Packet Loss Vs. Latency: Analyzing the Impact
In this video, learn how to use Wireshark to examine two common causes of network performance issues.
In this video, learn how to use Wireshark to examine two common causes of network performance issues.
The Internet Society continues to deepen its engagement with the Middle East by participating in the e-AGE 2017 Conference. This was held on 2-4 December 2017 at the Arab League in Cairo, Egypt, and was organised by the Arab States Research and Education Network (ASREN) and co-sponsored by the Internet Society and ICANN.
ASREN is a non-profit association of National Research and Education Networks in the Middle East that aims to connect institutes to enable access to services, applications and computing resources within the region and around the world, and to boost scientific research and cooperation amongst its members. Its mandate covers 22 countries, and it has partnered with the major regional R&E networking initiatives elsewhere in the world, including GÉANT (Europe), Internet2 (United States), CANARIE (Canada), WACREN (West Africa) and RedCLARA (Latin America). International connectivity is supported by the EU-funded EUMEDConnect3 and EUMEDGrid projects.
There were two main themes to the conference – that NRENs were access pathways to global knowledge, and that NRENs needed to distinguish themselves by doing things that were not or could not be provided by commercial ISPs. Michael Foley (World Bank) highlighted how the NRENs had played a key role in the evolution of Continue reading
It’s interesting how the same pundits who loudly complain about the complexities of BGP (and how it will be dead any time soon and replaced by an SDN miracle) also praise the beauties of intent-based networking… without realizing that the hated BGP route selection process represents one of the first failures of intent-based approach to networking.
Let’s start with some definitions. There are two ways to get a job done by someone else:
Read more ...
Here is the Cheat Sheet for DNS, an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.cloudpacket.com might translate to 104.27.143.238.
The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
If you found a bug or want new content to be added, please report it!
For a long while now I've been brainstorming how I could leverage the API that's present in the Cisco Spark collaboration platform to create a bot. There are lots of goofy and fun examples of bots (ie, Gifbot) that I might be able to draw inspiration from, but I wanted to create something that would provide high value to myself and anyone else that choose to download and use it. The idea finally hit me after I started using Zabbix for system monitoring. Since Zabbix also has a feature-rich API, all the pieces were in place to create a bot that would act as a bit of middle-ware between Zabbix and Spark. I call the bot: Zpark.
The new year in the IT sector got off to a roaring start with the revelation of the Meltdown and Spectre security threats, the latter of which affects most of the processors used in consumer and commercial computing gear made on the last decade or so.
Much has been written about the nature of the Meltdown and Spectre threats, which leverage the speculative execution features of modern processors to give user-level applications access to operating system kernel memory, which is a very big problem. Chip suppliers and operating system and hypervisor makers have known about these exploits since last June, …
The Spectre And Meltdown Server Tax Bill was written by Timothy Prickett Morgan at The Next Platform.
Here at The Next Platform, we tend to keep a close eye on how the major hyperscalers evolve their infrastructure to support massive scale and evermore complex workloads.
Not so long ago the core services were relatively standard transactions and operations, but with the addition of training and inferencing against complex deep learning models—something that requires a two-handed approach to hardware—the hyperscale hardware stack has had to quicken its step to keep pace with the new performance and efficiency demands of machine learning at scale.
While not innovating on the custom hardware side quite the same way as Google, …
Facebook’s Expanding Machine Learning Infrastructure was written by Nicole Hemsoth at The Next Platform.
New WPA3 capabilities include encryption on open WiFi networks.
The software enables secure HD video streaming from IoT devices.
I am honored and humbled to announce my new book “Building NSX Powered Clouds and Data Centers for Small and Medium Businesses”.
This is a concise book that provides step by step information to design and deploy NSX in Small and Medium size data centers. My aim for writing this book is to give architects and engineers the necessary tools and techniques to transform their data center from legacy architecture to software defined (SDN) architecture. The SDN architecture is the foundation to build the private cloud.
The book has about 90 pages covering following topics:
Many technology vendors tend to focus efforts in the large data center space, the fact remains that the small/medium business (SMB) space represents a substantial part of the IT marketplace.
The book is available to purchase from NSX Store.
Electronic version of the book can be downloaded from here.
The post “Building NSX Powered Clouds and Data Centers for SMBs” is available now appeared first on Network Virtualization.
The CLEC says SD-WAN is just a subset of its WAN business.
MEC and CORD are seen as key pillars of next-gen network architectures.
In its quest to meet the world’s ever-increasing demand for energy, the oil and gas industry has become one of the largest users—and leading innovators—of high-performance computing (HPC). As natural resources deplete, and the cost of accessing them increases, highly sophisticated computational modeling becomes an essential tool in energy exploration and development.
Advanced computational techniques provide a high-fidelity model of the subsurface, which gives oil and gas companies a greater understanding of the geophysics of the region they propose to explore. A clearer picture of the earth enables targeted drilling, reduced acquisition costs, and minimal environmental impact. In an industry …
HPC Optimizes Energy Exploration for Oil and Gas Startups was written by Nicole Hemsoth at The Next Platform.
Last week the news of two significant computer bugs was announced. They've been dubbed Meltdown and Spectre. These bugs take advantage of very technical systems that modern CPUs have implemented to make computers extremely fast. Even highly technical people can find it difficult to wrap their heads around how these bugs work. But, using some analogies, it's possible to understand exactly what's going on with these bugs. If you've found yourself puzzled by exactly what's going on with these bugs, read on — this blog is for you.
“When you come to a fork in the road, take it.” — Yogi Berra
Late one afternoon walking through a forest near your home and navigating with the GPS you come to a fork in the path which you’ve taken many times before. Unfortunately, for some mysterious reason your GPS is not working and being a methodical person you like to follow it very carefully.
Cooling your heels waiting for GPS to start working again is annoying because you are losing time when you could be getting home. Instead of waiting, you decide to make an intelligent guess about which path is most likely based on past experience and set Continue reading
Last week the news of two significant computer bugs was announced. They've been dubbed Meltdown and Spectre. These bugs take advantage of very technical systems that modern CPUs have implemented to make computers extremely fast. Even highly technical people can find it difficult to wrap their heads around how these bugs work. But, using some analogies, it's possible to understand exactly what's going on with these bugs. If you've found yourself puzzled by exactly what's going on with these bugs, read on — this blog is for you.
“When you come to a fork in the road, take it.” — Yogi Berra
Late one afternoon walking through a forest near your home and navigating with the GPS you come to a fork in the path which you’ve taken many times before. Unfortunately, for some mysterious reason your GPS is not working and being a methodical person you like to follow it very carefully.
Cooling your heels waiting for GPS to start working again is annoying because you are losing time when you could be getting home. Instead of waiting, you decide to make an intelligent guess about which path is most likely based on past experience and set Continue reading
SDxCentral's recent report highlights how big data, analytics, and convergence are impacting network and application monitoring.