Archive

Category Archives for "Networking"

Heavy Networking 443: Architects Vs. Engineers – What’s The Difference?

What's the difference between network architects and network engineers? On today's Heavy Networking we gather four people who've held both roles to explore this question. Topics include the career path to becoming an architect, the tradeoffs, and advice for those pursuing such a role.

The post Heavy Networking 443: Architects Vs. Engineers – What’s The Difference? appeared first on Packet Pushers.

A World Without the IGF

Last week in Geneva, the Internet Governance Forum (IGF) Multistakeholder Advisory Group (MAG) met to discuss preparations for IGF Berlin. The Internet Society is concerned that the IGF community is showing signs of fatigue and believes that certain things must be improved in order for it to survive in an increasingly crowded Internet policy arena. We also believe the world is much better with the IGF than without it.

As the IGF reaches its fourteenth year, we must ask ourselves if it is still capable of dealing with the myriad governance challenges surrounding the Internet and policymakers – and whether the IGF can continue to evolve the Internet way – into an open and distributed global network of networks grounded in voluntary collaboration.

Imagine a world without the IGF. A world where we won’t be able to welcome people from most corners of the earth, from multiple stakeholder groups, and from diverse viewpoints and perspectives to adress the Internet’s pressing public policy issues. All sharing a common goal, albeit sometimes speaking different languages.

Certain things have indeed improved. We have seen better advanced planning from UNDESA and the IGF Secretariat, along with a supportive, well-organized, and solid support from the Continue reading

Intel follows AMD’s lead (again) into single-socket Xeon servers

I’m really starting to wonder who the leader in x86 really is these days because it seems Intel is borrowing another page out of AMD’s playbook.Intel launched a whole lot of new Xeon Scalable processors earlier this month, but they neglected to mention a unique line: the U series of single-socket processors. The folks over at Serve The Home sniffed it out first, and Intel has confirmed the existence of the line, just that they “didn’t broadly promote them.”[ Read also: Intel makes a play for high-speed fiber networking for data centers ] To backtrack a bit, AMD made a major push for single-socket servers when it launched the Epyc line of server chips. Epyc comes with up to 32 cores and multithreading, and Intel (and Dell) argued that one 32-core/64-thread processor was enough to handle many loads and a lot cheaper than a two-socket system.To read this article in full, please click here

Eating Dogfood at Scale: How We Build Serverless Apps with Workers

Eating Dogfood at Scale: How We Build Serverless Apps with Workers
Eating Dogfood at Scale: How We Build Serverless Apps with Workers

You’ve had a chance to build a Cloudflare Worker. You’ve tried KV Storage and have a great use case for your Worker. You’ve even demonstrated the usefulness to your product or organization. Now you need to go from writing a single file in the Cloudflare Dashboard UI Editor to source controlled code with multiple environments deployed using your favorite CI tool.

Fortunately, we have a powerful and flexible API for managing your workers. You can customize your deployment to your heart’s content. Our blog has already featured many things made possible by that API:

These tools make deployments easier to configure, but it still takes time to manage. The Serverless Framework Cloudflare Workers plugin removes that deployment overhead so you can spend more time working on your application and less on your deployment.

Focus on your application

Here at Cloudflare, we’ve been working to rebuild our Access product to run entirely on Workers. The move will allow Access to take advantage of the resiliency, performance, and flexibility of Workers. We’ll publish a more detailed post about that migration once complete, but the experience required that we retool some of our Continue reading

Using Faucet to Build SC18 Network with OpenFlow

Remember how Nick Buraglio tried to use OpenDaylight to build a small part of SuperComputing conference network… and ended up with a programmable patch panel?

This time he repeated the experiment using Faucet SDN Controller – an OpenFlow controller focused on getting the job done – and described his experience in Episode 101 of Software Gone Wild.

We started with the usual “what problem were you trying to solve” and quickly started teasing apart the architecture and got geekily focused on interesting things like:

Read more ...

BrandPost: 5-Minute Breakdown: Wi-Fi 6

The Wi-Fi Alliance has announced the standard for the next-generation of Wi-Fi and that standard is Wi-Fi 6.The first thing that people are thrown off by is the newer, uncommon naming convention. From basic consumers to techies alike, we are used to the 802.11 technology designations. I'm not saying the naming didn’t exist before, but the 802.11 standards designation was much more commonly used. To break it down simply, here is what Wi-Fi 6 translates to along with other well-known technologies: Wi-Fi 6→ 802.11ax Wi-Fi 5→ 802.11ac Wi-Fi 4→ 802.11n Wi-Fi 3→ 802.11g Wi-Fi 2→ 802.11a Wi-Fi 1→ 802.11b That being said, you can treat the Wi-Fi 6 designation as a generation number of sorts.To read this article in full, please click here

Campus design feature set-up : Part 2

To catch you up to speed quickly, I have a six-part blog series that will show you how to set up the CL 3.7.5 campus design feature: Multi-Domain Authentication. 

We’ll cover it all: Wired 802.1X Authentication using Aruba ClearPass, Wired MAC Authentication using Aruba ClearPass, Multi-Domain Authentication using Aruba ClearPass, Wired 802.1x using Cisco ISE, Wired MAC Authentication using Cisco ISE, and Multi-Domain Authentication using Cisco ISE.

In the last blog, I showed you how to enable wired 802.1X authentication in Cumulus Linux 3.7.5+ using Aruba ClearPass 6.7.x. In this second guide, I’ll be sharing is how to enable wired MAC Authentication in Cumulus Linux 3.7.5+ using Aruba ClearPass 6.7.x.

Keep in mind that this step-by-step guide assumes that you have already performed an initial setup of Aruba ClearPass.

Aruba ClearPass Configuration:

1. Add the Cumulus Switch to ClearPass

First, we are going to add this specific Cumulus Network switch to ClearPass. Go to the following:

Configuration > Network > Devices. Click “+Add” in the top right-hand corner

Fill in the appropriate IP Address, Description, and Shared Secrets. For simplicity sake, set the “Vendor Name” to Continue reading

Fujitsu completes design of exascale supercomputer, promises to productize it

Fujitsu and Japanese research institute Riken announced the design for the post-K supercomputer, to be launched in 2021, is complete and that they will productize the design for sale later this year.The K supercomputer was a massive system, built by Fujitsu and housed at the Riken Advanced Institute for Computational Science campus in Kobe, Japan, with more than 80,000 nodes and using Sparc64 VIIIfx processors, a derivative of the Sun Microsystems Sparc processor developed under a license agreement that pre-dated Oracle buying out Sun in 2010.It was ranked as the top supercomputer when it was launched in June 2011 with a computation speed of over 8 petaflops. And in November 2011, K became the first computer to top 10 petaflops. It was eventually surpassed as the world's fastest supercomputer by the IBM’s Sequoia, but even now, eight years later, it’s still in the top 20 of supercomputers in the world.To read this article in full, please click here

Cisco warns WLAN controller, 9000 series router and IOS/XE users to patch urgent security holes

Cisco this week issued 31 security advisories but direct customer attention to “critical” patches for its  IOS and IOS XE Software Cluster Management and IOS software for Cisco ASR 9000 Series routers. A number of vulnerabilities also need attention if customers are running Cisco Wireless LAN Controllers.The first critical patch has to do with a vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to send malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device, Cisco said.To read this article in full, please click here