Feeds

Bechtolsheim races Arista to zero latency

Every microsecond counts for Bechtolsheim's bolshy switches

Securing Web Applications Made Simple and Scalable

This is where he says low, low latency is a big advantage. The 7124 has substantially less latency than the 5-microsecond Nexus 5000, the 15-microsecond Nexus 7000 and the 20-plus microsecond latency of the Catalyst 6500. Cisco is the network behemoth Arista has to beat, and it aims to whip Cisco to death with superior speeds and feeds.

Bechtolsheim has a latency roadmap slide bearing a single arrow pointing downwards - no numbers or timescale though.

Virtualisation

Naturally, Arista has a virtualisation strategy. The idea is that administration should be unified at the vCenter level, with the network reacting in real time to the server farm virtualisation administrator's control inputs.

There is a VMware virtual machine instance of Arista's EOS operating system, vEOS, which provides topology discovery and virtualisation. There is also VMTracer which has direct integration with VMware APIs and provides control and data linkage with VMware - all versions of VMware.

Arista wants to plug into the heart of the virtualised data centre and out-perform everybody and provide the best cost/efficacy in the networking business. Today it is focusing on 10gigE, although: "Almost no server has 10 gig on the motherboard." The computer scientist continues: "That should go away a year from now. There will be a much more rapid conversion to 10 gig when that happens. By 2014, 90 per cent of servers should have 10 gig."

Forty gig is on its way. Bechtolsheim said: "We use merchant silicon and every vendor has 40 gig on their next chip, with 100 gig after that."

Bechtolsheim is a low-latency man in everything he does. He spent half his presentation slot talking at high speed about the slides, getting through a slide a minute in some sections of his pitch. He's done workstations, he's done storage, Arista is ready to be bought - well, it appears that way - and the mercurial Bechtolsheim is probably already involved in his next venture. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.