Archive

Category Archives for "Networking"

My Thoughts on LinkedIn in 2020

LinkedIn originated with a focus on connecting professionals and contacts were supposed to be people that you know or worked with. The early team worked hard to build a monopoly/network effect around business connections.  Much of LinkedIn’s interface usability stems from that design intention. Now there is tension between what was LinkedIn was 10 years […]

New Arm processor promises smart storage

Arm Ltd. last week announced the Cortex-R82, a chip that is both storage and data processing-capable, which could enable a whole new generation of storage devices that help process the data they store.Storage processor chips, such as those made by Marvell but also storage device makers like EMC, handle the I/O and disk management, but if you want to process the data, that job falls to the CPU. This means data has to be moved in and out of the drive to be processed, a job that falls to two separate devices.But there is an emerging hardware category known as computational storage where the processing is done where the data resides, rather than moving it into memory. Data is processed through various methods, like indexing and schema, eliminating the latency of data movement and freeing up the CPU. Obviously this can only be done on SSDs.To read this article in full, please click here

New Arm processor promises smart storage

Arm Ltd. last week announced the Cortex-R82, a chip that is both storage and data processing-capable, which could enable a whole new generation of storage devices that help process the data they store.Storage processor chips, such as those made by Marvell but also storage device makers like EMC, handle the I/O and disk management, but if you want to process the data, that job falls to the CPU. This means data has to be moved in and out of the drive to be processed, a job that falls to two separate devices.But there is an emerging hardware category known as computational storage where the processing is done where the data resides, rather than moving it into memory. Data is processed through various methods, like indexing and schema, eliminating the latency of data movement and freeing up the CPU. Obviously this can only be done on SSDs.To read this article in full, please click here

The Hedge Podcast 51: Tim Fiola and pyNTM

Have you ever looked at your wide area network and wondered … what would the traffic flows look like if this link or that router failed? Traffic modeling of this kind is widely available in commercial tools, which means it’s been hard to play with these kinds of tools, learn how they work, and understand how they can be effective. There is, however, an open source alternative—pyNTM. While this tool won’t replace a commercial tool, it can give you “enough to go on” for many network operators, and give you the experience and understanding needed to justify springing for a commercial product.

download

Day Two Cloud 065: Building Your Cloud On-Ramp With SD-WAN

SD-WAN vendors offer a variety of mechanisms to connect end users to cloud applications while incorporating policy and performance requirements. Day Two Cloud co-host Ethan Banks interviewed many of these vendors to understand the architectural nitty-gritty of different approaches. In this episode, he shares the fruits of his research.

The post Day Two Cloud 065: Building Your Cloud On-Ramp With SD-WAN appeared first on Packet Pushers.

Unimog – Cloudflare’s edge load balancer

Unimog - Cloudflare’s edge load balancer

As the scale of Cloudflare’s edge network has grown, we sometimes reach the limits of parts of our architecture. About two years ago we realized that our existing solution for spreading load within our data centers could no longer meet our needs. We embarked on a project to deploy a Layer 4 Load Balancer, internally called Unimog, to improve the reliability and operational efficiency of our edge network. Unimog has now been deployed in production for over a year.

This post explains the problems Unimog solves and how it works. Unimog builds on techniques used in other Layer 4 Load Balancers, but there are many details of its implementation that are tailored to the needs of our edge network.

Unimog - Cloudflare’s edge load balancer

The role of Unimog in our edge network

Cloudflare operates an anycast network, meaning that our data centers in 200+ cities around the world serve the same IP addresses. For example, our own cloudflare.com website uses Cloudflare services, and one of its IP addresses is 104.17.175.85. All of our data centers will accept connections to that address and respond to HTTP requests. By the magic of Internet routing, when you visit cloudflare.com and your Continue reading

Where Do We Need Smart NICs?

We did a number of Software Gone Wild podcasts trying to figure out whether smart NICs address a real need or whether it’s just another vendor attempt to explore all potential markets. As expected, we got opposing views from Luke Gorrie claiming a NIC should be as simple as possible to Silvano Gai explaining how dedicated hardware performs the same operations at lower cost, lower power consumption and way higher speeds.

In theory, there’s no doubt that Silvano is right. Just look at how expensive some router line cards are, and try to figure out how much it would cost to get 25.6 Tbps of forwarding performance that we’ll get in a single ASIC (Tomahawk-4) in software (assuming ~10 Gbps per CPU core). High-speed core packet forwarding has to be done in dedicated hardware.

How Do We Ensure the Internet Grows and Improves? Start with the Internet Impact Assessment Toolkit

photo of looking up in a group of trees

The Internet has been revolutionary for human progress. Bit by bit, byte by byte, it has come to underpin modern life. For those of us online today it is hard to imagine (or remember) a world where the Internet was not the fabric of our social lives, education, entertainment, innovation, and culture. But what makes the Internet such a success, and how can we ensure its future? What takes a “network of networks” and makes it the Internet? We’ve launched the Internet Way of Networking’s Internet Impact Assessment Toolkit (IIAT) to to help answer that question.

The current pandemic has showed us both the value and the opportunities the Internet holds. For societies to pivot to a reality where most of our lives became digital overnight is a true testament to the possibilities that are inherent in the Internet.

But while the Internet has proved its resilience under the weight of an online society, it is easy to forget that its fundamental premise is not about cables and computers, but about collaboratively interconnecting independent networks to a greater whole. Because what fundamentally makes up the Internet, and what it could grow to become in the future, is rooted in its Continue reading

Improving the moisture model – the final phase

Back from this post http://r2079.com/2020/03/17/telnyx-api-p-sms-and-aws-iot-saves-my-plants-every-single-time/, I did see that using Telnyx and Aws MQTT did indicate the moisture. All good, so why drag this topic ?

Links reference :

https://www.espressif.com/en/products/socs/esp32 – microcontroller used in the project

Waterproof Box
Moisture Sensor

https://vruzend.com/ – lithium ion 18650 batteries

https://micropython.org/ – micropython

http://telnyx.com/ – Telecom provider

https://aws.amazon.com/ – Cloud provider

Well, there are multiple aspects to the design itself

  1. The system always required usb external power – batteries well dint last long
  2. The system always required to be internal or inside home – reason it wasnt weather resistant
  3. Costly [ Mqtt Push and and if plant dried out, it would make Telnyx API send me a lot of messages which in turn is a cost ]
  4. I never wanted a 24×7 system, I wanted something which comes online once per day and then sort of sleeps for rest of the day
  5. Wanted to use micropython, python programming language is something I always found easy on beginners like me, where as C and CPP are difficult in my opinion.
  6. I wanted something small and less or Continue reading

Using the Linux stat command to create flexible file listings

The stat command supplies a lot of detailed information on files.It provides not just the date/time of the most recent file changes, but also shows when files were most recently accessed and permissions changed. It tells you the file size in both bytes and blocks. It displays the inode being used by the file along with the file type. It includes the file owner and the associated user group both by name and UID/GID. It displays file permissions in both the “rwx” (referred to as the “human-readable” format) and numerically. On some systems, it might even include the date and time that a file was created (called its “birth”).[Get regularly scheduled insights by signing up for Network World newsletters.] In addition to providing all this information, the stat command can also be used to create file listings. These listings are extremely flexible in that you can choose to include any or all of the information described above.To read this article in full, please click here

IBM/Red Hat open hybrid-cloud application market

IBM and its Red Hat company have opened up what they call a one-stop-shop for customers looking to build, deploy and manage hybrid-cloud applications on-premises or in multicloud environments.With Red Hat Marketplace, enterprise customers can find and buy the  tools and services they need to build cloud-native applications across public and private cloud environments through one curated repository, Red Hat executives said.[Get regularly scheduled insights by signing up for Network World newsletters.] IBM and Red Hat executives said the enterprise software and service marketplace is specifically aimed at hybrid-cloud computing customers.To read this article in full, please click here

IBM/Red Hat open hybrid cloud application market

IBM and its Red Hat company have opened up what they call a one-stop-shop for customers looking to build, deploy and manage hybrid-cloud applications on-premises or in multicloud environments.With Red Hat Marketplace, enterprise customers can find and buy the  tools and services they need to build cloud-native applications across public and private cloud environments through one curated repository, Red Hat executives said.[Get regularly scheduled insights by signing up for Network World newsletters.] IBM and Red Hat executives said the enterprise software and service marketplace is specifically aimed at hybrid-cloud computing customers.To read this article in full, please click here

Cumulus Linux 4.2

Cumulus Linux is a network operating system for open networking hardware. Cumulus VX is a free virtual appliance that allows network engineers to experiment with Cumulus Linux and verify configurations before deploying into production. 
The Cumulus VX documentation describes how to build network topologies in KVM, VirtualBox, using VMWare hypervisors. If you want to run virtual machines locally, Cumulus in the Cloud is a free service that will allow you to access pre-built networks in the public cloud.

A key feature of Cumulus Linux is the use of the Linux kernel as the authoritative repository of network state. A result of this approach is that the behavior of a Cumulus Linux VX virtual appliance is the same as Cumulus Linux running on a hardware switch. For example, the open source FRR routing daemon shipped with Cumulus Linux uses the Linux netlink API to push routes to the kernel, which forwards packets in the virtual appliance. On a physical switch, routes are still pushed to the kernel, but kernel routing configuration is then offloaded to the switch ASIC so that packets bypass the kernel and are routed by hardware.

Cumulus Linux includes the open source Host sFlow agent. Here again, Continue reading

Virtual Open Office Hours – Mid September 2020

Virtual Open Office is a chance for people to gather and discuss any topics you find interesting. Open to Anyone. No cost or commitment. Just a chance to sit around and talk, like you were in the corridor at a conference.  I’ll be there with a coffee/tea or a beer/cocktail (as appropriate) Tuesday, September 15, […]

It Has to Work

From time immemorial, humor has served to capture truth. This is no different in the world of computer networks. A notable example of using humor to capture truth is the April 1 RFC series published by the IETF. RFC1925, The Twelve Networking Truths, will serve as our guide.

According to RFC1925, the first fundamental truth of networking is: it has to work. While this might seem to be overly simplistic, it has proven—over the years—to be much more difficult to implement in real life than it looks like in a slide deck. Those with extensive experience with failures, however, can often make a better guess at what is possible to make work than those without such experience. The good news, however, is the experience of failure can be shared, especially through self-deprecating humor.

Consider RFC748, which is the first April First RFC published by the IETF, the TELNET RANDOMLY-LOSE Option. This RFC describes a set of additional signals in the TELNET protocol (for those too young to remember, TELNET is what people used to communicate with hosts before SSH and web browsers!) that instruct the server not to provide random losses through such things as “system crashes, lost data, Continue reading