Blog>>Networks

BLOG / Networks

details

The networks category covers networking protocols, data transmission methods, network addressing, and network security. Understanding network fundamentals is crucial for designing, implementing, and managing reliable and secure communication systems.

Thumbnail of an article about Uncontainerizable VNFs in a CNF environment
NETWORKS

Uncontainerizable VNFs in a CNF environment

Cloud-native network functions (CNFs, for short) are a hot topic in network architecture. CNFs use containers as the base for network functions and thus would replace today’s most widely used standard, Virtual Network Functions (VNFs). In such a scenario, a container orchestration platform--Kubernetes, say--could be responsible not only for orchestrating the containers, but also for directing network traffic to proper pods. While this remains an area under research, it has aroused considerable interest among industry leaders.
Thumbnail of an article about How can DPDK access devices from user space?
SOFTWARE DEVELOPMENT
NETWORKS

How can DPDK access devices from user space?

DPDK (Data Plane Development Kit) is a set of libraries for implementing user space drivers for NICs (Network Interface Controllers). It provides a set of abstractions which allows a sophisticated packet processing pipeline to be programmed. But how does DPDK work? How is it able to access the hardware directly? How does it communicate with the hardware? Why does it require a UIO module (Userspace input-output)? What are hugepages and why are they so crucial? In this blog post I will try to explain, with a reasonable amount of detail, how a standard kernel space NIC driver works, how a user space program can access hardware and what can be gained from having it do so.
Thumbnail of an article about Infographic: The NFV MANO model in practice
NETWORKS

Infographic: The NFV MANO model in practice

Please bear in mind that this infographic does not pretend to present a complete and ultimate mapping. It is only our vision based on the specific products. Since it is tough to precisely map the existing solutions, the model itself should be treated as an approximation. The elements presented are only examples and obviously do not show every solution available on the market. We are always eager to discuss this subject and consider different points of view.
Thumbnail of an article about Debugging Nginx Ingress in Kubernetes — a study in (Codi)Lime  
CLOUD
NETWORKS

Debugging Nginx Ingress in Kubernetes — a study in (Codi)Lime  

This story comes with everything one needs to tell the perfect noir detective story. There’s an investigation, a mysterious victim and a silent psycho mass-murderer. Only the setting is changed, with Kubernetes clusters instead of Victorian era London and the CodiLime team smoking Sherlock Holmes’ pipe. So pour yourself some whiskey, light up a cigar and enjoy your reading! Kubernetes is currently one of the most popular open-source systems for deploying and managing applications. Yet it wouldn’t be so useful without Ingress, a tool that enables the outer world to contact the components within Kubernetes by using HTTP or an HTTPS protocol.
Thumbnail of an article about SDN Security: Five reasons SDN is more secure than legacy networks
NETWORKS

SDN Security: Five reasons SDN is more secure than legacy networks

Great malware infections hit hard in 2017, leading to new cybersecurity concerns. As malware evolves, so too do networks and SDN and NFV solutions, which may be a good response to increasing threats. Let's talk about SDN security. According to the Cisco Annual Cybersecurity Report 2018, WannaCry and NotPetya were the most devastating ransomware attacks launched in 2017. WannaCry spread throughout institutions, including the Spanish telecom Telefonica, FedEx and Deutche Bahn while NotPetya hit Ukrainian banks, companies and the international logistics giant Maersk.
Thumbnail of an article about Five cloud challenges solved by Software Defined Networking (SDN)
NETWORKS
CLOUD

Five cloud challenges solved by Software Defined Networking (SDN)

As purchasing more and more gear becomes an outdated way to upscale, companies outsource computing power from a the cloud. However, organizations struggle to combine their physical servers and cloud resources into a single efficient, integrated network. This article runs through some of the main concerns about the cloud. It addresses how SDN technology solves them and how it can support a company in managing its cloud services and internal resources. Empowering old-style on-prem infrastructure with SDNs allows companies to tackle their most pressing challenges in building a hybrid cloud.
Thumbnail of an article about Debugging faultily inherited file handles on Microsoft Windows
NETWORKS
SOFTWARE DEVELOPMENT

Debugging faultily inherited file handles on Microsoft Windows

Some time ago we fixed issues with multi-thread building in SConscripts. Since then, we have encountered strange, flaky compilation errors occurring randomly in about 5% of our builds. We couldn’t leave it that way - our Windows CI is used by many developers working on multiple parts of the system and we must ensure that it is 100% stable. We all know those pesky flaky bugs that won’t let us sleep peacefully. A menace to developers, they are happening once a week and are impossible to catch and debug.

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix