Network Service Mesh: Linking multicloud workloads

Networking multicloud-based enterprise workloads can be complicated and tedious, but there is an open-source software project underway that may change that.Called Network Service Mesh, the project would enable cloud-based Kubernetes workloads to communicate securely regardless of where they are located in disparate clouds and is under the auspices of the Cloud Native Computing Foundation, which is part of the Linux Foundation. [ Get regularly scheduled insights by signing up for Network World newsletters. ] And the need for such technology is growing.  Cisco recently issued a study that says organizations with 5,000 or more employees are likely use more than 10 public-cloud providers and 20 to 100 SaaS providers across categories such as email, collaboration and video calling, and customer-relationship and human-capital management.To read this article in full, please click here

Cisco, Kyndryl team up on edge networking, private cloud, managed services

Cisco and Kyndryl have partnered to help enterprise customers implement a broad range of technologies from private 5G to data-center gear to edge devices.Under the partnership the companies will also provide software-defined networking (SDN), and secure multi-network wide area network (WAN) technology delivered as services, the vendors stated.  [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Using Ixia-c to test RTBH DDoS mitigation

Remote Triggered Black Hole Scenario describes how to use the Ixia-c traffic generator to simulate a DDoS flood attack. Ixia-c supports the Open Traffic Generator API that is used in the article to program two traffic flows: the first representing normal user traffic (shown in blue) and the second representing attack traffic (show in red).

The article goes on to demonstrate the use of remotely triggered black hole (RTBH) routing to automatically mitigate the simulated attack. The chart above shows traffic levels during two simulated attacks. The DDoS mitigation controller is disabled during the first attack. Enabling the controller for the second attack causes to attack traffic to be dropped the instant it crosses the threshold.

The diagram shows the Containerlab topology used in the Remote Triggered Black Hole Scenario lab (which can run on a laptop). The Ixia traffic generator's eth1 interface represents the Internet and its eth2 interface represents the Customer Network being attacked. Industry standard sFlow telemetry from the Customer router, ce-router, streams to the DDoS mitigation controller (running an instance of DDoS Protect). When the controller detects a denial of service attack it pushed a control via BGP to the ce-router, Continue reading

Graphcore Thinks It Can Get An AI Piece Of The HPC Exascale Pie

For the last few years, Graphcore has primarily been focused on slinging its IPU chips for training and inference systems of varying sizes, but that is changing now as the six-year-old British chip designer is joining the conversation about the convergence of AI and high-performance computing.

Graphcore Thinks It Can Get An AI Piece Of The HPC Exascale Pie was written by Dylan Martin at The Next Platform.

Data Center Switching ASICs Tradeoffs

A brief mention of Broadcom ASIC families in the Networking Hardware/Software Disaggregation in 2022 blog post triggered an interesting discussion of ASIC features and where one should use different ASIC families.

Like so many things in life, ASIC design is all about tradeoffs. Usually you’re faced with a decision to either implement X (whatever X happens to be), or have high-performance product, or have a reasonably-priced product. It’s very hard to get two out of three, and getting all three is beyond Mission Impossible.

Data Center Switching ASICs Tradeoffs

A brief mention of Broadcom ASIC families in the Networking Hardware/Software Disaggregation in 2022 blog post triggered an interesting discussion of ASIC features and where one should use different ASIC families.

Like so many things in life, ASIC design is all about tradeoffs. Usually you’re faced with a decision to either implement X (whatever X happens to be), or have high-performance product, or have a reasonably-priced product. It’s very hard to get two out of three, and getting all three is beyond Mission Impossible.

Arista switches target low-latency, high-density networks

Arista Networks has rolled out two new switches that are designed to reduce network latency and decrease the need for cables and devices in high-density environments.The 7130LBR Series and 7130B Series are aimed helping customers consolidate servers, network and FPGA devices in Layer 1 networks that are typically found in financial, banking and trading environments along with certain enterprise environments such as those that support lots of video and test labs. Read more: How to choose an edge gatewayTo read this article in full, please click here

Making Flatpak Firefox use Private Browsing by Default

In April 2021 I wrote a post on making Firefox use Private Browsing by default, in which I showed how to modify the GNOME desktop file so that Firefox would open private windows by default without restricting access to normal browsing windows and functionality. I’ve used that technique on all my Fedora-based systems since that time, until just recently. What happened recently, you ask? I switched to the Flatpak version of Firefox. Fortunately, with some minor tweaks, this technique works with the Flatpak version of Firefox as well. In this post, I’ll share with you the changes needed to make the Flatpak version of Firefox also use private browsing by default.

When working with the non-Flatpak version of Firefox, the GNOME desktop file installed with the Firefox package is found at /usr/share/applications. In my earlier article, I suggested editing that file to add the --private-window parameter to the Exec line. Unfortunately, that change gets overwritten every time the Firefox package is updated. It’s better, actually, to use a locally customized desktop file placed in ~/.local/share/applications instead, which will take precedence over the shared desktop file.

With the Flatpak version of Firefox, there is still a shared Continue reading

ISC ’22: The AMD-Intel-Nvidia HPC race heats up

The International Supercomputer Conference (ISC) kicked off in Hamburg, Germany this week with the release of the TOPP500 list of the fastest supercomputers, with a computer named Frontier taking first place.Deployed at the US Department of Energy’s Oak Ridge National Labs, it is the first exascale machine (1018 floating point operations per second)—an HPE-Cray EX system powered by AMD Epyc CPUs and Instinct MI250 GPUs.Intel had hoped to win the exascale battle with another DoE computer called Aurora, but AMD beat it to the punch. Frontier also beat out competitors from China and Japan that had hoped to win the exascale race.To read this article in full, please click here

ISC ’22: The AMD-Intel-Nvidia HPC race heats up

The International Supercomputer Conference (ISC) kicked off in Hamburg, Germany this week with the release of the TOPP500 list of the fastest supercomputers, with a computer named Frontier taking first place.Deployed at the US Department of Energy’s Oak Ridge National Labs, it is the first exascale machine (1018 floating point operations per second)—an HPE-Cray EX system powered by AMD Epyc CPUs and Instinct MI250 GPUs.Intel had hoped to win the exascale battle with an other DoE computer called Aurora, but AMD beat it to the punch. Frontier also beat out competitors from China and Japan that had hoped to win the exascale race.To read this article in full, please click here