How many bits does the VLAN ID have in the 802.1Q header ?
How many bits does the VLAN ID have in the 802.1Q header ?
Think of the answer before reading the post...
How many bits does the VLAN ID have in the 802.1Q header ?
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
If you have an interesting network project you're willing to talk about on the Packet Pushers Weekly show, please e-mail [email protected]. Describe the project, and I'll see if we can create a "design & build" show around it.
The post Design & Build Podcast Series Wants You appeared first on Packet Pushers.
In this exciting webinar Q&A, experts from Cisco answer post webinar questions & elaborate on how to capture the huge business opportunity of virtual services.
Nutanix reveals huge losses; HPE gets ousted from Telefónica’s NFV project.

The post Worth Reading: Data Center Vanity appeared first on 'net work.
The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.
Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.
To read this article in full or to leave a comment, please click here
In my last article, I talked about how Fibre Channel, as a technology, has probably peaked. It’s not dead, but I think we’re seeing the beginning of a slow decline. Fibre Channel’s long goodbye is caused by a number of factors (that mostly aren’t related to Fibre Channel itself), including explosive growth in non-block storage, scale-out storage, and interopability issues.
But rather than diss Fibre Channel, in this article I’m going to talk about the advantages of Fibre Channel has over IP/Ethernet storage (and talk about why the often-talked about advantages aren’t really advantages).
Fibre Channel’s benefits have nothing to do with buffer to buffer credits, the larger MTU (2048 bytes), its speed, or even its lossless nature. Instead, Fibre Channel’s (very legitimate) advantages are mostly non-technical in nature.
When you build a Fibre Channel-based SAN, there’s no optimization that needs to be done: Fibre Channel comes out of the box optimized for storage (SCSI) traffic. There are settings you can tweak, but most of the time there’s nothing that needs to be done other than set port modes and setup zoning. The same is true for the host HBAs. While there are some Continue reading
ETSI NFV descends on the Big Apple for NFV #12
EMC announces layoffs during the New Years' holiday.
It is my privilege to return as a delegate for Network Field Day 11 in Silicon Valley on January 20-22. You can find full details on the event at Tech Field Day page which lists the vendors and delegates in full. Lots of familiar faces and a few new ones.
The post Network Field Day 11 and Meetups in the Valley appeared first on EtherealMind.

Chapter by chapter Sergey Ignatchenko is putting together a wonderful book on the Development and Deployment of Massively Multiplayer Games, though it has much broader applicability than games. Here's a recent chapter from his book.
[Enter Juliet]
Hamlet:
Thou art as sweet as the sum of the sum of Romeo and his horse and his black cat! Speak thy mind!
[Exit Juliet]
Our Classical Deployment Architecture (especially if you do use FSMs) is not bad, and it will work, but there is still quite a bit of room for improvement for most of the games out there. More specifically, we can add another row of servers in front of the Game Servers, as shown on Fig VI.8:
A public cloud is excellent for running ephemeral NFV labs.