same network, which is then managed by the enterprise itself or by one of the providers. In this case, the neutral host network will integrate Duke University’s private network, which uses Cisco’s Private 5G as a service platform, and Internet2’s national research and education network with DISH Wireless’ 5G network.To read this article in full, please click here

Hedge 127: FR Routing Update

The FR Routing project is a fully featured open-source routing stack, including BGP, OSPF, and IS-Is (among others), supported by a community including NVDIA, Orange, VMWare, and many others. On today’s episode of the Hedge, Tom Ammon and Russ White are joined by Donald Sharp, Alistair Woodman, and Quentin Young to update listeners on projects completed and underway in FR Routing.

download

Practical Python For Networking: 5.1 Code Refactoring – Introduction To Code Refactoring – Video

This lesson introduces code refactoring. There are 3 lessons in this section. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of Network Automation Nerds and has written the books Mastering Python Networking […]

The post Practical Python For Networking: 5.1 Code Refactoring – Introduction To Code Refactoring – Video appeared first on Packet Pushers.

IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more.

The post IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab appeared first on Packet Pushers.

Meet The New WPA3 Wi-Fi Security Suite

WPA3, the latest Wi-Fi security suite, is finally making its way into products around the world. Here’s what you need to know for using it at home and in enterprise networks. What Is WPA? Wi-Fi Protected Access (WPA) is the suite of standards that define security for both WPA-Personal (passphrase) and WPA-Enterprise (802.1X) based wireless […]

The post Meet The New WPA3 Wi-Fi Security Suite appeared first on Packet Pushers.

Alibaba, Microsoft launch Arm-based cloud instances

While the on-premises server business remains firmly in the grip of the x86 world, cloud service providers are giving Arm-based servers a much more welcoming embrace. Both Chinese cloud giant Alibaba and Microsoft Azure have recently launched new instances with Arm processors.Alibaba Cloud unveiled its Yitian 710 processor design for use in its data centers back in October 2021. The company also announced the development of its proprietary servers, called Panjiu, promising optimized computing performance and energy efficiency.Yitian 710 is built on a 5nm manufacturing process and has 128 Arm cores, each with a top clock speed of 3.2GHz. It’s built on the Armv9 architecture and includes eight DDR5 memory channels per CPU and 96-lane PCIe 5.0. Alibaba claims the Yitian 710 achieved a SPECint2017 that beat the current state-of-the-art Arm server processor by 20% in performance and 50% in energy efficiency.To read this article in full, please click here

10 most powerful Wi-Fi vendors

The global Wi-Fi market is expected to grow by 65% to reach $25.2 billion by 2026.  As wireless installations expand, so does the complexity of deploying and managing the technology. In response, network professionals are demanding smarter, more automated networks that reduce complexity, while providing actionable intelligence for quick problem resolution.IDC says that growth in the Enterprise Wireless Local Area Network (WLAN) market is being driven by the introduction of 802.11ax or Wi-Fi 6 which delivers faster speeds and increased reliability over Wi-Fi 5. Wi-Fi 6 currently makes up more than 60% of current WLAN sales, while Wi-Fi 6E products, designed specifically for dense environments like stadiums and offices, are also shipping. And Wi-Fi 7, which promises even faster speeds and better performance, is on the horizon.To read this article in full, please click here

Alibaba, Microsoft launch Arm-based cloud instances

While the on-premises server business remains firmly in the grip of the x86 world, cloud service providers are giving Arm-based servers a much more welcoming embrace. Both Chinese cloud giant Alibaba and Microsoft Azure have recently launched new instances with Arm processors.Alibaba Cloud unveiled its Yitian 710 processor design for use in its data centers back in October 2021. The company also announced the development of its proprietary servers, called Panjiu, promising optimized computing performance and energy efficiency.Yitian 710 is built on a 5nm manufacturing process and has 128 Arm cores, each with a top clock speed of 3.2GHz. It’s built on the Armv9 architecture and includes eight DDR5 memory channels per CPU and 96-lane PCIe 5.0. Alibaba claims the Yitian 710 achieved a SPECint2017 that beat the current state-of-the-art Arm server processor by 20% in performance and 50% in energy efficiency.To read this article in full, please click here

netsim-tools Release 1.2.1: More MPLS and VRFs, Dell OS10, Cumulus 5.0 on Containerlab

I already mentioned the netsim-tools Easter Egg, here are the other cool features shipping in release 1.2.1:

To upgrade netsim-tools, use pip3 install --upgrade netsim-tools; if you’re starting from scratch, read the installation instructions.

IP addressing could support effective network security, but would it be worth it?

Why is it that over 90% of enterprises tell me that they expect to spend more on security over the next three years, and almost 60% say they expect to spend less on networking? We obviously think that network technology is getting more efficient, more competitive. Why isn’t that the case for security? The short answer is that enterprises have been chasing acronyms and not solutions.Acronym-chasing comes about because by nature, security is hard to plan for. The average network expert finds out there’s an issue because some higher-up reads or hears about a breach. Maybe they do a quick search, and they find out that what they really need is SASE. Or maybe they need SSE, which we’re told is SASE without SD-WAN. In any event, what happens is that there’s pressure to add this new thing on, and that creates another layer of protection...maybe.  Complication and cost? Surely.To read this article in full, please click here

Basing network security on IP addressing: Would it be worth it?

Why is it that over 90% of enterprises tell me that they expect to spend more on security over the next three years, and almost 60% say they expect to spend less on networking? We obviously think that network technology is getting more efficient, more competitive. Why isn’t that the case for security? The short answer is that enterprises have been chasing acronyms and not solutions.Acronym-chasing comes about because by nature, security is hard to plan for. The average network expert finds out there’s an issue because some higher-up reads or hears about a breach. Maybe they do a quick search, and they find out that what they really need is SASE. Or maybe they need SSE, which we’re told is SASE without SD-WAN. In any event, what happens is that there’s pressure to add this new thing on, and that creates another layer of protection...maybe.  Complication and cost? Surely.To read this article in full, please click here

IP addressing could support effective network security, but would it be worth it?

Why is it that over 90% of enterprises tell me that they expect to spend more on security over the next three years, and almost 60% say they expect to spend less on networking? We obviously think that network technology is getting more efficient, more competitive. Why isn’t that the case for security? The short answer is that enterprises have been chasing acronyms and not solutions.Acronym-chasing comes about because by nature, security is hard to plan for. The average network expert finds out there’s an issue because some higher-up reads or hears about a breach. Maybe they do a quick search, and they find out that what they really need is SASE. Or maybe they need SSE, which we’re told is SASE without SD-WAN. In any event, what happens is that there’s pressure to add this new thing on, and that creates another layer of protection...maybe.  Complication and cost? Surely.To read this article in full, please click here