Archive

Category Archives for "Networking"

Upcoming Live Training: Data Center Fabrics

I’ve rebuilt my data center fabrics live training class, adding a lot of new material across the board, and adding a few new topics. To cover all this new material, the class has been expanded from three to six hours. I’m teaching it for the first time on the 29th and 30th of this month.

Register here.

From the Safari Books description—

Data centers are the foundation of the cloud, whether private, public, on the edge, or in the center of the network. This training will focus on topologies and control planes, including scale, performance, and centralization. This training is important for network designers and operators who want to understand the elements of data center design that apply across all hardware and software types.

This class consists of two three-hour sessions. The first session will focus on the physical topology, including a short history of spine-and-leaf fabrics, the characteristics of fabrics (versus the broader characteristics of a network), and laying out a spine-and-leaf network to support fabric lifecycle and scaling the network out. The first session will also consider the positive and negative aspects of using single- and multi-forwarding engine (FE) devices to build a fabric, and various aspects of Continue reading

Hedge 146: Leslie Daigle and Unwanted Traffic in the DFZ

How much of the traffic on the Internet is wasted—traffic no-one really wanted, and yet is being carried and paid for by providers and end users? In a world increasingly concerned about the waste of precious resources, this is an important topic to consider. Leslie Daigle joins Russ White and Tom Ammon on this episode of the Hedge to discuss the kinds of traffic she’s seeing hit their large-scale honey-trap, and the implications for the Internet.

download

From Bits to Application Data

Long long time ago, Daniel Dib started an interesting Twitter discussion with this seemingly simple question:

How does a switch/router know from the bits it has received which layer each bit belongs to? Assume a switch received 01010101, how would it know which bits belong to the data link layer, which to the network layer and so on.

As is often the case, Peter Paluch provided an excellent answer in a Twitter thread, and allowed me to save it for posterity.

From Bits to Application Data

Long long time ago, Daniel Dib started an interesting Twitter discussion with this seemingly simple question:

How does a switch/router know from the bits it has received which layer each bit belongs to? Assume a switch received 01010101, how would it know which bits belong to the data link layer, which to the network layer and so on.

As is often the case, Peter Paluch provided an excellent answer in a Twitter thread, and allowed me to save it for posterity.

Arm lawsuit threatens Qualcomm chips developed by its Nuvia subsidiary.

Arm Holdings has filed suit against tech giant Qualcomm and its Nuvia subsidiary breach of license agreements and trademark infringement.The move comes just days after word broke that Qualcomm was looking to re-enter the server market, and take a swing at the client/desktop market as well. Qualcomm bought Nuvia, founded by ex-Apple SoC designers, for $1.4 billion last year. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Arm lawsuit threatens Qualcomm chips developed by its Nuvia subsidiary.

Arm Holdings has filed suit against tech giant Qualcomm and its Nuvia subsidiary breach of license agreements and trademark infringement.The move comes just days after word broke that Qualcomm was looking to re-enter the server market, and take a swing at the client/desktop market as well. Qualcomm bought Nuvia, founded by ex-Apple SoC designers, for $1.4 billion last year. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

New Trident 4C ASIC Includes Real-Time Threat Analysis Option

Broadcom has announced a new ASIC in the Trident family that can monitor flows in real time to identify anomalies that may indicate DDoS attacks, port scans, data exfiltration, and other threats, but has yet to announce security partners to take advantage of this capability.

The post New Trident 4C ASIC Includes Real-Time Threat Analysis Option appeared first on Packet Pushers.

IBM is leasing on-prem System i servers

IBM has jumped on the consumption/leasing bandwagon by offering a low-cost subscription for its Power 10-based System i.For $50 per user per month, IBM will place a quad-core POWER S1014-based System i server on-premises. Extra licenses can be acquired in lots of five. Leases are for three to five years, and IBM service the machne either remotely or on-site. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The specs are fairly modest but aimed at SMBs. The machine will come 64GB of memory, up to 6.4TB of NVMe storage, and both Ethernet and fiber channel connectivity. However, it may come with a quad-core processor, but just one core will be active.To read this article in full, please click here

IBM is leasing on-prem System i servers

IBM has jumped on the consumption/leasing bandwagon by offering a low-cost subscription for its Power 10-based System i.For $50 per user per month, IBM will place a quad-core POWER S1014-based System i server on-premises. Extra licenses can be acquired in lots of five. Leases are for three to five years, and IBM service the machne either remotely or on-site. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The specs are fairly modest but aimed at SMBs. The machine will come 64GB of memory, up to 6.4TB of NVMe storage, and both Ethernet and fiber channel connectivity. However, it may come with a quad-core processor, but just one core will be active.To read this article in full, please click here

IBM is leasing on-prem System i servers

IBM has jumped on the consumption/leasing bandwagon by offering a low-cost subscription for its Power 10-based System i.For $50 per user per month, IBM will place a quad-core POWER S1014-based System i server on-premises. Extra licenses can be acquired in lots of five. Leases are for three to five years, and IBM service the machne either remotely or on-site. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The specs are fairly modest but aimed at SMBs. The machine will come 64GB of memory, up to 6.4TB of NVMe storage, and both Ethernet and fiber channel connectivity. However, it may come with a quad-core processor, but just one core will be active.To read this article in full, please click here

Global internet health check and network outage report

The reliability of services delivered by ISPs, cloud providers and conferencing services (such as unified communications-as-a-service) is critical for enterprise organizations. ThousandEyes monitors how providers are handling any performance challenges and provides Network World with a weekly roundup of interesting events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update. Additional details available here.Internet report for October 23-29 ThousandEyes reported 221 global network outage events across ISPs, cloud service provider networks, collaboration app networks and edge networks (including DNS, content delivery networks, and security as a service) during the week of October 23-29. That’s up from 163 the week prior, an increase of 36%. Specific to the U.S., there were 103 outages. That's up from 75 outages the week prior, an increase of 37%. Here’s a breakdown by category:To read this article in full, please click here

Day Two Cloud 162: The Mental Health Of The 10x Samurai Ninja Engineer

In this Day Two Cloud episode, Ned and Ethan discuss the tradeoffs of mental health and professional achievement. Maybe you spend a lot of extra hours at work for your employer. Perhaps you focus on certifications after work and on the weekends. Maybe you say “yes” to more than you should, because you’re scared you’ll lose it all if you don’t. The tradeoffs are in your personal relationships. Your mental health. You suffer from burnout, anxiety, and stress. Is it all worth it? Ned and Ethan don't have all the answers, but they share their experiences and perspectives.

The post Day Two Cloud 162: The Mental Health Of The 10x Samurai Ninja Engineer appeared first on Packet Pushers.

Day Two Cloud 162: The Mental Health Of The 10x Samurai Ninja Engineer

In this Day Two Cloud episode, Ned and Ethan discuss the tradeoffs of mental health and professional achievement. Maybe you spend a lot of extra hours at work for your employer. Perhaps you focus on certifications after work and on the weekends. Maybe you say “yes” to more than you should, because you’re scared you’ll lose it all if you don’t. The tradeoffs are in your personal relationships. Your mental health. You suffer from burnout, anxiety, and stress. Is it all worth it? Ned and Ethan don't have all the answers, but they share their experiences and perspectives.

How Routers Became Bridges

Network terminology was easy in the 1980s: bridges forwarded frames between Ethernet segments based on MAC addresses, and routers forwarded network layer packets between network segments. That nirvana couldn’t last long; eventually, a big-enough customer told Cisco: “I don’t want to buy another box if I already have your too-expensive router. I want your router to be a bridge.

Turning a router into a bridge is easier than going the other way round1: add MAC table and dynamic MAC learning, and spend an evening implementing STP.

How Routers Became Bridges

Network terminology was easy in the 1980s: bridges forwarded frames between Ethernet segments based on MAC addresses, and routers forwarded network layer packets between network segments. That nirvana couldn’t last long; eventually, a big-enough customer told Cisco: “I don’t want to buy another box if I already have your too-expensive router. I want your router to be a bridge.

Turning a router into a bridge is easier than going the other way round1: add MAC table and dynamic MAC learning, and spend an evening implementing STP.