Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Apple’s original cloud photo sync service shuts down this summer

    May 30, 2023

    Cloud-based IT operations are on the rise

    May 26, 2023

    Twitter Is a Far-Right Social Network

    May 25, 2023
    Facebook Twitter Instagram
    Your Infotech
    • Data

      Are Your APIs Leaking Sensitive Data?

      May 23, 2023

      6 barriers to becoming a data-driven company

      May 18, 2023

      How to explain data meshes, fabrics, and clouds

      May 16, 2023

      Crypto Price Today: Bitcoin holds above $27,600, focus on US CPI data

      May 12, 2023

      How To Delete Your Data From ChatGPT

      May 10, 2023
    • Cloud

      Apple’s original cloud photo sync service shuts down this summer

      May 30, 2023

      Cloud-based IT operations are on the rise

      May 26, 2023

      Google Cloud upgrades with next-gen accelerator that embiggens its VMs

      May 24, 2023

      Dark cloud over ChatGPT revolution: the cost

      May 22, 2023

      Google Cloud launches A.I.-powered tools to accelerate drug discovery, precision medicine

      May 19, 2023
    • Networking

      Twitter Is a Far-Right Social Network

      May 25, 2023

      Meta Platforms scoops up AI networking chip team from Graphcore

      May 15, 2023

      What Is Bluesky? The Twitter Alternative With Promising Networking Technology

      April 24, 2023

      Enterprise networking sees age of SASE and network as a service

      April 19, 2023

      Computer Networks: Myths, Missteps, and Mysteries – Radia Perlman at QCon London

      April 11, 2023
    • Virtualization

      Imagination and Telechips drive automotive display diversity with hardware virtualization

      March 16, 2023

      Device virtualization is key to IoT adoption

      March 3, 2023

      Discover how virtualization can transform your business with this online training

      February 7, 2023

      Server Virtualization Software Market Next Big Thing | Major Giants IBM, Oracle, Microsoft

      February 2, 2023

      Global Data Virtualization Market Report 2022: Featuring Oracle, IBM, Cisco, Salesforce, Workday, Alteryx, Domo, Ceros, Cluvio & Qliktech International

      January 26, 2023
    • IT Infrastructure

      TCS+ | The need for speed: Braintree’s Heath Huxtable on modern IT infrastructure

      March 13, 2023

      The race to net zero: Six ways to slash IT infrastructure emissions

      March 10, 2023

      Vertiv and TechAccess partner to boost African IT infrastructure solutions

      February 28, 2023

      It Infrastructure Market Size 2023 Research Report with Technological Factors and Forecast till 2025

      February 21, 2023

      Geojit to build 1.25 lakh sq ft IT infrastructure in Infopark

      February 14, 2023
    Your Infotech
    Home»Networking»Computer Networks: Myths, Missteps, and Mysteries – Radia Perlman at QCon London
    Networking

    Computer Networks: Myths, Missteps, and Mysteries – Radia Perlman at QCon London

    yourinfotechBy yourinfotechApril 11, 2023Updated:April 11, 2023No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    EMC Fellow and one of the pioneers of early network design, presented a keynote at QCon London that explored how networking protocols and technologies have evolved to become today’s Internet. In her talk, she answered some common questions (e.g. Why do we need both Ethernet and IP?) and explored how things might have looked if they were designed today.

    Perlman began by stating that she doesn’t always agree with the way professionals speak about network protocols, memorising the details of the way everything is deployed, such as:

    She believes that standards act more like moving targets than stable reference points. Also, the expert groups working on the standards are, at times, acting more like sports fans rather than professional technologists.

    Next, Perlman delved into reviewing network layers. Even though real-world network implementations subdivide into additional layers, combine layers, or perform layer violation when looking at the headers of other layers, she suggested the following classification for the talk:

    • Layer 1. Physical layer – where bits are signalled.
    • Layer 2. Structures the bits signalled at layer 1 into packets: marks the beginning and end of a packet, maybe a checksum. The packet is sent to a neighbour.
    • Layer 3: Switches forward packets from link to link to deliver packets from a source to a destination across a network.

    So, layer 2 only talks to neighbours and layer 3 forwards from link to link.

    Even if Ethernet was initially designed for multiple machines to communicate over the same wire – layer 2 connectivity – it ended up working at layer 3 as well. At layer 3, Ethernet packets are forwarded having just an extra field – hop count – for keeping track of how many times a packet is forwarded. The initial protocol used was Carrier Sense Multiple Access/Collision Detection (CSMA/CD). In plain words: common sense implemented for networks – don’t speak if somebody else is speaking and if it happens, restart the conversation based on a randomly chosen time. This would work for a network situated within a building but not for the whole internet. Just looking at 60% of the traffic would mean too many collisions.

    According to Perlman, the routing algorithms she wrote should work with any underlying protocol, not only IP or DECNet. When Ethernet came into play, she needed to integrate the nodes within a network. if she had considered each node combination in the algorithm, she would have ended up with an n*n combination of nodes, which would’ve increased the size of the lookup database too much. Instead, she considered the “pseudonode” approach, which meant just n+1 nodes, as shown by the diagram below.

    After disagreeing with industry representatives that considered that there would be no need to communicate between different Ethernets, she was given the assignment to build a “magic box” that would enable Ethernets to talk to each other. An important constraint was also provided: Perlman could not modify the endnote or Ethernet packet.
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleTop 10 Big Data Technologies That You Need to Know in 2023
    Next Article ArcelorMittal Nippon Steel selects IBM for cloud-powered transformation
    yourinfotech
    • Website

    Related Posts

    Twitter Is a Far-Right Social Network

    May 25, 2023

    Meta Platforms scoops up AI networking chip team from Graphcore

    May 15, 2023

    What Is Bluesky? The Twitter Alternative With Promising Networking Technology

    April 24, 2023

    Enterprise networking sees age of SASE and network as a service

    April 19, 2023

    Leave A Reply Cancel Reply

    Our Picks

    Subscribe to Updates

    Get the latest creative news from Your Infotech about Information Technology.

    About Us
    About Us

    We provide a wide range of customized, integrated B2B and B2C digital marketing services solutions that are ideal for your business.

    We're accepting new partnerships right now.

    Email Us: info@yourmartech.com
    Contact: +1-530-518-1420

    Our Brands
    • Your Martech
    • Your HR Tech
    • Your Fin Tech
    • Your Revenue
    • Your Bio Tech
    • Your POS Tech
    • Your Health Tech
    SUBSCRIBE NOW
    Loading
    LinkedIn
    • Privacy Policy
    © 2023 Vigarbiz Inc. Designed by Vigarbiz Media.

    Type above and press Enter to search. Press Esc to cancel.