Archive

Category Archives for "Networking"

BrandPost: The Numbers Don’t Lie: Apstra Delivers Major Savings in Data Center Operations

At Juniper Networks, we know that Juniper Apstra provides superior benefits to customers over the entire data center lifecycle, from Day 0 design and planning, to Day 1 deployment, through Day 2+ and ongoing operations. The problem? An assertion coming from a vendor sounds too salesy, even if our suspicions are right. So, we ran a detailed analysis through a third party, and it turns out, if anything, the results suggest we’ve been underselling the value Apstra can deliver. This blog is designed to walk through the findings. The conclusion? Those that aren’t shortlisting Juniper in the data center are likely leaving money – and capability – on the table.To read this article in full, please click here

BrandPost: The Numbers Don’t Lie: Apstra Delivers Major Savings in Data Center Operations

At Juniper Networks, we know that Juniper Apstra provides superior benefits to customers over the entire data center lifecycle, from Day 0 design and planning, to Day 1 deployment, through Day 2+ and ongoing operations. The problem? An assertion coming from a vendor sounds too salesy, even if our suspicions are right. So, we ran a detailed analysis through a third party, and it turns out, if anything, the results suggest we’ve been underselling the value Apstra can deliver. This blog is designed to walk through the findings. The conclusion? Those that aren’t shortlisting Juniper in the data center are likely leaving money – and capability – on the table.To read this article in full, please click here

Human Challenges Of Network Virtualization – Lessons Learned From NFV Projects

For the last four years I’ve worked on Network Functions Virtualization (NFV) projects at a couple of European Cloud Service Providers (CSPs). The implementation of these projects has proven to be messy (messiness is part of human nature, after all), and I wanted to share some of the lessons I’ve learned.

The post Human Challenges Of Network Virtualization – Lessons Learned From NFV Projects appeared first on Packet Pushers.

Community Spotlight series: Calico Open Source user insights from Sr. Software Developer, Burak Tahtacıoğlu

In this issue of the Calico Community Spotlight series, I’ve asked Burak Tahtacioglu from ParkLab Technology to share his experience with Kubernetes and Calico Open Source.  Let’s take a look at how Burak started his Kubernetes journey, and the insights he gained from Calico Open Source.

Q: Please tell us a little bit about yourself, including where you currently work and what you do there. 

I am a Sr. Software Developer in our Developer Experience team. I’m in charge of a team that maintains the core infrastructure, which includes the Kubernetes clusters we run. We also have the base CNI of the clusters. I am mainly responsible for Kubernetes processes, Istio service mesh, and Apache APISIX API Gateway processes of scaled applications.

Q: What orchestrator(s) have you been using?

Kubernetes.

Q: What cloud infrastructure(s) has been a part of your projects?

Amazon EKS and RKE.

Q: There are many people who are just getting started with Kubernetes and might have a lot of questions. Could you please talk a little bit about your own journey?

I first used container (LXC) processes in my development environment and applied them to the applications I was consulting. Then I started my Continue reading

24 ways to check the status of files using if commands on Linux

There are a lot more ways to check files using if commands than many of us realize. Although this information is included in the bash man page, that man page has thousands of lines and you could easily find yourself paging down more than 100 times to reach it.This post, provides information on each option and examples for some of the most useful ones. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Checking if a file exists One of the most commonly used tests for checking on files is if [ -f filename ]. This test will result in true if the file exists and is a regular file—not a directory or a symbolic link. You might use it like this:To read this article in full, please click here

24 ways to check the status of files using if commands on Linux

There are a lot more ways to check files using if commands than many of us realize. Although this information is included in the bash man page, that man page has thousands of lines and you could easily find yourself paging down more than 100 times to reach it.This post, provides information on each option and examples for some of the most useful ones. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Checking if a file exists One of the most commonly used tests for checking on files is if [ -f filename ]. This test will result in true if the file exists and is a regular file—not a directory or a symbolic link. You might use it like this:To read this article in full, please click here

24 ways to check the status of files using if commands on Linux

There are a lot more ways to check files using if commands than many of us realize. Although this information is included in the bash man page, that man page has thousands of lines and you could easily find yourself paging down more than 100 times to reach it.This post, provides information on each option and examples for some of the most useful ones. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Checking if a file exists One of the most commonly used tests for checking on files is if [ -f filename ]. This test will result in true if the file exists and is a regular file—not a directory or a symbolic link. You might use it like this:To read this article in full, please click here

24 ways to check the status of files using if commands on Linux

There are a lot more ways to check files using if commands than many of us realize. Although this information is included in the bash man page, that man page has thousands of lines and you could easily find yourself paging down more than 100 times to reach it.This post, provides information on each option and examples for some of the most useful ones. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Checking if a file exists One of the most commonly used tests for checking on files is if [ -f filename ]. This test will result in true if the file exists and is a regular file—not a directory or a symbolic link. You might use it like this:To read this article in full, please click here

NVIDIA ConnectX SmartNICs

NVIDIA ConnectX SmartNICs offer best-in-class network performance, serving low-latency, high-throughput applications with one, two, or four ports at 10, 25, 40, 50, 100, 200, and up to 400 gigabits per second (Gb/s) Ethernet speeds.

This article describes how use the instrumentation built into ConnectX SmartNICs for data center wide network visibility. Real-time network telemetry for automation provides some background, giving an overview of the sFlow industry standard with an example of troubleshooting a high performance GPU compute cluster.

Linux as a network operating system describes how standard Linux APIs are used in NVIDIA Spectrum switches to monitor data center network performance. Linux Kernel Upstream Release Notes v5.19 describes recent driver enhancements for ConnectX SmartNICs that extend visibility to servers for end-to-end visibility into the performance of high performance distributed compute infrastructure.

The open source Host sFlow agent uses standard Linux APIs to configure instrumentation in switches and hosts, streaming the resulting measurements to analytics software in real-time for comprehensive data center wide visibility.

Packet sampling provides detailed visibility into traffic flowing across the network. Hardware packet sampling makes it possible to monitor 400 gigabits per second interfaces on the server at line rate with minimal CPU/memory overhead.
psample {  Continue reading

What is CXL, and why should you care?

If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations.CXL is supported by pretty much every hardware vendor and built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is meant for point-to-point communications such as SSD to memory, but CXL will eventually support one-to-many communication by transmitting over coherent protocols. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here

What is CXL, and why should you care?

If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations.CXL is supported by pretty much every hardware vendor and built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is meant for point-to-point communications such as SSD to memory, but CXL will eventually support one-to-many communication by transmitting over coherent protocols. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here

What is CXL, and why should you care?

If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations.CXL is supported by pretty much every hardware vendor and built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is meant for point-to-point communications such as SSD to memory, but CXL will eventually support one-to-many communication by transmitting over coherent protocols. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here

What is CXL, and why should you care?

If you purchase a server in the next few months featuring Intel’s Sapphire Rapids generation of Xeon Scalable processor or AMD’s Genoa generation of Epyc processors, they will come with a notable new function called Compute Express Link (CXL)—an open interconnect standard you may find useful, especially in future iterations.CXL is supported by pretty much every hardware vendor and built on top of PCI Express for coherent memory access between a CPU and a device, such as a hardware accelerator, or a CPU and memory.PCIe is meant for point-to-point communications such as SSD to memory, but CXL will eventually support one-to-many communication by transmitting over coherent protocols. So far, CXL is capable of simple point-to-point communication only.To read this article in full, please click here

Network Break 395: Broadcom Ships 51.2Tbps ASIC; Extreme’s New AP Goes Outdoors; Lloyd’s Rethinks Cyber Insurance Policies

This week's Network Break podcast drills into features in Broadcom's newest Tomahawk ASIC, a new Wi-Fi 6E from Extreme for outdoor use, and a $262 million infusion for the startup DriveNets. We also cover serious Apple vulnerabilities, why Lloyd's is rethinking cyber insurance for state-sponsored attacks, Cisco financial results, and more.

BrandPost: What’s the Difference Between SASE, SD-WAN, and SSE?

By: Derek Granath, Senior Director, SD-WAN Product and Technical Marketing at Aruba, a Hewlett Packard Enterprise company.A Quick History LessonBelieve it or not, the term Software-defined Wide Area Network (SD-WAN) was first introduced back in 2014, practically ancient history when it comes to networking at the edge. It’s now well recognized and increasingly adopted as the cloud-first way to transform WAN architecture, improving application performance, enabling more efficient connectivity, and reducing network complexity.Secure Access Service Edge, known as SASE, describes the cloud-first architecture for both WAN and security functions, all delivered and managed in the cloud. In short, SASE is a blend of SD-WAN and cloud-delivered security.To read this article in full, please click here