Feeds

Bechtolsheim races Arista to zero latency

Every microsecond counts for Bechtolsheim's bolshy switches

Internet Security Threat Report 2014

This is where he says low, low latency is a big advantage. The 7124 has substantially less latency than the 5-microsecond Nexus 5000, the 15-microsecond Nexus 7000 and the 20-plus microsecond latency of the Catalyst 6500. Cisco is the network behemoth Arista has to beat, and it aims to whip Cisco to death with superior speeds and feeds.

Bechtolsheim has a latency roadmap slide bearing a single arrow pointing downwards - no numbers or timescale though.

Virtualisation

Naturally, Arista has a virtualisation strategy. The idea is that administration should be unified at the vCenter level, with the network reacting in real time to the server farm virtualisation administrator's control inputs.

There is a VMware virtual machine instance of Arista's EOS operating system, vEOS, which provides topology discovery and virtualisation. There is also VMTracer which has direct integration with VMware APIs and provides control and data linkage with VMware - all versions of VMware.

Arista wants to plug into the heart of the virtualised data centre and out-perform everybody and provide the best cost/efficacy in the networking business. Today it is focusing on 10gigE, although: "Almost no server has 10 gig on the motherboard." The computer scientist continues: "That should go away a year from now. There will be a much more rapid conversion to 10 gig when that happens. By 2014, 90 per cent of servers should have 10 gig."

Forty gig is on its way. Bechtolsheim said: "We use merchant silicon and every vendor has 40 gig on their next chip, with 100 gig after that."

Bechtolsheim is a low-latency man in everything he does. He spent half his presentation slot talking at high speed about the slides, getting through a slide a minute in some sections of his pitch. He's done workstations, he's done storage, Arista is ready to be bought - well, it appears that way - and the mercurial Bechtolsheim is probably already involved in his next venture. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.