Networking

Inter-AZ cloud network performance

Archana Kesavan of ThousandEyes speaking at NANOG75 reports that network traffic between AZs within a single region is generally “reliable and consistent,” and that tested cloud providers offer a “robust regional backbone for [suitable for] redundant, multi-AZ architectures.”

ThousandEyes ran tests at ten minute intervals over 30 days, testing bidirectional loss, latency, and jitter. Kesavan reported the average inter-AZ latency for each tested cloud:

AWSAzureGCP
.82ms1.05ms0.79ms

Within the four tested regions in AWS, they found:

RegionLatency
us-east-10.92ms
ap-south-10.72ms
eu-west-20.61ms
sa-east-11.13ms

Kesavan’s slides and video are online.

Parts of a network you should know about

If you’re running infrastructure and applications on AWS then you will encounter all of these things. They’re not the only parts of a network setup but they are, in my experience, the most important ones.

The start of Graham Lyons’ introduction to networking on AWS, which (though the terms may change) is a pretty good primer for networking in any cloud environment. Though cloud infrastructure providers have to deal with things at a different later, Graham’s post covers the basics—VPCs, subnets, availability zones, routing tables, gateways, and security groups—that customers need to manage when assembling their applications.

SSH Tunneling Examples

Most of my work is available publicly, but some development is hosted on a private SVN that’s hidden behind a firewall. Unfortunately, my primary development server is on the wrong side of that particular firewall, so I use the following command to bridge the gap: ssh -R 1980:svn_host:80 username@dev_server.com That creates a reverse tunnel through […] » about 200 words

[Insert Word Here] Is Hurting Your Network

Corporate networks are defenseless against the growing threat from instant messaging, and the government warns WiFi is insecure and easily sniffed.

Experts suggest we take precautions against the growing risk of p2p software that’s exposing sensitive documents and threatening national security.

Businesses blame security problems on their employees, their mobile devices, and other consumer technologies.

And now we have MySpace.

Rocking Wirelessly: Verizon’s V640 EVDO Card

After <a href="http://maisonbisson.com/blog/post/11012/">vacillating for a while</a> (and <a href="http://maisonbisson.com/blog/post/11418/">waiting for it to become available</a>), I finally purchased one of the <a href="http://www.verizonwireless.com:80/b2c/store/controller?item=phoneFirst&action=viewPhoneDetail&selectedPhoneId=2407">Verizon</a> / <a href="http://www.macsimumnews.com/index.php/archive/novatel_v640_expresscard_34_solution_works_with_macbook_pros/">Novatel V640</a> <a href="http://www.expresscard.org/web/site/qa.jsp#01">Express Card</a> <a href="http://en.wikipedia.org/wiki/EVDO">EVDO</a> adapters that <a href="http://raibledesigns.com/page/rd?entry=evdo_express_cards_for_macbook">everybody's talking about</a> for my <img border=0 width=1 height=1 src="http://ad.linksynergy.com/fs-bin/show?id=XfFSogqWv7s&bids=77305&type=2&subid=0" /><a href="http://click.linksynergy.com/fs-bin/click?id=XfFSogqWv7s&offerid=77305.118&type=2&subid=0">MacBook Pro</a>. » about 300 words