Remove Port Remove Protocol Remove Topology
article thumbnail

A RoCE network for distributed AI training at scale

Engineering at Meta

Topology We built a dedicated backend network specifically for distributed training. To support large language models (LLMs), we expanded the backend network towards the DC-scale, e.g., incorporating topology-awareness into the training job scheduler. We designed a two-stage Clos topology for AI racks, known as an AI Zone.

Network 132
article thumbnail

Multi-Cloud Made Simple: Announcing Kentik Observability Enhancements for AWS and Google Cloud

Kentik

Kentik Cloud users can now access the new Kentik Map for Google Cloud to automatically visualize detailed Google Cloud and hybrid cloud infrastructure topology. For example, an audit may be warranted if unexpected TCP traffic is flowing into a MariaDB instance but isn’t entering on port 3306.

Cloud 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Configure Static Routes on Cisco

NW Kings

Unlike dynamic routes, learned through dynamic routing protocols such as OSPF (Open Shortest Path First) or EIGRP (Enhanced Interior Gateway Routing Protocol), static routes require the network administrator to specify the next hop or destination IP address. This feature in networks predicts and stabilizes the topology.

Routers 52
article thumbnail

SNMP vs. NetFlow

Kentik

This includes port, IP source, destination, port numbers, and other markings such as quality of service (QoS). SNMP is the oldest of the network management protocols in use today. Flow technologies, such as NetFlow, sFlow, jFlow, IPFIX, and others, are used to describe traffic on the network. When is SNMP Used?

Port 16
article thumbnail

SNMP vs. Flow

Kentik

This includes port, IP source, destination, port numbers, and other markings such as quality of service (QoS). SNMP is the oldest of the network management protocols in use today. Flow technologies, such as NetFlow, sFlow, jFlow, IPFIX, and others, are used to describe traffic on the network. When is SNMP Used?

Port 78
article thumbnail

Strategies for Managing Network Traffic from a Remote Workforce

Kentik

This configuration is known as a “split-tunnel” configuration and is set up by rules to exclude specific ports, protocols, or networks. This data is useful for Kentik’s automated capacity planning workflows and building topological maps (layer 2 and layer 3 connectivity). More advanced VPNs can do this by application type.

VPN 69
article thumbnail

Getting Started with Rust and Apache Kafka

Confluent

The events are handled by the command handler, which is the part of the system that has been ported to Rust. They offer several functions that are included in Topology and can be used in different applications, such as getting a Java UUID from the fixed bytes ID in the schema. Usually you’d use the default configuration, but linger.ms

Banking 18